cjoint

Publicité


Publicité

Format du document : text/plain

Prévisualisation

Malwarebytes Anti-Malware
www.malwarebytes.org

Date de l'analyse: 24/01/2016
Heure de l'analyse: 02:35
Fichier journal: mbam.txt
Administrateur: Oui

Version: 2.2.0.1024
Base de données de programmes malveillants: v2016.01.23.06
Base de données de rootkits: v2016.01.20.01
Licence: Gratuit
Protection contre les programmes malveillants: Désactivé
Protection contre les sites Web malveillants: Désactivé
Autoprotection: Désactivé

Système d'exploitation: Windows 10
Processeur: x64
Système de fichiers: NTFS
Utilisateur: fanta

Type d'analyse: Analyse des menaces
Résultat: Terminé
Objets analysés: 475095
Temps écoulé: 59 min, 17 s

Mémoire: Activé
Démarrage: Activé
Système de fichiers: Activé
Archives: Activé
Rootkits: Activé
Heuristique: Activé
PUP: Activé
PUM: Activé

Processus: 0
(Aucun élément malveillant détecté)

Modules: 0
(Aucun élément malveillant détecté)

Clés du Registre: 4
PUP.Optional.CrossRider, HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{F7CC5327-BF54-6250-2EC5-78C1DE030F6D}, En quarantaine, [12008eafcdcc74c2748b6647c1432bd5],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\.DEFAULT\SOFTWARE\MICROSOFT\INTERNET EXPLORER\INTERNETREGISTRY\REGISTRY\USER\S-1-5-18\SOFTWARE\shopperz160120161415, En quarantaine, [25ed71cc5d3c7abc54ddc472ba4aba46],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\.DEFAULT\SOFTWARE\MICROSOFT\INTERNET EXPLORER\INTERNETREGISTRY\REGISTRY\USER\S-1-5-18\SOFTWARE\shopperz160120161644, En quarantaine, [d24052eb8712270fba7755e19b69de22],
PUP.Optional.Komodia, HKU\S-1-5-21-3367759677-2525828668-750366708-1001\SOFTWARE\INSTALLPATH\STATUS, En quarantaine, [3ad8ac912c6d8bab801df04723e19b65],

Valeurs du Registre: 2
PUP.Optional.Komodia, HKU\S-1-5-21-3367759677-2525828668-750366708-1001\SOFTWARE\INSTALLPATH\STATUS|FlowsurfCB, P, En quarantaine, [3ad8ac912c6d8bab801df04723e19b65]
PUP.Optional.DeskBar, HKU\S-1-5-21-3367759677-2525828668-750366708-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION|DeskBar.exe, 8888, En quarantaine, [62b0df5ec2d70630996381b38d771ae6]

Données du Registre: 0
(Aucun élément malveillant détecté)

Dossiers: 6
PUP.Optional.PullUpdate, C:\ProgramData\uBlpvkFaSlO\dat, En quarantaine, [f71b6ad3ebaed660d648b536c53fd729],
PUP.Optional.PullUpdate, C:\ProgramData\uBlpvkFaSlO, En quarantaine, [f71b6ad3ebaed660d648b536c53fd729],
Adware.LaSuperba, C:\uninst, En quarantaine, [c052a09df5a481b51414bd30d232926e],
PUP.Optional.CrossAd.Gen, C:\Users\fanta\AppData\Local\Beach Comp\Component, En quarantaine, [c64cf24b7d1c7bbb9d53feea6a9abe42],
PUP.Optional.CrossAd.Gen, C:\Users\fanta\AppData\Local\Beach Comp, En quarantaine, [c64cf24b7d1c7bbb9d53feea6a9abe42],
PUP.Optional.CrossAd.Gen, C:\Users\fanta\AppData\Local\Beach Comp\{3275C3DB-F1BD-49D6-0CB8-1575447D8911}, En quarantaine, [c64cf24b7d1c7bbb9d53feea6a9abe42],

Fichiers: 165
PUP.Optional.PullUpdate, C:\ProgramData\uBlpvkFaSlO\dat\bjAHvAI.dll, En quarantaine, [0909d5684653a69054dd0d4f31d0b64a],
PUP.Optional.ZombieInvasion, C:\ProgramData\uBlpvkFaSlO\dat\RHNfXGxXFF.dll, En quarantaine, [71a1c974c6d3a09686a94443fb09e31d],
PUP.Optional.Clara, C:\Users\fanta\AppData\Roaming\ZHP\Quarantine\BoBrowser.exe, En quarantaine, [19f967d669306acc362c79b9d8291fe1],
PUP.Optional.Cherimoya, C:\Users\fanta\AppData\Roaming\ZHP\Quarantine\bsdriver.sys, En quarantaine, [47cba994fa9f80b60e8413d15da75aa6],
PUP.Optional.Nosibay, C:\Users\fanta\AppData\Roaming\ZHP\Quarantine\Bubble Dock Uninstall.exe, En quarantaine, [3dd554e97821fe38bb792fb3ee161de3],
PUP.Optional.Nosibay, C:\Users\fanta\AppData\Roaming\ZHP\Quarantine\BubbleDock.exe, En quarantaine, [64ae80bdebae5fd771c36c76867ee21e],
PUP.Optional.Amonetize, C:\Users\fanta\AppData\Roaming\ZHP\Quarantine\Bundle_FlowsurfCB[1].exe, En quarantaine, [a86aae8f5643be78437fba88679aa65a],
PUP.Optional.ZombieNews, C:\Users\fanta\AppData\Roaming\ZHP\Quarantine\QnMMEod.exe, En quarantaine, [2de5c479c3d69a9cd2c5ea4e4eb3a35d],
PUP.Optional.Nosibay, C:\Users\fanta\AppData\Roaming\ZHP\Quarantine\Selection Tools Uninstall.exe, En quarantaine, [7b97c07d24757cbaf4409d45f90b926e],
PUP.Optional.Conduit, C:\Users\fanta\AppData\Roaming\ZHP\Quarantine\spstub.exe, En quarantaine, [dc368ab3118826106bf1874ca15f48b8],
PUP.Optional.CheckOffer, C:\Users\fanta\AppData\Roaming\ZHP\Quarantine\VuuPC_VO2_8907[2].exe, En quarantaine, [a86a8bb2079287afdbf7b3593bc6fe02],
PUP.Optional.Nosibay, C:\Users\fanta\AppData\Roaming\ZHP\Quarantine\WindApp Uninstall.exe, En quarantaine, [62b02e0f8d0cfb3ba58f1dc50bf99868],
PUP.Optional.CouponMarvel, C:\Users\fanta\AppData\Roaming\ZHP\Quarantine\Flashbeat_Setup.exe, En quarantaine, [e62c75c8257456e019ec9002d32e04fc],
PUP.Optional.SoundPlus, C:\Users\fanta\AppData\Roaming\ZHP\Quarantine\maxdriverupdater-installer[1].exe, En quarantaine, [d33ff5487c1d4aecd1671d9856aefe02],
PUP.Optional.YourSearching.ShrtCln, C:\Users\fanta\AppData\Roaming\ZHP\Quarantine\face_yoursearching[1].exe, En quarantaine, [868cf14c8f0a4de9eeb11ec5eb19ce32],
PUP.Optional.Conduit, C:\Users\fanta\AppData\Roaming\ZHP\Quarantine\offer-DA6FA80F-1E1F-466A-BB7C-6AA72B0FA366.exe, En quarantaine, [f2206ecf415856e062fa914277894db3],
PUP.Optional.Amonetize, C:\$Recycle.Bin\S-1-5-21-3367759677-2525828668-750366708-1001\$R1INRAC.zip, En quarantaine, [3bd7033a0b8e55e1ea92ebf0e31e27d9],
PUP.Optional.SoundPlus, C:\Users\fanta\AppData\Local\Temp\widgett.exe, En quarantaine, [ae6442fbd8c1da5c0612634dda273fc1],
PUP.Optional.SoundPlus, C:\Users\fanta\AppData\Local\Temp\widgett.exe.tmp, En quarantaine, [b65cb4899ffa1d19c3551898b948867a],
Trojan.Agent.MSIL, C:\Users\fanta\AppData\Local\Temp\XJpzK.tmp, En quarantaine, [9f7357e6ebaec373a1591ab54db46c94],
Adware.EoRezo, C:\Users\fanta\AppData\Local\Temp\nsr4F27.tmp, En quarantaine, [f41e48f59603ca6c6469f6d43dc439c7],
Adware.AdLoad, C:\Users\fanta\AppData\Local\Temp\nss51FE.tmp, En quarantaine, [8b871726eeabab8b0d80815ca25f3ac6],
Adware.EoRezo, C:\Users\fanta\AppData\Local\Temp\nssC302.tmp, En quarantaine, [c74bc677356493a331b5005931d1f60a],
PUP.Optional.YourSearching.ShrtCln, C:\Users\fanta\AppData\Local\Temp\nst3CFC.tmp, En quarantaine, [56bc41fc2475bd792b7409da7f85a55b],
PUP.Optional.ConvertAd, C:\Users\fanta\AppData\Local\Temp\nst67FD.tmp, En quarantaine, [24ee26179affb97da105a8295ba69070],
PUP.Optional.SoundPlus, C:\Users\fanta\AppData\Local\Temp\nst80E0.tmp, En quarantaine, [848e6ad343565fd7290f2491f90b916f],
Adware.ConvertAd, C:\Users\fanta\AppData\Local\Temp\nsu7D51.tmp, En quarantaine, [070b7fbe0b8edc5a8e35dcda62a2fa06],
Adware.AdLoad, C:\Users\fanta\AppData\Local\Temp\nsu81F5.tmp, En quarantaine, [f919a29b5d3c3cfa721bd10cb44d31cf],
PUP.Optional.Amonetize, C:\Users\fanta\AppData\Local\Temp\nsu8505.tmp, En quarantaine, [050d96a779208caabb3fdbec837e7a86],
PUP.Optional.Yontoo, C:\Users\fanta\AppData\Local\Temp\nsuA4AF.tmp, En quarantaine, [60b26dd05a3f6fc7d831efcc926f8878],
Adware.EoRezo, C:\Users\fanta\AppData\Local\Temp\nsvCB3F.tmp, En quarantaine, [de34fc415f3a1d1945a13c1d6f93867a],
Adware.AdLoad, C:\Users\fanta\AppData\Local\Temp\nsw91FB.tmp, En quarantaine, [ae648ab32d6c8fa74449b6272fd2d32d],
Adware.EoRezo, C:\Users\fanta\AppData\Local\Temp\nsw9E35.tmp, En quarantaine, [3ad887b6425732048363a4b50af8768a],
Adware.EoRezo, C:\Users\fanta\AppData\Local\Temp\nswE554.tmp, En quarantaine, [31e104399801df57c620dd7c05fd54ac],
PUP.Optional.IStartPageing.ChrPRST, C:\Users\fanta\AppData\Local\Temp\nsa6777.tmp, En quarantaine, [b35f013cdebb52e4ec78b1323dc7d729],
PUP.Optional.ConvertAd, C:\Users\fanta\AppData\Local\Temp\nsa91F2.tmp, En quarantaine, [e03295a87c1d7abca7008849f908827e],
PUP.Optional.CheckOffer, C:\Users\fanta\AppData\Local\Temp\nsa95AF.tmp, En quarantaine, [e52df5482970ed49ba18a6669d64768a],
PUP.Optional.Komodia.WnskRST, C:\Users\fanta\AppData\Local\Temp\nsb2AA3.tmp, En quarantaine, [1df575c80d8cfa3cd890567109f8b44c],
PUP.Optional.Amonetize, C:\Users\fanta\AppData\Local\Temp\nsbA197.tmp, En quarantaine, [c54d122b9603979f2e94cb7723de09f7],
PUP.Optional.ConvertAd, C:\Users\fanta\AppData\Local\Temp\nsbB4E6.tmp, En quarantaine, [9979c27b4653d26437705879c04132ce],
Adware.EoRezo, C:\Users\fanta\AppData\Local\Temp\nsc1442.tmp, En quarantaine, [040ed667a2f75cda9d30a129ed1401ff],
Adware.AdLoad, C:\Users\fanta\AppData\Local\Temp\nse735C.tmp, En quarantaine, [16fcab92afea7fb70885fbe2926f6b95],
Adware.EoRezo.Gen, C:\Users\fanta\AppData\Local\Temp\nseBC38.tmp, En quarantaine, [c54d5ce19108ea4c182f6b69926f6898],
Adware.EoRezo, C:\Users\fanta\AppData\Local\Temp\nsg1886.tmp, En quarantaine, [d240f14c227778be42a4d287a161f40c],
PUP.Optional.CheckOffer, C:\Users\fanta\AppData\Local\Temp\nshC275.tmp, En quarantaine, [23ef80bd72279c9a7d55b656956c7888],
PUP.Optional.Amonetize, C:\Users\fanta\AppData\Local\Temp\nsi47E5.tmp, En quarantaine, [f51d2a13f1a8a88e09b9f34fc53ce818],
PUP.Optional.SilentInstaller, C:\Users\fanta\AppData\Local\Temp\avgDF9E.exe, En quarantaine, [40d27fbe71288ea8a976aa9c03fd52ae],
PUP.Optional.IStartPageing.ChrPRST, C:\Users\fanta\AppData\Local\Temp\nsj603E.tmp, En quarantaine, [d63c41fc3e5b50e6253f16cd51b3fb05],
Adware.AdLoad, C:\Users\fanta\AppData\Local\Temp\nsjB74B.tmp, En quarantaine, [e13142fb06937cba1479b5286c95b44c],
PUP.Optional.Amonetize, C:\Users\fanta\AppData\Local\Temp\nsjE3CA.tmp, En quarantaine, [060c59e4b1e8dc5a8a7020a713ee718f],
PUP.Optional.PreInstaller, C:\Users\fanta\AppData\Local\Temp\nsk17CE.tmp, En quarantaine, [20f2d06d90090333a3fae84e25dc12ee],
PUP.Optional.PennyBee, C:\Users\fanta\AppData\Local\Temp\nsk4822.tmp, En quarantaine, [e032bd808019d75f8d495f609a6733cd],
Adware.AdLoad, C:\Users\fanta\AppData\Local\Temp\nsk981C.tmp, En quarantaine, [f31f1f1e1881c17597f6726b42bf9d63],
Adware.EoRezo, C:\Users\fanta\AppData\Local\Temp\nskAE1C.tmp, En quarantaine, [4dc52914a8f187af46a043167b87bd43],
PUP.Optional.ConvertAd, C:\Users\fanta\AppData\Local\Temp\nsl1238.tmp, En quarantaine, [ba588db0b7e2e74f079f656cf60b28d8],
PUP.Optional.CheckOffer, C:\Users\fanta\AppData\Local\Temp\nslA838.tmp, En quarantaine, [9b7750edb6e35adcb61c61ab5ea39967],
PUP.Optional.CheckOffer, C:\Users\fanta\AppData\Local\Temp\nslCE03.tmp, En quarantaine, [5cb696a76e2b7cbab71bbd4ff60b768a],
Adware.EoRezo, C:\Users\fanta\AppData\Local\Temp\nsmDAB1.tmp, En quarantaine, [18fa70cd732644f2834a4e7cce33b050],
PUP.Optional.SwiftSearch, C:\Users\fanta\AppData\Local\Temp\swse-setup-1.10.0.25.exe, En quarantaine, [bc56c677a3f69c9a8434a410ba47817f],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\482F.tmp.exe, En quarantaine, [be5486b7356416200aa7ad319c657d83],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\A800.tmp.exe, En quarantaine, [5bb743fa19804fe71c958d515fa2c13f],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\A126.tmp.exe, En quarantaine, [cd45e35ab2e7d85ec5ec548a8d74b44c],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\2A29.tmp.exe, En quarantaine, [a66c5fde9108eb4b6e43dfff0af7e31d],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\721F.tmp.exe, En quarantaine, [33dfac91e6b336003e73419d7988ea16],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\8E53.tmp.exe, En quarantaine, [b75b2d100990ff37aa07d608a95807f9],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\ADB5.tmp.exe, En quarantaine, [e52d1d2002978fa70aa7b02e867ba060],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\2382.tmp.exe, En quarantaine, [8f83c6775f3a65d1337ea73720e1b14f],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\8AC8.tmp.exe, En quarantaine, [bd558bb298015cdab001429c22df669a],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\63E2.tmp.exe, En quarantaine, [f02295a85d3cbf776a47c41a837e4ab6],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\ABA2.tmp.exe, En quarantaine, [2be77dc0e2b79a9cc6eb835b6a9756aa],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\B026.tmp.exe, En quarantaine, [bc56c67740591125ded3746a61a018e8],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\DF7D.tmp.exe, En quarantaine, [878b300debaee74f00b1d6084bb608f8],
PUP.Optional.Conduit, C:\Users\fanta\AppData\Local\Temp\dlLogic.exe, En quarantaine, [110149f462373cfaf0411e0e57a9c838],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\FA5A.tmp.exe, En quarantaine, [4ac853ea118838fe00b14e90b1501be5],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\4BEB.tmp.exe, En quarantaine, [868cd4691a7f5adcd0e1b12d30d1847c],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\C8D2.tmp.exe, En quarantaine, [3bd7d8652a6f54e28928f1ed0ef3da26],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\5EBC.tmp.exe, En quarantaine, [001284b9297071c5bdf412cc9e638d73],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\6097.tmp.exe, En quarantaine, [57bb4af316831d19f6bb25b9df223cc4],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\C04F.tmp.exe, En quarantaine, [37db43fad6c386b0446d57878978b848],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\D056.tmp.exe, En quarantaine, [9e74d26bf2a786b0931e4f8f0bf6a15f],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\EAA.tmp.exe, En quarantaine, [6da5132a900945f1e4cdf5e9b1506e92],
PUP.Optional.CheckOffer, C:\Users\fanta\AppData\Local\Temp\nswE592.tmp, En quarantaine, [9e74f548cccd0f274a884dbfae53eb15],
PUP.Optional.Bundler, C:\Users\fanta\AppData\Local\Temp\fsd4866.exe, En quarantaine, [977b34094c4d92a434fcaa866f91d729],
PUP.Optional.Bundler, C:\Users\fanta\AppData\Local\Temp\fsd8B6B.exe, En quarantaine, [60b2ce6f4455f1456ec2e14fc838da26],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\6FAD.tmp.exe, En quarantaine, [888a47f6a2f73303b9f8e9f53fc2ba46],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\9E88.tmp.exe, En quarantaine, [d53d40fd4554b581357c0ad46d94966a],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\C9F5.tmp.exe, En quarantaine, [a66cdd6091082d094170af2ffc05ae52],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\CF20.tmp.exe, En quarantaine, [8092d9649ffac96d7041726cd13025db],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\6708.tmp.exe, En quarantaine, [749eb9840594043279389747b150b34d],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\7769.tmp.exe, En quarantaine, [838f3b020a8f979f30812ab4689944bc],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\937D.tmp.exe, En quarantaine, [dd35ee4f9cfd181e2b8634aa6a9736ca],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\BA42.tmp.exe, En quarantaine, [37db89b4613872c4fab7c915976a2fd1],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\BF79.tmp.exe, En quarantaine, [65ad9e9fcccd73c3f3bebd21cc35d927],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\C748.tmp.exe, En quarantaine, [f51d1d203465ff37545d9846827f1ae6],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\FEDF.tmp.exe, En quarantaine, [ba588bb28d0ce353f6bbaa3443bef907],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\DFDA.tmp.exe, En quarantaine, [040e68d5b5e45dd97f32bf1ff20f1ae6],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\AD1B.tmp.exe, En quarantaine, [28ea5be25f3a033308a90cd256abb54b],
PUP.Optional.Amonetize, C:\Users\fanta\AppData\Local\Temp\amisetup1154__15940.exe, En quarantaine, [50c2241956438aac5b1b08d221e08e72],
PUP.Optional.Amonetize, C:\Users\fanta\AppData\Local\Temp\amisetup5797__15940.exe, En quarantaine, [63afad90b6e3b97d2d496e6cc63b9f61],
PUP.Optional.Amonetize, C:\Users\fanta\AppData\Local\Temp\amisetup6983__16165.exe, En quarantaine, [da38e25bd8c1b08620561ebc80815fa1],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\B6F6.tmp.exe, En quarantaine, [dd350b32d6c3eb4b0ea3558931d04ab6],
PUP.Optional.Amonetize, C:\Users\fanta\AppData\Local\Temp\nsx43FA.tmp, En quarantaine, [9e74201d673243f39b5ffdcac0416b95],
PUP.Optional.ConvertAd, C:\Users\fanta\AppData\Local\Temp\nsz1742.tmp, En quarantaine, [9a78dc61148555e1d0d67958ee1320e0],
Adware.EoRezo, C:\Users\fanta\AppData\Local\Temp\nsz96BE.tmp, En quarantaine, [fd155edfebae290d25c12039837f718f],
PUP.Optional.InstallCore, C:\Users\fanta\AppData\Local\Temp\8529.tmp.exe, En quarantaine, [868c91ac8b0e8ea8733ed7078c755ba5],
PUP.Optional.CheckOffer, C:\Users\fanta\AppData\Local\Temp\nsn1A42.tmp, En quarantaine, [749e211c83166cca8052b656fa0741bf],
Adware.EoRezo, C:\Users\fanta\AppData\Local\Temp\nsn69D9.tmp, En quarantaine, [5db559e41386e84eb432540556ac07f9],
Adware.EoRezo, C:\Users\fanta\AppData\Local\Temp\nsnA32.tmp, En quarantaine, [31e12a132079191d49844b7fb9486f91],
PUP.Optional.ConvertAd, C:\Users\fanta\AppData\Local\Temp\nsnE455.tmp, En quarantaine, [0f0368d59900b284638cf0426d9509f7],
PUP.Optional.ConvertAd, C:\Users\fanta\AppData\Local\Temp\nso24EA.tmp, En quarantaine, [789a4df0bddc50e6849ee27817ebb24e],
Adware.EoRezo, C:\Users\fanta\AppData\Local\Temp\nso7D5C.tmp, En quarantaine, [d240cc71a2f71026ad391c3d8280ae52],
Adware.AdLoad, C:\Users\fanta\AppData\Local\Temp\nso8879.tmp, En quarantaine, [0c0686b753466bcb563730ad887923dd],
PUP.Optional.CheckOffer, C:\Users\fanta\AppData\Local\Temp\nso91A1.tmp, En quarantaine, [8f83e35a8b0e6ec8cf03a7658d746997],
PUP.Optional.IStartPageing.ChrPRST, C:\Users\fanta\AppData\Local\Temp\nsp3006.tmp, En quarantaine, [100204391d7cf046bba9ad36f014f20e],
PUP.Optional.ConvertAd, C:\Users\fanta\AppData\Local\Temp\nsp6560.tmp, En quarantaine, [0c062b1273266dc97e28fad77e830af6],
Adware.EoRezo, C:\Users\fanta\AppData\Local\Temp\nsp97B8.tmp, En quarantaine, [977be05df9a06bcba442e2775ca6bb45],
PUP.Optional.ConvertAd, C:\Users\fanta\AppData\Local\Temp\nspC2F0.tmp, En quarantaine, [41d1ad907b1e89ad915e81b150b210f0],
PUP.Optional.CheckOffer, C:\Users\fanta\AppData\Local\Temp\nspEF16.tmp, En quarantaine, [59b979c47c1d221403cf9e6ee81942be],
PUP.Optional.YourSearching.ShrtCln, C:\Users\fanta\AppData\Local\Temp\nsq380F.tmp, En quarantaine, [d33fbe7f63363bfb316ed60d07fd46ba],
PUP.Optional.PreInstaller, C:\Users\fanta\AppData\Local\Temp\nsq56BA.tmp, En quarantaine, [c052330a8613ab8bbfde2b0b60a145bb],
Adware.EoRezo, C:\Users\fanta\AppData\Local\Temp\nsq8CBE.tmp, En quarantaine, [fe149da04257221407c66c5ecd34936d],
Adware.EoRezo, C:\Users\fanta\AppData\Local\Temp\nsqE620.tmp, En quarantaine, [ba583a03613812240adcfb5e59a958a8],
PUP.Optional.OpenCandy, C:\Users\fanta\AppData\Local\Temp\HYD6A86.tmp.1452955363\HTA\install.1452955363.zip, En quarantaine, [0111330a12877eb8e0b9a989877be020],
PUP.Optional.OpenCandy, C:\Users\fanta\AppData\Local\Temp\HYD6A86.tmp.1452955363\HTA\3rdparty\OCComSDK.dll, En quarantaine, [50c2e558cfcaeb4b5f3a90a2729056aa],
Adware.EoRezo.Gen, C:\Users\fanta\AppData\Local\Temp\is-2KQ3F.tmp\721.exe, En quarantaine, [c64c7bc2a2f7043238d2567a9c65d42c],
Adware.EoRezo.Gen, C:\Users\fanta\AppData\Local\Temp\is-2KQ3F.tmp\package_BubbleSound_installer_multilang.exe, En quarantaine, [47cba796b8e18bab35d53799ef125ba5],
Adware.EoRezo.Gen, C:\Users\fanta\AppData\Local\Temp\is-2KQ3F.tmp\package_pzombie_installer_multilang.exe, En quarantaine, [8f83192445541f17ad5d8b451ae7af51],
PUP.Optional.Tuto4PC, C:\Users\fanta\AppData\Local\Temp\is-DJDGQ.tmp\gentlemjmp_ieu.exe, En quarantaine, [7d9591ace0b9b581d7ab6c3ae31e16ea],
Adware.EoRezo, C:\Users\fanta\AppData\Local\Temp\is-K4T89.tmp\gmsd_fr_005010208.exe, En quarantaine, [27eb5ce183164aececa9b9cde21f847c],
Adware.EoRezo, C:\Users\fanta\AppData\Local\Temp\is-K4T89.tmp\predm.exe, En quarantaine, [66ace558b9e00f278a209c2f14edcb35],
Adware.EoRezo, C:\Users\fanta\AppData\Local\Temp\is-K4T89.tmp\upgmsd_fr_005010208.exe, En quarantaine, [3dd5b9847b1ee3533ac2259ec43dc23e],
Trojan.Agent.MSIL, C:\Users\fanta\AppData\Local\Temp\XJpzK\tlc.exe, En quarantaine, [13fff4498514de5818e2d9f655ac60a0],
Adware.EoRezo, C:\Users\fanta\AppData\Local\Temp\is-UE957.tmp\381.exe, En quarantaine, [ea28ba833f5a52e41985319a7f8209f7],
Adware.EoRezo.Gen, C:\Users\fanta\AppData\Local\Temp\is-UE957.tmp\623.exe, En quarantaine, [25ed83ba9108cf6716f413bd0001b44c],
PUP.Optional.Tuto4PC, C:\Users\fanta\AppData\Local\Temp\is-USMHB.tmp\gentlemjmp_ieu.exe, En quarantaine, [2fe3e05d8d0c7abc1d6512941be633cd],
PUP.Optional.OutBrowse, C:\Users\fanta\AppData\Local\Temp\VfEFLBVb\setup.exe, En quarantaine, [789a7ac3eaaf1d198c397761d72a966a],
PUP.Optional.Amonetize, C:\Users\fanta\AppData\Local\Temp\7zO35F9.tmp\Microsoft Office 2013 Pro_10924_i123849452_il345.exe, En quarantaine, [0d05f24b3d5cb87ee19b5b807c8544bc],
Adware.EoRezo, C:\Users\fanta\AppData\Local\Temp\is-LES3H.tmp\predm.exe, En quarantaine, [9f73c974c1d82f079218319aaf52649c],
Adware.EoRezo, C:\Users\fanta\AppData\Local\Temp\is-LES3H.tmp\SunnyDay.exe, En quarantaine, [51c174c97b1ee452b6dfe5a17f828878],
Adware.EoRezo, C:\Users\fanta\AppData\Local\Temp\is-LES3H.tmp\usun.exe, En quarantaine, [bc5697a6efaa95a155a722a11be6d927],
PUP.Optional.PennyBee, C:\Users\fanta\AppData\Local\Temp\f9626892-7a78-3199-abd2-97bbce96297b\adv_91.exe, En quarantaine, [ae6481bc88112d097165eed1c33efc04],
PUP.Optional.SilentInstaller, C:\Users\fanta\AppData\Local\Temp\f9626892-7a78-3199-abd2-97bbce96297b\OfferInstaller.exe, En quarantaine, [b16150ed2f6a8ea899867acc60a08779],
PUP.Optional.Amonetize, C:\Windows\Temp\tmp68DC.tmp, En quarantaine, [57bbce6fe2b79c9a77c124b8ee1324dc],
PUP.Optional.ConvertAd, C:\Windows\Temp\vns25B0.tmp, En quarantaine, [c54d72cb3564e551cd4786505fa2a35d],
PUP.Optional.CrossRider, C:\Users\fanta\AppData\Local\Beach Comp\{3275C3DB-F1BD-49D6-0CB8-1575447D8911}\{7A7BD6E6-1492-C8BF-7996-B33CDAEE3DFA}.dll, En quarantaine, [12008eafcdcc74c2748b6647c1432bd5],
Trojan.Agent.E, C:\Users\fanta\AppData\Local\Temp\1.tmp.exe, En quarantaine, [759d40fd851462d496105a9e7e85e11f],
Trojan.Agent.E, C:\Users\fanta\AppData\Local\Temp\2.tmp.exe, En quarantaine, [41d1b9841f7a05310a9c58a030d38779],
Trojan.Agent.E, C:\Users\fanta\AppData\Local\Temp\4.tmp.exe, En quarantaine, [ee24bb82099062d4aafc03f5d72ca65a],
Trojan.Agent.E, C:\Users\fanta\AppData\Local\Temp\9.tmp.exe, En quarantaine, [0210ba83e8b16fc7d7cf5e9ac63d837d],
PUP.Optional.FakeIELaunch, C:\Users\fanta\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Launch Internet-Explorer Browser.lnk, En quarantaine, [a66c51ec80191f17890434c736cdd828],
PUP.Optional.Komodia, C:\Windows\Temp\zcengine.log, En quarantaine, [19f986b7a1f8c86e75c4023561a3d729],
PUP.Optional.PullUpdate, C:\ProgramData\uBlpvkFaSlO\dat\QnMMEod.exe.config, En quarantaine, [f71b6ad3ebaed660d648b536c53fd729],
PUP.Optional.PullUpdate, C:\ProgramData\uBlpvkFaSlO\dat\UVotLo.exe.config, En quarantaine, [f71b6ad3ebaed660d648b536c53fd729],
PUP.Optional.PullUpdate, C:\ProgramData\uBlpvkFaSlO\AiuXSo.dat, En quarantaine, [f71b6ad3ebaed660d648b536c53fd729],
PUP.Optional.PullUpdate, C:\ProgramData\uBlpvkFaSlO\AiuXSo.exe.config, En quarantaine, [f71b6ad3ebaed660d648b536c53fd729],
PUP.Optional.PullUpdate, C:\ProgramData\uBlpvkFaSlO\info.dat, En quarantaine, [f71b6ad3ebaed660d648b536c53fd729],
Adware.LaSuperba, C:\uninst\uninstall.html, En quarantaine, [c052a09df5a481b51414bd30d232926e],
PUP.Optional.CrossAd.Gen, C:\Users\fanta\AppData\Local\Beach Comp\Component\config.json, En quarantaine, [c64cf24b7d1c7bbb9d53feea6a9abe42],
PUP.Optional.CrossAd.Gen, C:\Users\fanta\AppData\Local\Beach Comp\Component\hello.js, En quarantaine, [c64cf24b7d1c7bbb9d53feea6a9abe42],
PUP.Optional.CrossAd.Gen, C:\Users\fanta\AppData\Local\Beach Comp\Component\manifest.json, En quarantaine, [c64cf24b7d1c7bbb9d53feea6a9abe42],
PUP.Optional.CrossAd.Gen, C:\Users\fanta\AppData\Local\Beach Comp\Component\scriptTagContext.js, En quarantaine, [c64cf24b7d1c7bbb9d53feea6a9abe42],
PUP.Optional.CrossAd.Gen, C:\Users\fanta\AppData\Local\Beach Comp\Component\tmp_bg.js, En quarantaine, [c64cf24b7d1c7bbb9d53feea6a9abe42],
PUP.Optional.CrossAd.Gen, C:\Users\fanta\AppData\Local\Beach Comp\Component\uconfig.json, En quarantaine, [c64cf24b7d1c7bbb9d53feea6a9abe42],
PUP.Optional.CrossAd.Gen, C:\Users\fanta\AppData\Local\Beach Comp\{3275C3DB-F1BD-49D6-0CB8-1575447D8911}\c.dat, En quarantaine, [c64cf24b7d1c7bbb9d53feea6a9abe42],
PUP.Optional.YourSearching.ShrtCln, C:\Users\fanta\AppData\Local\Temp\HomePage.dat, En quarantaine, [b2601e1faaefa98d3fe0608d4fb516ea],

Secteurs physiques: 0
(Aucun élément malveillant détecté)


(end)

Publicité


Signaler le contenu de ce document

Publicité