Malwarebytes Anti-Malware www.malwarebytes.org Date de l'analyse: 31/01/2016 Heure de l'analyse: 00:09 Fichier journal: log_malwarebyte.txt Administrateur: Oui Version: 2.2.0.1024 Base de données de programmes malveillants: v2016.01.30.05 Base de données de rootkits: v2016.01.20.01 Licence: Gratuit Protection contre les programmes malveillants: Désactivé Protection contre les sites Web malveillants: Désactivé Autoprotection: Désactivé Système d'exploitation: Windows 8 Processeur: x64 Système de fichiers: NTFS Utilisateur: cyd Type d'analyse: Analyse des menaces Résultat: Terminé Objets analysés: 334644 Temps écoulé: 3 min, 56 s Mémoire: Activé Démarrage: Activé Système de fichiers: Activé Archives: Activé Rootkits: Désactivé Heuristique: Activé PUP: Activé PUM: Activé Processus: 1 Trojan.BitCoinMiner, C:\Users\cyd\AppData\Roaming\Microsoft\SystemCertificates\My\Updater\jusched.exe, 1776, Supprimer au redémarrage, [7c5179c6abeec4726326810d08fc0ff1] Modules: 1 Trojan.Miner, C:\Users\cyd\AppData\Roaming\Microsoft\SystemCertificates\My\Updater\libcurl-4.dll, Supprimer au redémarrage, [e7e6291643564ee80179b66522e09070], Clés du Registre: 0 (Aucun élément malveillant détecté) Valeurs du Registre: 1 Worm.Brontok.Gen, HKU\S-1-5-21-3360862168-1059523195-43112573-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|T1814166TT4, C:\Windows\system32\5165423741l.exe, En quarantaine, [e8e5102f702986b0534b0148f310dd23] Données du Registre: 0 (Aucun élément malveillant détecté) Dossiers: 0 (Aucun élément malveillant détecté) Fichiers: 153 Trojan.BitCoinMiner, C:\Users\cyd\AppData\Roaming\Microsoft\SystemCertificates\My\Updater\jusched.exe, Supprimer au redémarrage, [7c5179c6abeec4726326810d08fc0ff1], Trojan.Miner, C:\Users\cyd\AppData\Roaming\Microsoft\SystemCertificates\My\Updater\libcurl-4.dll, Supprimer au redémarrage, [e7e6291643564ee80179b66522e09070], Worm.AutoRun, C:\ProgramData\Blizzard Entertainment\Battle.net\Cache\Download\Norman virus Control 5.18 .exe, En quarantaine, [c10c0837b9e02a0c64a5c5c856aa35cb], Worm.AutoRun, C:\ProgramData\Blizzard Entertainment\Battle.net\Cache\Download\Blink 182 .exe, En quarantaine, [02cbaf904f4a91a546c3573638c8b24e], Worm.AutoRun, C:\ProgramData\Blizzard Entertainment\Battle.net\Cache\Download\Data DosenKu .exe, En quarantaine, [ab220d32376237ff7a8fcbc2ef1152ae], Worm.AutoRun, C:\ProgramData\Blizzard Entertainment\Battle.net\Cache\Download\Gallery .scr, En quarantaine, [428b251a34655fd76a9fb5d80bf56997], Worm.AutoRun, C:\ProgramData\Blizzard Entertainment\Battle.net\Cache\Download\Lagu - Server .scr, En quarantaine, [d8f53c037a1fb1851feab5d87b85f010], Worm.AutoRun, C:\ProgramData\Blizzard Entertainment\Battle.net\Cache\Download\Love Song .scr, En quarantaine, [af1e6cd32970e5511feaa2eb2bd5a060], Worm.AutoRun, C:\ProgramData\Blizzard Entertainment\Battle.net\Cache\Download\New mp3 BaraT !! .exe, En quarantaine, [7d50a7983168df57b752e5a8758bd42c], Worm.AutoRun, C:\ProgramData\Blizzard Entertainment\Battle.net\Cache\Download\RaHasIA .exe, En quarantaine, [8c41e05fb8e1b18567a26924926edf21], Worm.AutoRun, C:\ProgramData\Blizzard Entertainment\Battle.net\Cache\Download\THe Best Ungu .scr, En quarantaine, [aa23a19ef5a47fb710f9b8d554acd42c], Worm.AutoRun, C:\ProgramData\Blizzard Entertainment\Battle.net\Cache\Download\Titip Folder Jangan DiHapus .exe, En quarantaine, [04c94ef18613290de7226b229967c63a], Worm.AutoRun, C:\ProgramData\Blizzard Entertainment\Battle.net\Cache\Download\TutoriaL HAcking .exe, En quarantaine, [14b985ba1a7fe353d237fb9257a9857b], Worm.AutoRun, C:\ProgramData\Blizzard Entertainment\Battle.net\Cache\Download\Windows Vista setup .scr, En quarantaine, [27a61827722745f1f514147927d90bf5], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\Blink 182 .exe, En quarantaine, [9e2f99a65f3acf677198bfce0000ee12], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\Gallery .scr, En quarantaine, [8548fd4266333ff7d9300a837c849e62], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\Lagu - Server .scr, En quarantaine, [efde1827f5a486b08089deaf3bc52ad6], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\Love Song .scr, En quarantaine, [02cb56e99207340212f71a73f60a3fc1], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\New mp3 BaraT !! .exe, En quarantaine, [01cc94ab3267dd5914f5f895f709f30d], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\Norman virus Control 5.18 .exe, En quarantaine, [4786b689aeeb89ad47c234595ea2a759], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\RaHasIA .exe, En quarantaine, [e1ecc778b8e1a88eee1b008d97699c64], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\Windows Vista setup .scr, En quarantaine, [5875231c3465c37393767b12dd23f907], Trojan.Agent.CH, C:\Users\cyd\AppData\Roaming\Microsoft\SystemCertificates\My\Updater\SearchIndexer.exe, En quarantaine, [4489da656c2d79bdbcffdfb9b84c4fb1], Trojan.BitCoinMiner, C:\Users\cyd\AppData\Roaming\Microsoft\SystemCertificates\My\Updater\svchost.exe, En quarantaine, [e8e5330c9207c373459baeef6b95847c], Trojan.Agent.CH, C:\Users\cyd\AppData\Roaming\Microsoft\SystemCertificates\My\Updater\updater.exe, En quarantaine, [6d60201fecad3df9ad0e9afe9b69ed13], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\IEDownloadHistory\Blink 182 .exe, En quarantaine, [e8e5bf804554e254ab5e177667997f81], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\IEDownloadHistory\Data DosenKu .exe, En quarantaine, [c20b77c87b1e57df0504aae3e91728d8], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\IEDownloadHistory\Gallery .scr, En quarantaine, [11bcbe81dabf0036f514ff8e1be5916f], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\IEDownloadHistory\Lagu - Server .scr, En quarantaine, [b5184ff0346540f608016b22976957a9], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\IEDownloadHistory\Love Song .scr, En quarantaine, [85484af5cbce7fb77d8cf994af51e020], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\IEDownloadHistory\Norman virus Control 5.18 .exe, En quarantaine, [be0f231c86132214de2b7b1221df837d], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\IEDownloadHistory\THe Best Ungu .scr, En quarantaine, [ae1f4cf329706ccafa0fc1cc689856aa], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\IEDownloadHistory\Titip Folder Jangan DiHapus .exe, En quarantaine, [29a48fb07227989e8386d5b82dd37888], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O06060Z\service.exe, En quarantaine, [b21b6bd43c5d92a40207f59889778c74], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O06060Z\TuxO06060Z.exe, En quarantaine, [0ebf340be9b0e155f7129af3b14f08f8], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O06060Z\winlogon.exe, En quarantaine, [8e3f77c8c6d33bfb16f36d20956b2ed2], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O07170Z\service.exe, En quarantaine, [8f3e93ac158452e4e920dcb12fd122de], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O07170Z\TuxO07170Z.exe, En quarantaine, [02cb89b6b4e5da5cec1d008d34cc1be5], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O07170Z\winlogon.exe, En quarantaine, [319cac93c8d1d5617c8d840959a752ae], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O07171Z\service.exe, En quarantaine, [fbd287b81f7a82b460a97e0fb24e8e72], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O07171Z\TuxO07171Z.exe, En quarantaine, [913c9ca38b0e54e2898075184fb11ee2], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O07171Z\winlogon.exe, En quarantaine, [cd00310e53467abcc247d9b4c53bf907], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O17281Z\service.exe, En quarantaine, [6e5f52ed95047fb713f60e7f936dde22], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O17281Z\TuxO17281Z.exe, En quarantaine, [5f6ec57a78214aecc34617765ba58080], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O17281Z\winlogon.exe, En quarantaine, [309d76c9a9f0e94d9a6faedf04fc11ef], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O18281Z\service.exe, En quarantaine, [64695ae591080d2939d0523b6c94b34d], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O18281Z\TuxO18281Z.exe, En quarantaine, [329b5fe09702082e1beea0edac546e92], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O18281Z\winlogon.exe, En quarantaine, [d0fd70cfabee360057b24a437b85936d], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O20302Z\service.exe, En quarantaine, [18b5f04f9405d561bd4c2a63817f3ec2], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O20302Z\TuxO20302Z.exe, En quarantaine, [0fbeb689356438fe71988effd9278c74], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O20302Z\winlogon.exe, En quarantaine, [a9244bf496036cca40c9c7c6fa063ac6], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe, En quarantaine, [b01d64db2c6da19552b77a1331cf0ef2], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\TuxO20303Z.exe, En quarantaine, [8845d46b7e1b0f2747c24845bf4125db], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\winlogon.exe, En quarantaine, [5d70ba859dfcf244ad5c820bc13fda26], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O28282Z\service.exe, En quarantaine, [75583d025a3f3ef811f81d70d62a40c0], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O28282Z\TuxO28282Z.exe, En quarantaine, [735a2916a2f7e05619f0ace138c828d8], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O28282Z\winlogon.exe, En quarantaine, [0ac348f70792c76f0efb1d705ca428d8], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O28302Z\service.exe, En quarantaine, [5875c57ac9d0c571be4b127be21e28d8], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O28302Z\TuxO28302Z.exe, En quarantaine, [9538ac9306938da9b5547b12e41c13ed], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O28302Z\winlogon.exe, En quarantaine, [10bd2718a2f7dd59bb4e7419d12f39c7], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O31413Z\service.exe, En quarantaine, [94394bf4f1a80630c940afde48b8f010], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O31413Z\TuxO31413Z.exe, En quarantaine, [725b94ab0396ec4a57b25a33d22eed13], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O31413Z\winlogon.exe, En quarantaine, [d3fa78c74257ea4c1cedb3dae61a31cf], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O41414Z\service.exe, En quarantaine, [b31ae956990082b410f9e9a4857b639d], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O41414Z\TuxO41414Z.exe, En quarantaine, [913c75ca4059072fa465880509f78a76], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O41414Z\winlogon.exe, En quarantaine, [399495aa1a7f73c3ce3b3f4e0ff1bb45], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O42524Z\service.exe, En quarantaine, [2da0ca7544554fe7dc2d741953ada957], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O42524Z\TuxO42524Z.exe, En quarantaine, [4984f44bcbceeb4b34d5612c1ae643bd], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O42524Z\winlogon.exe, En quarantaine, [12bbed527425a591ba4f335ac23e857b], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O42525Z\service.exe, En quarantaine, [76577dc2c0d9dd595cad6429e11f08f8], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O42525Z\TuxO42525Z.exe, En quarantaine, [329b1d22811869cd97727716847ca060], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O42525Z\winlogon.exe, En quarantaine, [a22b6bd49504be78d831028b28d8b947], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O52525Z\service.exe, En quarantaine, [804d192680192214a069a9e429d7a858], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O52525Z\TuxO52525Z.exe, En quarantaine, [01cc46f987125cdab950820b46ba25db], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O52525Z\winlogon.exe, En quarantaine, [5479fd4225740f27907967267888c43c], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O53635Z\service.exe, En quarantaine, [d4f98db244553bfb87820885c7392dd3], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O53635Z\TuxO53635Z.exe, En quarantaine, [ede0a49b4554d561f217f59831cf4cb4], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O53635Z\winlogon.exe, En quarantaine, [7e4fd26dcfca989edb2e4e3fb64a7d83], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O53636Z\service.exe, En quarantaine, [9934a09f6f2a2d09c3461b7205fbea16], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O53636Z\TuxO53636Z.exe, En quarantaine, [1bb283bc247575c151b8117c0ef2ca36], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O53636Z\winlogon.exe, En quarantaine, [f6d798a71c7d41f53bce3a534eb29a66], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O64746Z\service.exe, En quarantaine, [67661b241584ef472edbb9d41ae6f60a], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O64746Z\TuxO64746Z.exe, En quarantaine, [b01dd06fa0f9e650b059bfce10f033cd], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O64746Z\winlogon.exe, En quarantaine, [e4e928173b5ebf7727e2d9b42ad63bc5], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O74747Z\TuxO74747Z.exe, En quarantaine, [1eafec532574d660c0495736718f46ba], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O75857Z\service.exe, En quarantaine, [3c9178c7d6c3f442b653d0bd35cba957], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O75857Z\TuxO75857Z.exe, En quarantaine, [eedf132c44558bab20e9c8c5ef11bf41], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O75857Z\winlogon.exe, En quarantaine, [d2fbbe816435181e0207e8a5a060738d], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O85068Z\TuxO85068Z.exe, En quarantaine, [ad209ca33e5b57dfc445d3ba50b0c63a], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O85858Z\service.exe, En quarantaine, [8e3feb540891fa3c4fba058847b903fd], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O85858Z\TuxO85858Z.exe, En quarantaine, [01cc013e603940f627e2583560a023dd], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O85858Z\winlogon.exe, En quarantaine, [74594bf4b6e32e0837d27e0f59a7827e], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O86060Z\service.exe, En quarantaine, [8b4240ff2f6a43f3dc2d93fa0cf410f0], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O86060Z\TuxO86060Z.exe, En quarantaine, [2da0320d4c4da096cc3d1d70ce320bf5], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O86060Z\winlogon.exe, En quarantaine, [686564db5643fa3c2bded9b45da38a76], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O86068Z\service.exe, En quarantaine, [5d7047f8a9f0a4928a7f315c09f7d927], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O86068Z\TuxO86068Z.exe, En quarantaine, [8d405be4bfda69cd9a6fb1dc768a5ba5], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Microsoft\Windows\Templates\O86068Z\winlogon.exe, En quarantaine, [4e7fc778e3b65dd9f71239543fc1857b], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Skype\shared_dynco\Love Song .scr, En quarantaine, [be0f1a2513862b0bc742008d56aaec14], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Skype\shared_dynco\Blink 182 .exe, En quarantaine, [b11cc8770e8b76c05faa5439926e44bc], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Skype\shared_dynco\Gallery .scr, En quarantaine, [bd10e25d841560d6b356830ab14f9f61], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Skype\shared_dynco\Lagu - Server .scr, En quarantaine, [5a73d16ee1b8af874abf6528f40ce61a], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Skype\shared_dynco\New mp3 BaraT !! .exe, En quarantaine, [d6f7ba85b0e93600b3565c31f30d9967], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Skype\shared_dynco\Norman virus Control 5.18 .exe, En quarantaine, [28a5211e8514033390791776b44c6b95], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Skype\shared_dynco\RaHasIA .exe, En quarantaine, [efde50ef277230061eeba9e46f91a858], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Skype\shared_dynco\THe Best Ungu .scr, En quarantaine, [1faeaf90831659dd9a6f1974f50b1be5], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Skype\shared_dynco\TutoriaL HAcking .exe, En quarantaine, [4e7f8cb31386ad8993768ffe8f714cb4], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Skype\shared_httpfe\Gallery .scr, En quarantaine, [3d9043fc7e1be45250b9721bc739d828], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Skype\shared_httpfe\Lagu - Server .scr, En quarantaine, [18b5a09f2d6c76c0fc0de5a8d52b03fd], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Skype\shared_httpfe\Love Song .scr, En quarantaine, [3499e857b8e1ea4c3ecb5d3012ee41bf], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Skype\shared_httpfe\New mp3 BaraT !! .exe, En quarantaine, [339ae05f148510266c9d5c3107f9a957], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Skype\shared_httpfe\RaHasIA .exe, En quarantaine, [29a4b38c66339e98df2acfbe9c6438c8], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Skype\shared_httpfe\Titip Folder Jangan DiHapus .exe, En quarantaine, [87464af53b5edc5a1dec75189769936d], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Skype\shared_httpfe\TutoriaL HAcking .exe, En quarantaine, [03ca3b04138648eee7224548e41cee12], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\Skype\shared_httpfe\Windows Vista setup .scr, En quarantaine, [7c51e659adec52e41bee6e1ff10f9f61], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\uTorrent\share\Blink 182 .exe, En quarantaine, [ba1372cdd5c495a115f479142ed26f91], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\uTorrent\share\Data DosenKu .exe, En quarantaine, [14b9013e8e0bf3435aaf2964966a4cb4], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\uTorrent\share\Gallery .scr, En quarantaine, [21aca699f7a22c0a8881c3cac8382ad6], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\uTorrent\share\Lagu - Server .scr, En quarantaine, [c904053a7c1da29466a305889e6231cf], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\uTorrent\share\Love Song .scr, En quarantaine, [e4e940ff0990f04611f85f2e29d78c74], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\uTorrent\share\New mp3 BaraT !! .exe, En quarantaine, [804d340b227764d207028d00a55bd927], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\uTorrent\share\THe Best Ungu .scr, En quarantaine, [e9e4a8972871e551a0690489aa56867a], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\uTorrent\share\TutoriaL HAcking .exe, En quarantaine, [715c5ce3188132045faab6d7f70907f9], Worm.AutoRun, C:\Users\cyd\AppData\Roaming\uTorrent\share\Windows Vista setup .scr, En quarantaine, [c30a2817b9e0c2747a8f1f6ebc4432ce], PUP.Optional.Somoto, C:\Users\cyd\AppData\Local\Temp\bitool.dll, En quarantaine, [fdd0df602f6a6accff4173a7ec166a96], PUP.Optional.Somoto, C:\Users\cyd\AppData\Local\Temp\nscFB62.tmp, En quarantaine, [606d8db27c1d5bdb70022dc47c887c84], PUP.Optional.OpenCandy, C:\Users\cyd\Downloads\daemon-tools-lite_4-49-1_fr_10729.exe, En quarantaine, [47860a35abeef73f9d6f548fb450ea16], Worm.AutoRun, C:\Users\cyd\Downloads\Data DosenKu .exe, En quarantaine, [17b685ba3663c86e64a5226bda26ac54], Worm.AutoRun, C:\Users\cyd\Downloads\RaHasIA .exe, En quarantaine, [705d0d32dcbd340261a8becfa65ad12f], Worm.AutoRun, C:\Users\cyd\Downloads\Love Song .scr, En quarantaine, [dbf2a59af2a7d66007022f5e768a1ee2], PUP.Optional.OpenCandy, C:\Users\cyd\Downloads\gom-media-player_2-2-62-5209_fr_21309.EXE, En quarantaine, [b419bd8274259d996ba100e34db7b64a], Worm.AutoRun, C:\Users\cyd\Downloads\Titip Folder Jangan DiHapus .exe, En quarantaine, [fcd151eef9a0e650d3368b02a060ca36], Worm.AutoRun, C:\Users\cyd\Downloads\THe Best Ungu .scr, En quarantaine, [c5083c033a5fa294ae5b8eff09f7e917], Worm.AutoRun, C:\Users\cyd\Downloads\TutoriaL HAcking .exe, En quarantaine, [10bdf34c50497bbb41c87d10d42c35cb], Worm.AutoRun, C:\Users\cyd\Downloads\Windows Vista setup .scr, En quarantaine, [deef122dcecbde58a267e3aaae52e51b], Worm.AutoRun, C:\Users\cyd\Downloads\Blink 182 .exe, En quarantaine, [725b87b824752d0979906b22b44ccc34], Worm.AutoRun, C:\Users\Public\Downloads\Blink 182 .exe, En quarantaine, [efde48f77f1ac5714fba90fd1be523dd], Worm.AutoRun, C:\Users\Public\Downloads\Gallery .scr, En quarantaine, [b01d2e112772e6508c7db5d829d7ab55], Worm.AutoRun, C:\Users\Public\Downloads\Lagu - Server .scr, En quarantaine, [874677c8c1d88da97b8e3a53bc4452ae], Worm.AutoRun, C:\Users\Public\Downloads\Love Song .scr, En quarantaine, [6964e956d5c492a496730a8321df916f], Worm.AutoRun, C:\Users\Public\Downloads\New mp3 BaraT !! .exe, En quarantaine, [cc0175ca5643e65080891a738e7228d8], Worm.AutoRun, C:\Users\Public\Downloads\Norman virus Control 5.18 .exe, En quarantaine, [4588aa955e3bc76f7e8be3aa669ab848], Worm.AutoRun, C:\Users\Public\Downloads\Titip Folder Jangan DiHapus .exe, En quarantaine, [c00dfd425b3eba7c0bfedab356aa2bd5], Worm.AutoRun, C:\Users\Public\Downloads\TutoriaL HAcking .exe, En quarantaine, [913c38078910c67035d4e1ac5fa12cd4], Worm.AutoRun, C:\Users\Public\Downloads\Windows Vista setup .scr, En quarantaine, [557893ac5940023425e4fa93be421ae6], Worm.AutoRun, C:\Users\cyd\AppData\Local\Downloaded Installations\Gallery .scr, En quarantaine, [6a63c37c8a0fca6ce6234d40b84832ce], Worm.AutoRun, C:\Users\cyd\AppData\Local\Downloaded Installations\Love Song .scr, En quarantaine, [57760837cecb44f2c8411f6e936db34d], Worm.AutoRun, C:\Users\cyd\AppData\Local\Downloaded Installations\Norman virus Control 5.18 .exe, En quarantaine, [e0edda65d8c11b1b7e8bee9f26da1ee2], Worm.AutoRun, C:\Users\cyd\AppData\Local\Downloaded Installations\RaHasIA .exe, En quarantaine, [17b64bf4d2c7ec4a52b76528f010867a], Worm.AutoRun, C:\Users\cyd\AppData\Local\Downloaded Installations\THe Best Ungu .scr, En quarantaine, [cd00e45bebaedd596a9f7f0e1fe16a96], Worm.AutoRun, C:\Users\cyd\AppData\Local\Downloaded Installations\Titip Folder Jangan DiHapus .exe, En quarantaine, [dcf1de613a5f3afcfb0e4c416f912bd5], Worm.AutoRun, C:\Users\cyd\AppData\Local\Downloaded Installations\TutoriaL HAcking .exe, En quarantaine, [01ccd768b4e580b68b7e0a83dc249868], Worm.AutoRun, C:\Users\cyd\AppData\Local\Downloaded Installations\Windows Vista setup .scr, En quarantaine, [07c60f3079202f0760a9e2ab7f81837d], Secteurs physiques: 0 (Aucun élément malveillant détecté) (end)