cjoint

Publicité

Priorité au Logiciel Libre! Je soutiens l'April.

Publicité

Priorité au Logiciel Libre! Je soutiens l'April.

Format du document : text/plain

Prévisualisation

Script ZHPFix
[MD5.1D283DD3AE2312EEE624E8B8C46F6ADB] - (...) -- c:\programdata\quickset\sk.enhancer\SK.Enhancer.exe [729600] [PID.2060] =>Adware.SurfAndKeep
B0 - SPO: operaprefs.ini [Bouziane] Home URL=http://www.yandex.ru/?win=107&clid=2060561
B1 - OSP: search.ini [Bouziane] URL=http://yandex.ru/yandsearch?win=107&clid=2060562&text=%s
G2 - GCE: Preference [User Data\Default] [acfoobbgoakpihljnfedbcfaipcdlfhk] Buenosearch Toolbar v.1.6.3 (D�sactiv�) =>PUP.BuenoSearch
G2 - GCE: Preference [User Data\Default] [akjbfncbadcmnkopckegnmjgihagponf] HD for YouTube v.1.1 (Activ�)
G2 - GCE: Preference [User Data\Default] [bijcilgmpgmllbihfhofoobmbjbbkenl] CS Portable v.1.3 (Activ�)
G2 - GCE: Preference [User Data\Default] [jljheddigenhleadfofeccneimcmlefp] Speed Test 127 v.3.0.0.0 (D�sactiv�)
G2 - GCE: Preference [User Data\Default] [kfgpjgdjakbijoinbmgphglalgldhhok] Cliff Diving 3D v.1.3 (Activ�)
G2 - GCE: Preference [User Data\Default] [loaciifbegkjbeddmolhfdmpmicbkadm] 3D Action Games v.1.2 (Activ�)
G2 - GCE: Preference [User Data\Default] [nplcackcabdefgfcombapmcdgoogkmmo] Aller moutons! v.1.0 (Activ�)
G2 - GCE: Preference [User Data\Default] [okehlnjpihomkdokiiafpejniofjaoom] Destroyer bombe 3D v.1.0.6 (Activ�)
G2 - GCE: Preference [User Data\Default] [onhpbpcgnoglkojnigjlpjcblljfkakc] Where's My Water? v.1.0.2 (Activ�)
G2 - GCE: Preference [User Data\Default] [paoponfhfdfnjgddpnpjkambkcgdaaib] uTorrentBar_FR v.10.22.3.518, (D�sactiv�) =>P2P.�Torrent
M3 - MFPP: Plugins - [Bouziane] -- C:\Users\Bouziane\AppData\Roaming\Mozilla\Firefox\Profiles\nahd6ha2.default\searchplugins\yandex.ru-193829.xml
R0 - HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Main,Start Page = http://websearch.searchguru.info
O2 - BHO: ExstraeSavings [64Bits] - {72F003B6-A8CB-ECD0-D9E0-C4D9364FDDAD} . (...) -- C:\ProgramData\ExstraeSavings\7AbuAvpg.dll
O2 - BHO: (no name) [64Bits] - {D5FEC983-01DB-414a-9456-AF95AC9ED7B5} Orphan key
O3 - Toolbar\WebBrowser: (no name) - [HKCU]{32099AAC-C132-4136-9E9A-4E364A424E17} Orphan key
O4 - GS\QuickLaunch [Bouziane]: SafeIP.lnk . (...) -- C:\Program Files (x86)\SafeIP\SafeIP.exe (.not file.)
O4 - GS\Desktop [Bouziane]: Zuma's Revenge!.lnk . (.PopCap Games, Inc. - Zuma's Revenge!.) -- C:\Program Files (x86)\Zuma's Revenge!\ZumasRevenge.exe =>Adware.PopCap
O4 - HKCU\..\Run: [NextLive] . (.NewNextDotMe - NewNext Helper Engine.) -- C:\Users\Bouziane\AppData\Roaming\newnext.me\nengine.dll =>PUP.NextLive
O4 - HKCU\..\Run: [Viber] . (.No owner - Viber.) -- C:\Users\Bouziane\AppData\Local\Viber\Viber.exe
O4 - HKUS\S-1-5-21-1754156593-2969352025-564603777-1000\..\Run: [NextLive] . (.NewNextDotMe - NewNext Helper Engine.) -- C:\Users\Bouziane\AppData\Roaming\newnext.me\nengine.dll =>PUP.NextLive
O4 - HKUS\S-1-5-21-1754156593-2969352025-564603777-1000\..\Run: [Viber] . (.No owner - Viber.) -- C:\Users\Bouziane\AppData\Local\Viber\Viber.exe
O9 - Extra button: Notes &li�es OneNote [64Bits] - {789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} -- Orphan key
O9 - Extra button: Skype Click to Call [64Bits] - {898EA8C8-E7FF-479B-8935-AEC46303B9E5} . (...) -- c:\program files (x86)\skype\toolbars\internet explorer x64\icon.ico
O39 - APT:Automatic Planified Task - C:\Windows\Tasks\SK.Enhancer-S-161304646.job [454] =>Adware.SurfAndKeep
[MD5.1D283DD3AE2312EEE624E8B8C46F6ADB] [APT] [SK.Enhancer-S-161304646] (...) -- c:\programdata\quickset\sk.enhancer\SK.Enhancer.exe [729600] =>Adware.SurfAndKeep
O42 - Logiciel: SK.Enhancer - (...) [HKLM][64Bits] -- S-161304646 =>Adware.SurfAndKeep
[HKCU\Software\Conduit] =>Toolbar.Conduit
[HKCU\Software\Tencent] =>Adware.TencentAddressBar
[HKCU\Software\iLivid] =>Adware.Bandoo
[HKLM\Software\Wow6432Node\Conduit] =>Toolbar.Conduit
[HKLM\Software\Wow6432Node\SK.Enhancer] =>Adware.SurfAndKeep
[HKLM\Software\Wow6432Node\SP Global] =>PUP.AdvancedSystemProtector
[HKLM\Software\Wow6432Node\SProtector] =>PUP.Mocaflix
[HKLM\Software\Wow6432Node\Tencent] =>Adware.TencentAddressBar
O43 - CFD: 13/01/2014 - 19:24:33 - [0] ----D C:\Program Files (x86)\Babylon =>PUP.Babylon
O43 - CFD: 09/12/2013 - 14:42:25 - [0,892] ----D C:\Program Files (x86)\Conduit
O43 - CFD: 13/01/2014 - 20:31:01 - [0,015] ----D C:\Program Files (x86)\MyPC Backup =>PUP.MyPCBackup
O43 - CFD: 13/01/2014 - 23:05:34 - [0] ----D C:\ProgramData\BitGuard =>PUP.BitGuard
O43 - CFD: 13/01/2014 - 23:05:34 - [0] ----D C:\ProgramData\BrowserProtect =>Hijacker.Eazel
O43 - CFD: 09/12/2013 - 14:41:50 - [1,637] ----D C:\ProgramData\Conduit
O43 - CFD: 13/01/2014 - 22:05:27 - [0] ----D C:\ProgramData\Datamngr =>PUP.Datamngr
O43 - CFD: 07/12/2013 - 17:39:26 - [2,239] ----D C:\ProgramData\InstallMate =>PUP.Tarma
O43 - CFD: 08/12/2013 - 12:47:50 - [0] ----D C:\ProgramData\SearchNewTab =>Adware.FastSaveApp
O43 - CFD: 08/12/2013 - 12:47:50 - [0] ----D C:\ProgramData\YoutubeAdblocker =>PUP.Multiplug
O43 - CFD: 14/01/2014 - 14:08:53 - [1,228] ----D C:\Users\Bouziane\AppData\Roaming\newnext.me =>PUP.NextLive
O43 - CFD: 13/01/2014 - 19:53:29 - [9,955] ----D C:\Users\Bouziane\AppData\Local\Yandex
O43 - CFD: 13/01/2014 - 22:38:39 - [0] ----D C:\Users\Bouziane\AppData\Roaming\Tencent =>Adware.TencentAddressBar
O51 - MPSK:{927e4ec9-68e7-11e3-b178-001cc490f3bf}\AutoRun\command. (...) -- H:\Startme.exe (.not file.)
O69 - SBI: SearchScopes [HKCU] 16035F1B52E147A8A82F3A69399F5209 - (DAEMON Search) - http://www.daemon-search.com
O69 - SBI: SearchScopes [HKCU] 53A1A66005AB160B14BB5CBF2A55324B [DefaultScope] - (Conduit Search) - http://search.conduit.com
O69 - SBI: SearchScopes [HKCU] {014DB5FA-EAFB-4592-A95B-F44D3EE87FA9} - (Yandex) - http://yandex.ru
O69 - SBI: SearchScopes [HKCU] {0BDCC370-E6D0-4648-B411-6E252725F56B} - (uTorrentBar_FR Customized Web Search) - http://search.conduit.com =>P2P.�Torrent
O69 - SBI: SearchScopes [HKCU] {0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9} - (Bueno Search) - http://www.buenosearch.com =>PUP.BuenoSearch
O69 - SBI: SearchScopes [HKCU] {9BB47C17-9C68-4BB3-B188-DD9AF0FD2406} - (Ask.com) - http://dts.search.ask.com
O69 - SBI: SearchScopes [HKCU] {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} - (WebSearch) - http://websearch.searchguru.info
[MD5.2F5252E50745E47DB355B005725DAE05] [SPRF][19/12/2013] (.Somoto Ltd. - AppsHat Mobile Apps.) -- C:\Users\Bouziane\AppData\Local\Temp\appshat-distribution.exe [327880] =>Adware.MegaSearch
[MD5.858D895AD40DE9779E78C39A116F9553] [SPRF][13/01/2014] (...) -- C:\Users\Bouziane\AppData\Local\Temp\BackupSetup.exe [10355400]
[MD5.D41D8CD98F00B204E9800998ECF8427E] [SPRF][01/01/1601] (...) -- C:\Users\Bouziane\AppData\Local\Temp\BundleSweetIMSetup.exe [9] =>PUP.SweetIM
[MD5.D41D8CD98F00B204E9800998ECF8427E] [SPRF][01/01/1601] (...) -- C:\Users\Bouziane\AppData\Local\Temp\Delta.exe [9]
[MD5.D41D8CD98F00B204E9800998ECF8427E] [SPRF][01/01/1601] (...) -- C:\Users\Bouziane\AppData\Local\Temp\DeltaTB.exe [9] =>Toolbar.DeltaSearch
[MD5.2DB37E59AEDE4276E45B3D1C383B6D0F] [SPRF][28/11/2013] (...) -- C:\Users\Bouziane\AppData\Local\Temp\DETemp384Gd78Sjke78Jks75.dat [14313748]
[MD5.B4F4F49CF51187C8D8C6771BE362653F] [SPRF][20/11/2012] (.Conduit - No Comment.) -- C:\Users\Bouziane\AppData\Local\Temp\dlLogic.exe [203704] =>Toolbar.Conduit
[MD5.3B32CAA07D672F8A2E0DF5CB3A873F45] [SPRF][22/06/2012] (...) -- C:\Users\Bouziane\AppData\Local\Temp\ESGScanner.sys [22704]
[MD5.48967067AAB17A4D17023FA42B1F7F4D] [SPRF][24/10/2013] (.Conduit Ltd. - Conduit Toolbar Verifier.) -- C:\Users\Bouziane\AppData\Local\Temp\GCVerifier.dll [287520] =>Toolbar.Conduit
[MD5.BF8FF3E27CF48D69ED558AD0980E5652] [SPRF][27/12/2013] (...) -- C:\Users\Bouziane\AppData\Local\Temp\install_helper.exe [903680]
[MD5.D41D8CD98F00B204E9800998ECF8427E] [SPRF][01/01/1601] (...) -- C:\Users\Bouziane\AppData\Local\Temp\MybabylonTB.exe [11] =>PUP.Babylon
[MD5.BCB0728F4B117855765CE8FE883B5E9B] [SPRF][06/01/2014] (...) -- C:\Users\Bouziane\AppData\Local\Temp\NOSEventMessages.dll [1536]
[MD5.C67BCF6441E378371F0D6EEFB7EF0861] [SPRF][01/01/2014] (.Conduit - SP Usage Sender.) -- C:\Users\Bouziane\AppData\Local\Temp\nsa8457.exe [167812] =>Toolbar.Conduit
[MD5.C67BCF6441E378371F0D6EEFB7EF0861] [SPRF][01/01/2014] (.Conduit - SP Usage Sender.) -- C:\Users\Bouziane\AppData\Local\Temp\nsaEAC5.exe [167812] =>Toolbar.Conduit
[MD5.C67BCF6441E378371F0D6EEFB7EF0861] [SPRF][01/01/2014] (.Conduit - SP Usage Sender.) -- C:\Users\Bouziane\AppData\Local\Temp\nsfB321.exe [167812] =>Toolbar.Conduit
[MD5.C67BCF6441E378371F0D6EEFB7EF0861] [SPRF][01/01/2014] (.Conduit - SP Usage Sender.) -- C:\Users\Bouziane\AppData\Local\Temp\nsfE567.exe [167812] =>Toolbar.Conduit
[MD5.C67BCF6441E378371F0D6EEFB7EF0861] [SPRF][01/01/2014] (.Conduit - SP Usage Sender.) -- C:\Users\Bouziane\AppData\Local\Temp\nsl7F67.exe [167812] =>Toolbar.Conduit
[MD5.883DFC791AAF1298FCFC2BCF5471BBFC] [SPRF][14/01/2014] (...) -- C:\Users\Bouziane\AppData\Local\Temp\SHSetup.exe [46777424] =>Crapware.SpyHunter
[MD5.9FB9D49C2DB7EDD1084AB765D619F5C6] [SPRF][02/01/2014] (.Conduit - Search Protect by conduit.) -- C:\Users\Bouziane\AppData\Local\Temp\spstub.exe [66368] =>Toolbar.Conduit
[MD5.975993043E355206A1FBA5A702044F0C] [SPRF][06/11/2013] (.Conduit Ltd. - Conduit Toolbar.) -- C:\Users\Bouziane\AppData\Local\Temp\tbuTor.dll [5178144] =>Toolbar.Conduit
[MD5.EF7D1863F4980AB0C8BDA142FEE67F92] [SPRF][19/12/2013] (.Somoto Ltd. - FilesFrog Update Checker.) -- C:\Users\Bouziane\AppData\Local\Temp\UpdateCheckerSetup.exe [200072] =>Adware.MegaSearch
[MD5.80181864032DDC1EBC475C79FCC8D77B] [SPRF][15/12/2013] (...) -- C:\Users\Bouziane\AppData\Local\Temp\utt19C9.tmp.bat [104]
[MD5.B7AAE01AE7F5F133B04DB19CAD634FCF] [SPRF][09/12/2013] (...) -- C:\Users\Bouziane\AppData\Local\Temp\utt1D26.tmp.exe [9720320]
[MD5.B7AAE01AE7F5F133B04DB19CAD634FCF] [SPRF][09/12/2013] (...) -- C:\Users\Bouziane\AppData\Local\Temp\utt5C37.tmp.exe [9720320]
[MD5.C82AB54C276A1734876D911EC622A7C2] [SPRF][09/12/2013] (...) -- C:\Users\Bouziane\AppData\Local\Temp\utt737A.tmp.bat [53]
[MD5.B7AAE01AE7F5F133B04DB19CAD634FCF] [SPRF][09/12/2013] (...) -- C:\Users\Bouziane\AppData\Local\Temp\utt9946.tmp.exe [9720320]
[MD5.86F98BA4F4DD2317F660E13F12708459] [SPRF][26/12/2013] (.No owner - custominstaller.) -- C:\Users\Bouziane\AppData\Local\Temp\verifier.exe [143448]
[MD5.D41D8CD98F00B204E9800998ECF8427E] [SPRF][01/01/1601] (...) -- C:\Users\Bouziane\AppData\Local\Temp\WSSetup.exe
O87 - FAEL: "TCP Query User{83F0C803-063A-4953-A24C-7457A7C2D080}C:\games\tom.clancys.splinter.cell.double.agent-kaos\scda-offline\system\splintercell4.exe" |In - Private - P6 - TRUE | .(...) -- C:\games\tom.clancys.splinter.cell.double.agent-kaos\scda-offline\system\splintercell4.exe (.not file.)
O87 - FAEL: "UDP Query User{ED663355-8EB5-409D-B3EA-B11709C368D0}C:\games\tom.clancys.splinter.cell.double.agent-kaos\scda-offline\system\splintercell4.exe" |In - Private - P17 - TRUE | .(...) -- C:\games\tom.clancys.splinter.cell.double.agent-kaos\scda-offline\system\splintercell4.exe (.not file.)


[HKLM\Software\Google\Chrome\Extensions\acfoobbgoakpihljnfedbcfaipcdlfhk] =>PUP.BuenoSearch^
[HKLM\Software\Google\Chrome\Extensions\paoponfhfdfnjgddpnpjkambkcgdaaib] =>P2P.�Torrent^
[HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\S-161304646] =>Adware.SurfAndKeep^
[HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0ecdf796-c2dc-4d79-a620-cce0c0a66cc9}] =>PUP.Babylon
[HKLM\Software\Wow6432Node\Classes\Interface\{79FB5FC8-44B9-4AF5-BADD-CCE547F953E5}] =>Toolbar.Ask
[HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2406}] =>Adware.Bandoo
[HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{AD22EBAF-0D18-4FC7-90CC-5EA0ABBE9EB8}] =>Toolbar.Agent
[HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{AFDBDDAA-5D3F-42EE-B79C-185A7020515B}] =>Toolbar.Conduit
[HKLM\Software\Classes\Interface\{BCFF5F55-6F44-11D2-86F8-00104B265ED5}] =>Spyware.Soft2PC
[HKLM\Software\Wow6432Node\Classes\Interface\{BCFF5F55-6F44-11D2-86F8-00104B265ED5}] =>Spyware.Soft2PC
[HKLM\Software\Wow6432Node\Google\Chrome\Extensions\paoponfhfdfnjgddpnpjkambkcgdaaib] =>Toolbar.Conduit
[HKLM\SYSTEM\CurrentControlSet\Services\SpyHunter 4 Service] =>Crapware.SpyHunter
[HKCU\Software\AppDataLow\Software\ConduitSearchScopes] =>Toolbar.Conduit
[HKCU\Software\ilivid] =>Adware.Bandoo
[HKCU\Software\AppDataLow\Software\PriceGong] =>Adware.PriceGong
[HKLM\Software\Wow6432Node\SP Global] =>PUP.AdvancedSystemProtector
[HKCU\Software\AppDataLow\SProtector] =>PUP.AdvancedSystemProtector
[HKLM\Software\Wow6432Node\SProtector] =>PUP.AdvancedSystemProtector
[HKLM\Software\Wow6432Node\Microsoft\Tracing\Babylon_RASAPI32] =>PUP.Babylon
[HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Zuma's Revenge!1.0] =>Adware.PopCap
[HKLM\Software\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}] =>Adware.Agent
[HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{C670DCAE-E392-AA32-6F42-143C7FC4BDFD}] =>Adware.Browse2Save
[HKLM\Software\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}] =>Adware.MagniPic
[HKLM\Software\Wow6432Node\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}] =>Adware.MagniPic
[HKLM\Software\Classes\CLSID\{947217BD-E967-400A-B14A-BA851A8EDCBB}] =>Toolbar.Conduit
[HKLM\Software\Classes\AppID\{6536801B-F50C-449B-9476-093DFD3789E3}] =>PUP.Babylon
[HKLM\Software\Wow6432Node\Classes\AppID\{6536801B-F50C-449B-9476-093DFD3789E3}] =>PUP.Babylon
[HKLM\Software\Classes\AppID\BabylonHelper.EXE] =>PUP.Babylon
[HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D5FEC983-01DB-414A-9456-AF95AC9ED7B5}] =>Toolbar.YandexFastDial
[HKLM\Software\Wow6432Node\Microsoft\Tracing\apnstub_RASAPI32] =>Toolbar.Ask
[HKLM\Software\Wow6432Node\Microsoft\Tracing\apnstub_RASMANCS] =>Toolbar.Ask
[HKLM\Software\Classes\Toolbar.CT2851639] =>Toolbar.Conduit
[HKLM\Software\Wow6432Node\Classes\Toolbar.CT2851639] =>Toolbar.Conduit
[HKLM\Software\Wow6432Node\Classes\CLSID\{3c471948-f874-49f5-b338-4f214a2ee0b1}] =>Toolbar.Conduit^
[HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]:NextLive =>PUP.NextLive^
[HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser]:{32099aac-c132-4136-9e9a-4e364a424e17} =>Toolbar.DaemonTools
C:\Users\Bouziane\AppData\Local\Google\Chrome\User Data\Default\Extensions\acfoobbgoakpihljnfedbcfaipcdlfhk =>PUP.BuenoSearch^
C:\Users\Bouziane\AppData\Local\Google\Chrome\User Data\Default\Extensions\paoponfhfdfnjgddpnpjkambkcgdaaib =>P2P.�Torrent^
C:\Program Files (x86)\Babylon =>PUP.Babylon^
C:\Program Files (x86)\MyPC Backup =>PUP.MyPCBackup^
C:\ProgramData\BitGuard =>PUP.BitGuard^
C:\ProgramData\BrowserProtect =>Hijacker.Eazel^
C:\ProgramData\Datamngr =>PUP.Datamngr^
C:\ProgramData\InstallMate =>PUP.Tarma^
C:\ProgramData\SearchNewTab =>Adware.FastSaveApp^
C:\ProgramData\YoutubeAdblocker =>PUP.Multiplug^
C:\Users\Bouziane\AppData\Roaming\newnext.me =>PUP.NextLive^
C:\Users\Bouziane\AppData\Roaming\Tencent =>Adware.TencentAddressBar^
C:\Users\Bouziane\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\SpyHunter =>Crapware.SpyHunter^
C:\Program Files (x86)\Zuma's Revenge! =>Adware.PopCap
C:\Program Files (x86)\Conduit =>Toolbar.Conduit
C:\ProgramData\Browser Manager =>PUP.Babylon
C:\ProgramData\Conduit =>Toolbar.Conduit
C:\Users\Bouziane\AppData\Local\Conduit =>Toolbar.Conduit
C:\Users\Bouziane\AppData\LocalLow\Conduit =>Toolbar.Conduit
C:\Users\Bouziane\AppData\LocalLow\PriceGong =>Adware.PriceGong
c:\programdata\quickset\sk.enhancer\SK.Enhancer.exe =>Adware.SurfAndKeep^
C:\Windows\Tasks\SK.Enhancer-S-161304646.job =>Adware.SurfAndKeep^
[HKCU\Software\Conduit] =>Toolbar.Conduit^
[HKCU\Software\Tencent] =>Adware.TencentAddressBar^
[HKCU\Software\iLivid] =>Adware.Bandoo^
[HKLM\Software\Wow6432Node\Conduit] =>Toolbar.Conduit^
[HKLM\Software\Wow6432Node\SK.Enhancer] =>Adware.SurfAndKeep^
[HKLM\Software\Wow6432Node\Tencent] =>Adware.TencentAddressBar^
C:\Users\Bouziane\AppData\Local\Temp\appshat-distribution.exe =>Adware.MegaSearch^
C:\Users\Bouziane\AppData\Local\Temp\BundleSweetIMSetup.exe =>PUP.SweetIM^
C:\Users\Bouziane\AppData\Local\Temp\DeltaTB.exe =>Toolbar.DeltaSearch^
C:\Users\Bouziane\AppData\Local\Temp\dlLogic.exe =>Toolbar.Conduit^
C:\Users\Bouziane\AppData\Local\Temp\GCVerifier.dll =>Toolbar.Conduit^
C:\Users\Bouziane\AppData\Local\Temp\MybabylonTB.exe =>PUP.Babylon^
C:\Users\Bouziane\AppData\Local\Temp\nsa8457.exe =>Toolbar.Conduit^
C:\Users\Bouziane\AppData\Local\Temp\nsaEAC5.exe =>Toolbar.Conduit^
C:\Users\Bouziane\AppData\Local\Temp\nsfB321.exe =>Toolbar.Conduit^
C:\Users\Bouziane\AppData\Local\Temp\nsfE567.exe =>Toolbar.Conduit^
C:\Users\Bouziane\AppData\Local\Temp\nsl7F67.exe =>Toolbar.Conduit^
C:\Users\Bouziane\AppData\Local\Temp\SHSetup.exe =>Crapware.SpyHunter^
C:\Users\Bouziane\AppData\Local\Temp\spstub.exe =>Toolbar.Conduit^
C:\Users\Bouziane\AppData\Local\Temp\tbuTor.dll =>Toolbar.Conduit^
C:\Users\Bouziane\AppData\Local\Temp\UpdateCheckerSetup.exe =>Adware.MegaSearch^
C:\Users\Bouziane\Desktop\SpyHunter.lnk =>Crapware.SpyHunter
EmptyCLSID
ShortcutFix
FirewallRaz
EmptyTemp
EmptyFlash
Proxyfix
Sysrestore

Publicité

Soutenons La Quadrature du Net ! Soutenons La Quadrature du Net !

Signaler le contenu de ce document

Publicité

Soutenons La Quadrature du Net !