cjoint

Publicité


Publicité

Format du document : text/plain

Prévisualisation

Malwarebytes Anti-Malware
www.malwarebytes.org

Date de l'analyse: 25/05/2016
Heure de l'analyse: 22:01
Fichier journal: AM rapport.txt
Administrateur: Oui

Version: 2.2.1.1043
Base de données de programmes malveillants: v2016.05.25.07
Base de données de rootkits: v2016.05.20.01
Licence: Essai
Protection contre les programmes malveillants: Activé
Protection contre les sites Web malveillants: Activé
Autoprotection: Désactivé

Système d'exploitation: Windows 10
Processeur: x64
Système de fichiers: NTFS
Utilisateur: Primael

Type d'analyse: Analyse des menaces
Résultat: Terminé
Objets analysés: 604941
Temps écoulé: 52 min, 50 s

Mémoire: Activé
Démarrage: Activé
Système de fichiers: Activé
Archives: Activé
Rootkits: Désactivé
Heuristique: Activé
PUP: Activé
PUM: Activé

Processus: 6
PUP.Optional.VBates, C:\Users\Primael\AppData\Roaming\Tazjun\Tazjun.exe, 2276, Supprimer au redémarrage, [fe1d5c7e9ffaa78fd081f1e4bd4410f0]
PUP.Optional.VBates, C:\Users\Primael\AppData\Roaming\Laddalue\Laddalue.exe, 2612, Supprimer au redémarrage, [ff1c1cbea0f962d4cf82c80d16eb0bf5]
PUP.Optional.VBates.WnskRST, C:\Users\Primael\AppData\Roaming\Laddalue\Gabed.exe, 4112, Supprimer au redémarrage, [32e91bbf58419e98cc95e1f5fa07d52b]
PUP.Optional.VBates.WnskRST, C:\Users\Primael\AppData\Roaming\Tazjun\Xempaopg.exe, 4120, Supprimer au redémarrage, [d04b5a802673ce681e43f8de38c97f81]
PUP.Optional.VBates, C:\Users\Primael\AppData\Roaming\Tazjun\Puglogiv.exe, 4128, Supprimer au redémarrage, [f12a5b7f6b2e5cda322a90468b76df21]
PUP.Optional.VBates, C:\Users\Primael\AppData\Roaming\Laddalue\Aoyjuvvoe.exe, 4228, Supprimer au redémarrage, [1b00c218bbde79bda2ba7a5ca160a45c]

Modules: 11
Adware.PennyBee.WnskRST, C:\Users\Primael\AppData\Roaming\JejwikOkeippe\Amejuuwe.din, Supprimer au redémarrage, [d14a4a90cccd1e18c245bcf241c0f40c],
PUP.Optional.VBates.WnskRST, C:\Users\Primael\AppData\Roaming\Laddalue\Gabed.dll, Supprimer au redémarrage, [55c64d8d2574e5514c14c511a8598d73],
PUP.Optional.VBates.WnskRST, C:\Users\Primael\AppData\Roaming\Laddalue\Gabed.dll, Supprimer au redémarrage, [55c64d8d2574e5514c14c511a8598d73],
PUP.Optional.VBates.WnskRST, C:\Users\Primael\AppData\Roaming\Laddalue\Gabed.dll, Supprimer au redémarrage, [55c64d8d2574e5514c14c511a8598d73],
PUP.Optional.VBates.WnskRST, C:\Users\Primael\AppData\Roaming\Laddalue\Gabed.dll, Supprimer au redémarrage, [55c64d8d2574e5514c14c511a8598d73],
PUP.Optional.VBates.WnskRST, C:\Users\Primael\AppData\Roaming\Laddalue\Gabed.dll, Supprimer au redémarrage, [55c64d8d2574e5514c14c511a8598d73],
PUP.Optional.VBates.WnskRST, C:\Users\Primael\AppData\Roaming\Tazjun\Xempaopg.dll, Supprimer au redémarrage, [9b8021b936639b9bdc8424b259a89070],
PUP.Optional.VBates.WnskRST, C:\Users\Primael\AppData\Roaming\Tazjun\Xempaopg.dll, Supprimer au redémarrage, [9b8021b936639b9bdc8424b259a89070],
PUP.Optional.VBates.WnskRST, C:\Users\Primael\AppData\Roaming\Tazjun\Xempaopg.dll, Supprimer au redémarrage, [9b8021b936639b9bdc8424b259a89070],
PUP.Optional.VBates.WnskRST, C:\Users\Primael\AppData\Roaming\Tazjun\Xempaopg.dll, Supprimer au redémarrage, [9b8021b936639b9bdc8424b259a89070],
PUP.Optional.VBates.WnskRST, C:\Users\Primael\AppData\Roaming\Tazjun\Xempaopg.dll, Supprimer au redémarrage, [9b8021b936639b9bdc8424b259a89070],

Clés du Registre: 15
PUP.Optional.VBates, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\Fueuccin, En quarantaine, [fe1d5c7e9ffaa78fd081f1e4bd4410f0],
PUP.Optional.VBates, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\Cicsa, En quarantaine, [ff1c1cbea0f962d4cf82c80d16eb0bf5],
PUP.Optional.BrowseFox, HKLM\SOFTWARE\CLASSES\CLSID\{7AD1C0F5-07A2-40E5-8608-C6EAA0FF362F}, En quarantaine, [fc1f10ca4a4fb77fe0573a93dd24718f],
PUP.Optional.BrowseFox, HKLM\SOFTWARE\CLASSES\CLSID\{7AD1C0F5-07A2-40E5-8608-C6EAA0FF362F}\INPROCSERVER32, En quarantaine, [fc1f10ca4a4fb77fe0573a93dd24718f],
PUP.Optional.Goobzo, HKLM\SOFTWARE\CLASSES\CLSID\{A5A51D2A-505A-4D84-AFC6-E0FA87E47B8C}, En quarantaine, [66b508d2c9d0fb3bf851aaab9a682bd5],
PUP.Optional.Goobzo, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{A5A51D2A-505A-4D84-AFC6-E0FA87E47B8C}, En quarantaine, [66b508d2c9d0fb3bf851aaab9a682bd5],
PUP.Optional.DeskBar, HKLM\SOFTWARE\MICROSOFT\TRACING\DeskBar_RASAPI32, En quarantaine, [2bf0ce0cf6a30630c358e4c025de41bf],
PUP.Optional.DeskBar, HKLM\SOFTWARE\MICROSOFT\TRACING\DeskBar_RASMANCS, En quarantaine, [5fbc9c3ec6d355e1e23952521fe40bf5],
PUP.Optional.IDSCProduct, HKLM\SOFTWARE\MICROSOFT\TRACING\idscservice_RASAPI32, En quarantaine, [b16a706ae9b02313ca076d71e61ddd23],
PUP.Optional.IDSCProduct, HKLM\SOFTWARE\MICROSOFT\TRACING\idscservice_RASMANCS, En quarantaine, [0615a436f2a7da5cb120647ae81bfe02],
PUP.Optional.Tuto4PC, HKLM\SOFTWARE\MICROSOFT\TRACING\otutnetwork_RASAPI32, En quarantaine, [6dae6377efaab97dcbc7bd219e657b85],
PUP.Optional.Tuto4PC, HKLM\SOFTWARE\MICROSOFT\TRACING\otutnetwork_RASMANCS, En quarantaine, [6eada6346039ab8bddb5fae463a0857b],
PUP.Optional.HohoSearch, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}, En quarantaine, [8992bb1fc0d9c175e3d1924e798a30d0],
PUP.Optional.Komodia, HKU\S-1-5-21-800940424-3997634671-1375518831-1001\SOFTWARE\INSTALLPATH\STATUS, En quarantaine, [4bd09644326794a2f79bf9ce17ecbf41],
PUP.Optional.WinYahoo, HKU\S-1-5-21-800940424-3997634671-1375518831-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\BFREPORT, En quarantaine, [26f5f8e2f6a386b0bba51ac5f80b7f81],

Valeurs du Registre: 8
PUP.Optional.BrowseFox, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\SHELLEXECUTEHOOKS|{7AD1C0F5-07A2-40E5-8608-C6EAA0FF362F}, En quarantaine, [fc1f10ca4a4fb77fe0573a93dd24718f],
PUP.Optional.IDSCProduct, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|IDSCCOMH2R, "C:\Program Files\SpaceSoundPro\idsccom_H2R.exe", En quarantaine, [6dae4694663395a1a26d05d7669d916f]
PUP.Optional.HohoSearch, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|hp, http://d2ucfwpxlh3zh3.cloudfront.net/?ts=AHEqB34tCHAnBU..&v=20160525&uid=7E5065EBE5F792B254E2A1DC236ACC8C&ptid=amz&mode=ffsengext, En quarantaine, [8992bb1fc0d9c175e3d1924e798a30d0]
PUP.Optional.HohoSearch, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|tab, http://d2ucfwpxlh3zh3.cloudfront.net/?ts=AHEqB34tCHAnBU..&v=20160525&uid=7E5065EBE5F792B254E2A1DC236ACC8C&ptid=amz&mode=ffsengext, En quarantaine, [04178a509207d264e6ce28b8768d07f9]
PUP.Optional.Boxore, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{6C5A8778-9848-4D2E-9829-BDF701F9696A}, v2.25|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\ProgramData\Boxore\7.1\node.exe|Name=Evented I/O for V8 JavaScript|, En quarantaine, [ca5186540c8dab8b58bbb024a360f50b]
PUP.Optional.Boxore, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{B361738E-0122-4599-8FD8-9B4DC612F955}, v2.25|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\ProgramData\Boxore\7.1\node.exe|Name=Evented I/O for V8 JavaScript|, En quarantaine, [51ca9545cccd4aec848fc90b44bfc040]
PUP.Optional.Komodia, HKU\S-1-5-21-800940424-3997634671-1375518831-1001\SOFTWARE\INSTALLPATH\STATUS|FlowsurfCB, Y, En quarantaine, [4bd09644326794a2f79bf9ce17ecbf41]
PUP.Optional.WinYahoo, HKU\S-1-5-21-800940424-3997634671-1375518831-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\BFREPORT|filename, C:\Users\Primael\AppData\Local\{2707115B-03AF-7DE3-6E37-580B4A5FA493}\uninstall.exe, En quarantaine, [26f5f8e2f6a386b0bba51ac5f80b7f81]

Données du Registre: 8
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{05fb22d9-1201-11e6-916a-806e6f6e6963}|NameServer, 104.197.191.4, Bon : (), Mauvais : (104.197.191.4),Remplacé,[c75412c81e7b2313888e7ed72ed6817f]
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{06ee5348-759f-40b5-a70d-fc5298c513a7}|NameServer, 104.197.191.4, Bon : (), Mauvais : (104.197.191.4),Remplacé,[5dbeb624ecad11257c9ae17444c0ae52]
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{1705bd40-a822-41f6-a336-91bf5f52a315}|NameServer, 104.197.191.4, Bon : (), Mauvais : (104.197.191.4),Remplacé,[a87315c5b9e0e5513dd9c095669e12ee]
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{8718928d-cbeb-45ea-a621-800a9249001d}|NameServer, 104.197.191.4, Bon : (), Mauvais : (104.197.191.4),Remplacé,[2fec5585eaafeb4b30e6c29358ac0cf4]
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{9f8dc881-1747-4973-ba98-0cac1eb8d684}|NameServer, 104.197.191.4, Bon : (), Mauvais : (104.197.191.4),Remplacé,[a47709d1cacfb68068aeec694aba9e62]
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{b211fbd8-99ba-4d9b-9730-17b7d505cbc3}|NameServer, 104.197.191.4, Bon : (), Mauvais : (104.197.191.4),Remplacé,[58c386548019c274eb2b40152bd9669a]
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{c58209a6-d207-11e5-9166-806e6f6e6963}|NameServer, 104.197.191.4, Bon : (), Mauvais : (104.197.191.4),Remplacé,[33e8c7130198171f789e6aeb5ba9c040]
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{e51f3e29-023d-4387-85fc-4a8fe86c57d9}|NameServer, 104.197.191.4, Bon : (), Mauvais : (104.197.191.4),Remplacé,[bd5ea03a30693105bc5ad184986c26da]

Dossiers: 5
PUP.Optional.VBates, C:\Users\Primael\AppData\LocalLow\Company\Product\1.0, En quarantaine, [38e3845630692b0b2bdd6c3bbb4832ce],
PUP.Optional.VBates, C:\Users\Primael\AppData\LocalLow\Company\Product, En quarantaine, [38e3845630692b0b2bdd6c3bbb4832ce],
PUP.Optional.Goobzo.Gen, C:\Program Files\Common Files\Noobzo, En quarantaine, [3fdc34a6bfdaa3933c08208c41c1bf41],
PUP.Optional.Goobzo.Gen, C:\Program Files\Common Files\Noobzo\GNUpdate, En quarantaine, [3fdc34a6bfdaa3933c08208c41c1bf41],
PUP.Optional.GsearchFinder, C:\Users\Primael\AppData\Roaming\Profiles\ul2riyu0.default\YourGSearchFinder_br, En quarantaine, [76a5aa3033662a0cf5487e2ffd05d32d],

Fichiers: 89
PUP.Optional.VBates, C:\Users\Primael\AppData\Roaming\Tazjun\Tazjun.exe, Supprimer au redémarrage, [fe1d5c7e9ffaa78fd081f1e4bd4410f0],
Adware.PennyBee.WnskRST, C:\Users\Primael\AppData\Roaming\JejwikOkeippe\Amejuuwe.din, Supprimer au redémarrage, [d14a4a90cccd1e18c245bcf241c0f40c],
PUP.Optional.VBates, C:\Users\Primael\AppData\Roaming\Laddalue\Laddalue.exe, Supprimer au redémarrage, [ff1c1cbea0f962d4cf82c80d16eb0bf5],
PUP.Optional.VBates.WnskRST, C:\Users\Primael\AppData\Roaming\Laddalue\Gabed.exe, Supprimer au redémarrage, [32e91bbf58419e98cc95e1f5fa07d52b],
PUP.Optional.VBates.WnskRST, C:\Users\Primael\AppData\Roaming\Laddalue\Gabed.dll, Supprimer au redémarrage, [55c64d8d2574e5514c14c511a8598d73],
PUP.Optional.VBates.WnskRST, C:\Users\Primael\AppData\Roaming\Tazjun\Xempaopg.dll, Supprimer au redémarrage, [9b8021b936639b9bdc8424b259a89070],
PUP.Optional.VBates.WnskRST, C:\Users\Primael\AppData\Roaming\Tazjun\Xempaopg.exe, Supprimer au redémarrage, [d04b5a802673ce681e43f8de38c97f81],
PUP.Optional.VBates, C:\Users\Primael\AppData\Roaming\Tazjun\Puglogiv.exe, Supprimer au redémarrage, [f12a5b7f6b2e5cda322a90468b76df21],
PUP.Optional.VBates, C:\Users\Primael\AppData\Roaming\Laddalue\Aoyjuvvoe.exe, Supprimer au redémarrage, [1b00c218bbde79bda2ba7a5ca160a45c],
PUP.Optional.BrowseFox, C:\Users\Primael\AppData\Local\Microsoft\Windows\INetCookies\x64explibss.dll, En quarantaine, [fc1f10ca4a4fb77fe0573a93dd24718f],
Trojan.Downloader, C:\ProgramData\RiliDlr.exe, En quarantaine, [190274661e7b280ea38286516e93d62a],
PUP.Optional.VBates.WnskRST, C:\Users\Primael\AppData\Roaming\Laddalue\Aoyjuvvoe.dll, Supprimer au redémarrage, [c556dbffa8f138fe6ff06571cc35718f],
PUP.Optional.VBates.WnskRST, C:\Users\Primael\AppData\Roaming\Tazjun\Puglogiv.dll, Supprimer au redémarrage, [879434a62871af871748f1e5d72abd43],
Adware.PennyBee, C:\Program Files\Radnoc\Tebpivbo.dll, En quarantaine, [50cb27b3544591a5db8f4f86fb069a66],
PUP.Optional.Amonetize, C:\Users\Primael\AppData\Local\Temp\sdf2DCB.exe, En quarantaine, [3cdf2fab643549ed26008d3bb64bee12],
PUP.Optional.IDSCProduct, C:\Users\Primael\AppData\Local\Temp\UAMJHYC401.exe, En quarantaine, [0d0e99418712de58a0932f1425dfa15f],
PUP.Optional.InstallCore, C:\Users\Primael\AppData\Local\Temp\mJrf_n+z.exe.part, En quarantaine, [78a37d5d2871dd591d2e24b124dd6a96],
PUP.Optional.InstallCore, C:\Users\Primael\AppData\Local\Temp\hpkvNlsP.exe.part, En quarantaine, [dc3f3d9d8118043293b86b6a28d96898],
PUP.Optional.InstallCore, C:\Users\Primael\AppData\Local\Temp\I_GBvRJR.exe.part, En quarantaine, [c853e6f45445d75f3b10eaeb13ee7d83],
PUP.Optional.BundleInstaller, C:\Users\Primael\AppData\Local\Temp\A0DB.tmp.exe, En quarantaine, [53c80dcd9504ee48e48b2c2cfb05cb35],
PUP.Optional.BundleInstaller, C:\Users\Primael\AppData\Local\Temp\C95B.tmp.exe, En quarantaine, [849741992376241226496aeed22ec43c],
PUP.Optional.BundleInstaller, C:\Users\Primael\AppData\Local\Temp\ED0C.tmp.exe, En quarantaine, [1dfe78625049a393c8a7164225db728e],
PUP.Optional.BundleInstaller, C:\Users\Primael\AppData\Local\Temp\7005.tmp.exe, En quarantaine, [0813f3e7722772c47ff0e2768c74946c],
PUP.Optional.BundleInstaller, C:\Users\Primael\AppData\Local\Temp\9FF7.tmp.exe, En quarantaine, [3ae1f8e2bbde2e088ce38ecab34d28d8],
PUP.Optional.AdOffer, C:\Users\Primael\AppData\Local\Temp\bitool.dll, En quarantaine, [1dfe1fbbedac3204dea977a7867c49b7],
PUP.Optional.Somoto, C:\Users\Primael\AppData\Local\Temp\nsfEED4.tmp, En quarantaine, [2cefc9111683ba7c326899ff9968d62a],
Adware.ClickShell, C:\Users\Primael\AppData\Local\Temp\01-3c6430cb-5f27-4767-a533-54c257d6425a\finalBundle, En quarantaine, [0b100fcb35641b1b9eea8bf3b64b7789],
PUP.Optional.PennyBee, C:\Users\Primael\AppData\Local\Temp\TO49ILCIQ\TO49ILCIQ.exe, En quarantaine, [6daeb02a603948eeb488ec866b96ec14],
PUP.Optional.Tuto4PC, C:\Users\Primael\AppData\Local\Temp\VK56UG2RXY\testversion.exe, En quarantaine, [5dbed109b9e0fe38ed08fadcfb06748c],
PUP.Optional.Goobzo, C:\Users\Primael\AppData\Local\Temp\nsd3B4F.tmp\jsdrv.exe, En quarantaine, [9f7c8a507c1d0a2cba18077b8b763cc4],
PUP.Optional.AdLoad, C:\Users\Primael\AppData\Local\Temp\WHTR9VAL2\WHTR9VAL2.exe, En quarantaine, [18036179bedbe650a82e12c417ea25db],
PUP.Optional.Tuto4PC, C:\Users\Primael\AppData\Local\Temp\QGRVPDTH6C\testversion.exe, En quarantaine, [9c7f9347a6f3e94deb0aa72f738eb34d],
PUP.Optional.Tuto4PC, C:\Users\Primael\AppData\Local\Temp\QZHGMZO0BC\testversion.exe, En quarantaine, [bb60c2181980ee48af2a785ee021ab55],
PUP.Optional.WizzCaster, C:\Users\Primael\AppData\Local\Temp\QZHGMZO0BC\win.exe, En quarantaine, [9c7f0fcbd4c5d5617fc591dd63a15aa6],
PUP.Optional.EoRezo.Generic, C:\Users\Primael\AppData\Local\Temp\R2HFZ01W7\R2HFZ01W7.exe, En quarantaine, [b26934a67c1d1d198d390bb43ac7946c],
PUP.Optional.SearchProtect, C:\Users\Primael\AppData\Local\Temp\RCBWMK4GB\RCBWMK4GB.exe, En quarantaine, [42d97a60acedb5813bb1219141c04eb2],
PUP.Optional.Goobzo, C:\Users\Primael\AppData\Local\Temp\Install_18781\ins_shopperpro3.exe, En quarantaine, [23f874668c0dce68a62ce1a13ac79f61],
PUP.Optional.Boxore, C:\Users\Primael\AppData\Local\Temp\INZJ86JXP\INZJ86JXP.exe, En quarantaine, [30eb15c51782bb7b8d97a9a3a35f50b0],
PUP.Optional.Tuto4PC, C:\Users\Primael\AppData\Local\Temp\is-QA0N5.tmp\combroadcaster-recover.exe, En quarantaine, [3dde4e8c7c1dd3639f19ddd9ea17b749],
PUP.Optional.Conduit, C:\Users\Primael\AppData\Local\Temp\f9626892-7a78-3199-abd2-97bbce96297b\Extracted\adv_114.exe, En quarantaine, [eb3095457f1a34026305fa2ba160da26],
PUP.Optional.Tuto4PC, C:\Users\Primael\AppData\Local\Temp\7CDWN4B3T\7CDWN4B3T.exe, En quarantaine, [e13a7e5c2673f04642b320b6b150ac54],
PUP.Optional.SystemHealer, C:\Users\Primael\AppData\Local\Temp\5BK6UD6RA\5BK6UD6RA.exe, En quarantaine, [1ffcbc1eb0e9bb7b2ee599c4c53cc43c],
PUP.Optional.Amonetize, C:\Users\Primael\AppData\Local\Temp\ZW07721MB\Bundle_NationZoom.exe, En quarantaine, [57c489511a7f191dc451220a9e6343bd],
Trojan.Downloader, C:\Windows\Temp\19597\RiliDlr.exe, En quarantaine, [ec2fbc1ee3b63bfb69bc6275669b41bf],
Adware.PennyBee.WnskRST, C:\Windows\Temp\bobca\Pujhel.din, En quarantaine, [08138654d6c3b48295729d1154adbc44],
Trojan.Agent.E, C:\Users\Primael\AppData\Local\Temp\1.tmp.exe, En quarantaine, [d546cd0dc0d91b1b3934039ffb08f907],
Trojan.Agent.E, C:\Users\Primael\AppData\Local\Temp\2.tmp.exe, En quarantaine, [89923b9f7524f93d5b120c9624df5da3],
Trojan.Agent.E, C:\Users\Primael\AppData\Local\Temp\3.tmp.exe, En quarantaine, [1a014694029739fd0964f9a9d231916f],
Trojan.Agent.E, C:\Users\Primael\AppData\Local\Temp\4.tmp.exe, En quarantaine, [b566f8e284158aac531aacf6699a23dd],
Trojan.Agent.E, C:\Users\Primael\AppData\Local\Temp\5.tmp.exe, En quarantaine, [fd1e3c9eeaafc2746c015e44966d54ac],
Trojan.Agent.E, C:\Users\Primael\AppData\Local\Temp\6.tmp.exe, En quarantaine, [3fdcfddd4b4ee94df776564c48bbf10f],
Trojan.Agent.E, C:\Users\Primael\AppData\Local\Temp\7.tmp.exe, En quarantaine, [dc3f9b3f59402511e18cadf52cd707f9],
Trojan.Agent.E, C:\Users\Primael\AppData\Local\Temp\8.tmp.exe, En quarantaine, [eb30f7e3b5e49b9b5617643e8c7734cc],
Trojan.Agent.E, C:\Users\Primael\AppData\Local\Temp\9.tmp.exe, En quarantaine, [c25969715e3b81b528455d45c63d4ab6],
PUP.Optional.VBates, C:\Users\Primael\AppData\LocalLow\Company\Product\1.0\localStorageIE.txt, En quarantaine, [38e3845630692b0b2bdd6c3bbb4832ce],
PUP.Optional.VBates, C:\Users\Primael\AppData\LocalLow\Company\Product\1.0\131B3C50, En quarantaine, [38e3845630692b0b2bdd6c3bbb4832ce],
PUP.Optional.VBates, C:\Users\Primael\AppData\LocalLow\Company\Product\1.0\localStorageIE_backup.txt, En quarantaine, [38e3845630692b0b2bdd6c3bbb4832ce],
PUP.Optional.Boxore.WnskRST, C:\Users\Primael\AppData\Local\Temp\BoxoreServicer.log, En quarantaine, [cf4c8d4dc9d080b6feb0635be02328d8],
Trojan.FakeAlert, C:\Users\Primael\AppData\Local\Temp\QGRVPDTH6C\testversion.exe, En quarantaine, [fe1d5882f0a970c634a634977a89c23e],
Trojan.FakeAlert, C:\Users\Primael\AppData\Local\Temp\QZHGMZO0BC\testversion.exe, En quarantaine, [30ebae2cecad67cfa03aaa21dd26e719],
Trojan.FakeAlert, C:\Users\Primael\AppData\Local\Temp\VK56UG2RXY\testversion.exe, En quarantaine, [76a502d8f2a7b87e7c5ea922e12231cf],
PUP.Optional.Komodia, C:\Windows\Temp\zdengine.log, En quarantaine, [8f8c33a7c4d5f1454bbba32ec63d9868],
PUP.Optional.ProntSpooler, C:\Users\Primael\AppData\Local\Apps\2.0\abril.exe, En quarantaine, [3be0a634ebae41f573f77c5f7c87ee12],
PUP.Optional.ProntSpooler, C:\Users\Primael\AppData\Local\Apps\2.0\abril.InstallLog, En quarantaine, [e9328456c9d082b43a30eaf14eb522de],
PUP.Optional.ProntSpooler, C:\Users\Primael\AppData\Local\Apps\2.0\abril.InstallState, En quarantaine, [6fac05d52e6b7eb8fa70e6f5659e659b],
PUP.Optional.ProntSpooler, C:\Users\Primael\AppData\Local\Apps\2.0\abril.stt, En quarantaine, [a8730ccec9d053e363076d6ed52eae52],
PUP.Optional.BundleInstaller, C:\Users\Primael\AppData\Local\Temp\binsis142.xml, En quarantaine, [48d341994e4b81b5836e00dc42c1dd23],
PUP.Optional.BundleInstaller, C:\Users\Primael\AppData\Local\Temp\binsischeck654.xml, En quarantaine, [6ab120baebaed26408ea07d5937012ee],
PUP.Optional.GsearchFinder, C:\Users\Primael\AppData\Roaming\Profiles\yzzfdyu4.default\extensions\@E9438230-A7DF-4D1F-8F2D-CA1D0F0F7924.xpi, En quarantaine, [b06b2cae435688aebecfe6fa1ae91fe1],
PUP.Optional.Goobzo.Gen, C:\Program Files\Common Files\Noobzo\GNUpdate\smci32.dll, En quarantaine, [3fdc34a6bfdaa3933c08208c41c1bf41],
PUP.Optional.Goobzo.Gen, C:\Program Files\Common Files\Noobzo\GNUpdate\smci64.dll, En quarantaine, [3fdc34a6bfdaa3933c08208c41c1bf41],
PUP.Optional.Goobzo.Gen, C:\Program Files\Common Files\Noobzo\GNUpdate\smi32.exe, En quarantaine, [3fdc34a6bfdaa3933c08208c41c1bf41],
PUP.Optional.Goobzo.Gen, C:\Program Files\Common Files\Noobzo\GNUpdate\smi64.exe, En quarantaine, [3fdc34a6bfdaa3933c08208c41c1bf41],
PUP.Optional.Goobzo.Gen, C:\Program Files\Common Files\Noobzo\GNUpdate\smu.exe, En quarantaine, [3fdc34a6bfdaa3933c08208c41c1bf41],
PUP.Optional.Goobzo.Gen, C:\Program Files\Common Files\Noobzo\GNUpdate\SMUninstall.exe, En quarantaine, [3fdc34a6bfdaa3933c08208c41c1bf41],
PUP.Optional.Goobzo.Gen, C:\Program Files\Common Files\Noobzo\GNUpdate\smw.sys, En quarantaine, [3fdc34a6bfdaa3933c08208c41c1bf41],
PUM.Optional.FireFoxSearchOverride, C:\Users\Primael\AppData\Roaming\Mozilla\Firefox\Profiles\z3bj3rpo.default\user.js, En quarantaine, [0d0ef0ea7c1dfa3c39e389eb29db9070],
PUP.Optional.HijackHosts.Gen, C:\Windows\System32\vojm\use\lejh.dat, En quarantaine, [5cbf20ba9ffaa49240e4bab8907427d9],
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (107.178.247.130 connect.facebook.net), Remplacé,[c05bc614eeab66d056a34332dd275fa1]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (.facebook.net
107.178.255.88 www.go), Remplacé,[8d8e79616831cf677e7bcca9828235cb]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (107.178.248.130 static.doubleclick.net), Remplacé,[61ba57831c7db87e37c395e0e81c8779]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (.facebook.net
107.178.255.88 www.goog), Remplacé,[1605ca10970262d411e96b0a976dd729]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (107.178.255.88 www.google-analytics.com), Remplacé,[96850dcd59408aac51aa2253c93be11f]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (nalytics.com
107.178.255.88 www.s), Remplacé,[f72404d67d1ced49609b462f50b4ba46]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (gle-analytics.com
107.178.255), Remplacé,[e13a2ab0930668ce7982fc7980843bc5]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (.google-analytics.com
107.178.255.88 w), Remplacé,[b9627f5ba1f866d0f407ea8bdb29619f]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (nalytics.com
107.178.255.88 www.statcounte), Remplacé,[77a4bd1df0a92e08d724e095b351ab55]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (tics.com
107.178.255.88 www.statco), Remplacé,[f82363776831171f07f44431689cda26]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (er.com
107.178.255.88 ssl.google-analy), Remplacé,[cc4f05d53663c76fad4ea4d13acac739]

Secteurs physiques: 0
(Aucun élément malveillant détecté)


(end)

Publicité


Signaler le contenu de ce document

Publicité