cjoint

Publicité


Publicité

Format du document : text/plain

Prévisualisation

Malwarebytes Anti-Malware
www.malwarebytes.org

Date de l'analyse: 21/02/2016
Heure de l'analyse: 13:52
Fichier journal: MBAM.txt
Administrateur: Oui

Version: 2.2.0.1024
Base de données de programmes malveillants: v2016.02.21.02
Base de données de rootkits: v2016.02.17.01
Licence: Gratuit
Protection contre les programmes malveillants: Désactivé
Protection contre les sites Web malveillants: Désactivé
Autoprotection: Désactivé

Système d'exploitation: Windows 10
Processeur: x64
Système de fichiers: NTFS
Utilisateur: Marie

Type d'analyse: Analyse des menaces
Résultat: Terminé
Objets analysés: 386215
Temps écoulé: 35 min, 32 s

Mémoire: Activé
Démarrage: Activé
Système de fichiers: Activé
Archives: Activé
Rootkits: Désactivé
Heuristique: Activé
PUP: Activé
PUM: Activé

Processus: 0
(Aucun élément malveillant détecté)

Modules: 0
(Aucun élément malveillant détecté)

Clés du Registre: 19
PUP.Optional.Linkury.ShrtCln, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\ECOIS.EXE, En quarantaine, [c88e3d26fa9f3afc1374857104fd0ef2],
PUP.Optional.Linkury.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\ECOIS.EXE, En quarantaine, [c88e3d26fa9f3afc1374857104fd0ef2],
PUP.Optional.Linkury, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\CloudPrinter, En quarantaine, [b99d8cd721788ea88e94b7afa361bf41],
PUP.Optional.VBates, HKLM\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CERTIFICATES\4832D1BACA6156C53A74A472BE8678EAAABC8CBE, En quarantaine, [e0767ce71782d0662b1a96cf49bb05fb],
PUP.Optional.TheBrowser, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\MEDIAPLAYER\SHIMINCLUSIONLIST\TheBrowser.exe, En quarantaine, [dc7a2f34e0b972c4f44bcf2fd52df50b],
PUP.Optional.VBates, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CERTIFICATES\4832D1BACA6156C53A74A472BE8678EAAABC8CBE, En quarantaine, [3d19c0a3adec86b085c06ff6976d8878],
PUP.Optional.Linkury, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\EVENTLOG\APPLICATION\Application Hosting, En quarantaine, [7fd7c89b8316a690ae9d4eaf6d95aa56],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\.DEFAULT\SOFTWARE\MICROSOFT\INTERNET EXPLORER\INTERNETREGISTRY\REGISTRY\USER\S-1-5-18\SOFTWARE\shopperz210220161100, En quarantaine, [78de5f04dbbe9a9cfb89f069df258d73],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-18\SOFTWARE\{0E77F01E-F94C-481B-8343-B749C519FC66}, En quarantaine, [7bdb283b425786b0b69c07cdb54e0ef2],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-18\SOFTWARE\{2681AF46-813F-4484-B5D6-5AA60A6D26AD}, En quarantaine, [94c2461d8910e254dc76f9dbd72cd927],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-19\SOFTWARE\{2681AF46-813F-4484-B5D6-5AA60A6D26AD}, En quarantaine, [3b1b342fb9e060d6f35f2fa5917217e9],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-20\SOFTWARE\{0E77F01E-F94C-481B-8343-B749C519FC66}, En quarantaine, [7cda382b5b3e49ed95bdaf2523e001ff],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-20\SOFTWARE\{2681AF46-813F-4484-B5D6-5AA60A6D26AD}, En quarantaine, [0a4cb4af059466d0e86ace06b251d927],
PUP.Optional.TheBrowser, HKU\S-1-5-21-3838763673-1115839168-2840729140-1001\SOFTWARE\CLIENTS\STARTMENUINTERNET\TheBrowser.CSPO5RJII7DNO25ZP5ADK6MPFA, En quarantaine, [64f2a3c01980be7857e78777788ad42c],
PUP.Optional.Komodia, HKU\S-1-5-21-3838763673-1115839168-2840729140-1001\SOFTWARE\INSTALLPATH\STATUS, En quarantaine, [272f9cc72277a2945797c991ce369a66],
PUP.Optional.Tuto4PC, HKU\S-1-5-21-3838763673-1115839168-2840729140-1001\SOFTWARE\MICROSOFT\IDSC, En quarantaine, [bd994c170c8d0c2ad8c0de81966e05fb],
PUP.Optional.Iminent, HKU\S-1-5-21-3838763673-1115839168-2840729140-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOWREGISTRY\Iminent, En quarantaine, [d383acb7ff9a93a36ad0727f946f6b95],
PUP.Optional.BrowserAir, HKU\S-1-5-21-3838763673-1115839168-2840729140-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOWREGISTRY\AUDIO\POLICYCONFIG\PROPERTYSTORE\415D856_0, En quarantaine, [d086c59e8514be78d7e93326659fb44c],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-21-3838763673-1115839168-2840729140-1001\SOFTWARE\{2681AF46-813F-4484-B5D6-5AA60A6D26AD}, En quarantaine, [3521f96a3465f93dda78b4207e85cc34],

Valeurs du Registre: 17
PUP.Optional.InternetQuickAccess, HKLM\SOFTWARE\POLICIES\CHROMIUM\EXTENSIONINSTALLSOURCES|1, http://ext.internetquickaccess.com/*, En quarantaine, [68eefb68b2e747ef7c2b95b92ed6e11f]
PUP.Optional.InternetQuickAccess, HKLM\SOFTWARE\WOW6432NODE\POLICIES\CHROMIUM\EXTENSIONINSTALLSOURCES|1, http://ext.internetquickaccess.com/*, En quarantaine, [c492382b128748ee4e59c38ba65e649c]
PUP.Optional.Linkury, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\CLOUDPRINTER|ImagePath, C:\ProgramData\\CloudPrinter\\CloudPrinter.exe shuz -f "C:\ProgramData\\CloudPrinter\\CloudPrinter.dat" -l -a, En quarantaine, [8fc7560da3f6dd5937ed76f0f0141de3]
PUP.Optional.TheBrowser, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{C2A28594-ACC0-41D2-A3A3-78054C532083}, v2.25|Action=Allow|Active=TRUE|Dir=In|Protocol=17|LPort=5353|App=C:\Users\Marie\AppData\Local\TheBrowser\Application\TheBrowser.exe|Name=TheBrowser (mDNS-In)|Desc=Inbound rule for TheBrowser to allow mDNS traffic.|EmbedCtxt=TheBrowser|, En quarantaine, [5204461deaafee481922f272a1638d73]
PUP.Optional.Linkury, HKU\S-1-5-18\ENVIRONMENT|SNP, http://%66%65%65%64.%73%6E%61%70%64%6F.%63%6F%6D?publisher=APSFTuto4PC&co=FR&userid=e026491a-bfb3-070e-9825-1f8b62708518&searchtype=sc&installDate=21/02/2016&barcodeid=51113003&channelid=3&av=windows, En quarantaine, [e86ec2a1f9a0e155487b5d975aa925db]
Hijack.AutoConfigURL.PrxySvrRST, HKU\S-1-5-18\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|AutoConfigURL, http://stop-block.org/wpad.dat?046c99a004065e15e7f28ac6a2353a9c6029572, En quarantaine, [ba9cd39079207db931a7481b1de758a8]
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-18\SOFTWARE\{0E77F01E-F94C-481B-8343-B749C519FC66}|Name, C:\Program Files\shopperz100220161432\Siiaeims.exe, En quarantaine, [7bdb283b425786b0b69c07cdb54e0ef2]
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-18\SOFTWARE\{2681AF46-813F-4484-b5D6-5AA60A6D26AD}|Name, C:\Program Files\shopperz210220161100\Fotoaas.exe, En quarantaine, [94c2461d8910e254dc76f9dbd72cd927]
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-19\SOFTWARE\{2681AF46-813F-4484-b5D6-5AA60A6D26AD}|Name, C:\Program Files\shopperz210220161100\Fotoaas.exe, En quarantaine, [3b1b342fb9e060d6f35f2fa5917217e9]
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-20\SOFTWARE\{0E77F01E-F94C-481B-8343-B749C519FC66}|Name, C:\Program Files\shopperz100220161432\Siiaeims.exe, En quarantaine, [7cda382b5b3e49ed95bdaf2523e001ff]
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-20\SOFTWARE\{2681AF46-813F-4484-b5D6-5AA60A6D26AD}|Name, C:\Program Files\shopperz210220161100\Fotoaas.exe, En quarantaine, [0a4cb4af059466d0e86ace06b251d927]
PUP.Optional.Komodia, HKU\S-1-5-21-3838763673-1115839168-2840729140-1001\SOFTWARE\INSTALLPATH\STATUS|FlowsurfCB, P, En quarantaine, [272f9cc72277a2945797c991ce369a66]
PUP.Optional.Tuto4PC, HKU\S-1-5-21-3838763673-1115839168-2840729140-1001\SOFTWARE\MICROSOFT\IDSC|partner, tuto, En quarantaine, [bd994c170c8d0c2ad8c0de81966e05fb]
PUP.Optional.BrowserAir, HKU\S-1-5-21-3838763673-1115839168-2840729140-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOWREGISTRY\AUDIO\POLICYCONFIG\PROPERTYSTORE\415d856_0, {2}.\\?\hdaudio#func_01&ven_10ec&dev_0269&subsys_144dc06a&rev_1000#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\singlelineouttopo/00010001|\Device\HarddiskVolume3\Users\Marie\AppData\Local\BrowserAir\Application\BrowserAir.exe%b{00000000-0000-0000-0000-000000000000}, En quarantaine, [d086c59e8514be78d7e93326659fb44c]
PUP.Optional.DeskBar, HKU\S-1-5-21-3838763673-1115839168-2840729140-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION|DeskBar.exe, 8888, En quarantaine, [7ed880e30693cc6a93c59fb9d430d828]
Hijack.AutoConfigURL.PrxySvrRST, HKU\S-1-5-21-3838763673-1115839168-2840729140-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|AutoConfigUrl, http://stop-block.org/wpad.dat?046c99a004065e15e7f28ac6a2353a9c6029572, En quarantaine, [0d496bf8a3f6e74faa2ef37055af9868]
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-21-3838763673-1115839168-2840729140-1001\SOFTWARE\{2681AF46-813F-4484-b5D6-5AA60A6D26AD}|Name, C:\Program Files\shopperz210220161100\Fotoaas.exe, En quarantaine, [3521f96a3465f93dda78b4207e85cc34]

Données du Registre: 3
PUP.Optional.Linkury, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS|AppInit_DLLs, C:\ProgramData\Ecois\Uniis.dll, Bon : (), Mauvais : (C:\ProgramData\Ecois\Uniis.dll),Remplacé,[df773e25930680b692bc0bd029d8fb05]
PUP.Optional.Linkury, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS|AppInit_DLLs, C:\ProgramData\Ecois\Toughzootop.dll, Bon : (), Mauvais : (C:\ProgramData\Ecois\Toughzootop.dll),Remplacé,[3d19164d5d3cca6cd5ba11c9f809b14f]
PUP.Optional.Linkury.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES|DefaultScope, {ielnksrch}, Bon : ({0633EE93-D776-472f-A0FF-E1416B8B2E3A}), Mauvais : ({ielnksrch}),Remplacé,[2f2762017128bb7b17b569851aeae61a]

Dossiers: 4
PUP.Optional.Linkury, C:\ProgramData\CloudPrinter, En quarantaine, [b99d8cd721788ea88e94b7afa361bf41],
PUP.Optional.Linkury.ShrtCln, C:\ProgramData\Ecoiss, En quarantaine, [89cd451edcbd72c471e5b4613acb29d7],
PUP.Optional.PullUpdate, C:\ProgramData\toWMQmgq\dat, En quarantaine, [b1a5c3a0cecbc57173b09288c1446f91],
PUP.Optional.PullUpdate, C:\ProgramData\toWMQmgq, En quarantaine, [b1a5c3a0cecbc57173b09288c1446f91],

Fichiers: 71
PUP.Optional.Linkury, C:\ProgramData\Ecois\Uniis.dll, En quarantaine, [df773e25930680b692bc0bd029d8fb05],
PUP.Optional.Linkury, C:\ProgramData\Ecois\Toughzootop.dll, En quarantaine, [3d19164d5d3cca6cd5ba11c9f809b14f],
PUP.Optional.Linkury.ShrtCln, C:\ProgramData\CloudPrinter\CloudPrinter.exe, En quarantaine, [95c1bfa48d0c181ef196a74fdd246898],
PUP.Optional.Linkury, C:\ProgramData\Ecois\Cancom.exe, En quarantaine, [a9adb7ac198067cf2f5f786230d1e31d],
PUP.Optional.Linkury.ShrtCln, C:\ProgramData\Ecois\Ecois.exe, En quarantaine, [c88e3d26fa9f3afc1374857104fd0ef2],
PUP.Optional.Linkury, C:\ProgramData\Ecois\Zerozestring.exe, En quarantaine, [afa7d78c0d8c9b9b9af636a4f30e2bd5],
Adware.PullUpdate, C:\ProgramData\Lsevewreesce\1.0.7.1\ohceidna.exe, En quarantaine, [b0a6b1b29cfd89ad9d1e46ee5ba632ce],
PUP.Optional.PullUpdate, C:\ProgramData\toWMQmgq\dat\RsmIKyJ.dll, En quarantaine, [4f0777ece0b981b548736200f809e917],
PUP.Optional.ZombieInvasion, C:\ProgramData\toWMQmgq\dat\tYmGmPsj.dll, En quarantaine, [26301a49138637ff693c49676d97d12f],
PUP.Optional.Linkury, C:\Users\Marie\AppData\Roaming\Rantam.bin, En quarantaine, [d086570c5b3ed85e4662895b62a28f71],
PUP.Optional.Linkury, C:\Users\Marie\AppData\Roaming\Zonstring.bin, En quarantaine, [5afc1251e4b5ed49297f50947d87817f],
Adware.PennyBee, C:\Users\Marie\AppData\Roaming\KomivuKappemb\Talmo.exe, En quarantaine, [f6606ff4aeebee483aa630beed148878],
PUP.Optional.Cherimoya, C:\Users\Marie\AppData\Roaming\ZHP\Quarantine\bsdriver.sys, En quarantaine, [50067fe43069989e1882947fac59f010],
PUP.Optional.ZombieNews, C:\Users\Marie\AppData\Roaming\ZHP\Quarantine\CeWWGhfsjE.exe, En quarantaine, [aea8045f6e2bc86e32f6211e778a19e7],
PUP.Optional.ZombieNews, C:\Users\Marie\AppData\Roaming\ZHP\Quarantine\GOAMQrDmk.exe, En quarantaine, [c88e1d46bedb38fee5436fd04cb5d52b],
PUP.Optional.Linkury.ShrtCln, C:\Users\Marie\AppData\Roaming\ZHP\Quarantine\Nimstrong.exe, En quarantaine, [5600cc97d5c4013503843bbbb44dbd43],
PUP.Optional.ZombieNews, C:\Users\Marie\AppData\Roaming\ZHP\Quarantine\pTNzTkc.exe, En quarantaine, [5600a3c01188201661c776c98a77956b],
PUP.Optional.Linkury.ShrtCln, C:\Users\Marie\AppData\Roaming\ZHP\Quarantine\Viait.exe, En quarantaine, [2b2b5c07c0d98ea88bfc0ee84db46f91],
PUP.Optional.Komodia, C:\Users\Marie\AppData\Roaming\ZHP\Quarantine\zdwfp64.sys, En quarantaine, [15417ce7c8d10036125011de49b8ba46],
PUP.Optional.Linkury.ShrtCln, C:\Users\Marie\AppData\Roaming\ZHP\Quarantine\Zoomhold.exe, En quarantaine, [6ceaaab9c2d7c96de5a28670d32e6f91],
PUP.Optional.Linkury.ShrtCln, C:\Users\Marie\AppData\Roaming\ZHP\Quarantine\Zun-Light.exe, En quarantaine, [a7af2f3404950b2b94f3cf270bf6e917],
Adware.PullUpdate, C:\Users\Marie\AppData\Roaming\ZHP\Quarantine\Lsevewreesce.DIR\1.0.7.1\ohceidna.exe, En quarantaine, [2a2c372ce4b5e1559e1dca6a5da4c23e],
PUP.Optional.BundleInstaller, C:\$Recycle.Bin\S-1-5-21-3838763673-1115839168-2840729140-1001\$R6W858Q.exe, En quarantaine, [c393de85435664d27c91213db7497090],
PUP.Optional.Nosibay, C:\$Recycle.Bin\S-1-5-21-3838763673-1115839168-2840729140-1001\$RVV2AV1.exe, En quarantaine, [d482560defaa0f2721f440d13dc8cd33],
PUP.Optional.ConvertAd, C:\$Recycle.Bin\S-1-5-21-3838763673-1115839168-2840729140-1001\$ROCXKCA.tmp, En quarantaine, [0056055e5643da5c37b89146837e1fe1],
PUP.Optional.ConvertAd, C:\$Recycle.Bin\S-1-5-21-3838763673-1115839168-2840729140-1001\$ROY7ZHR.tmp, En quarantaine, [5df971f24059ca6ca748c01753aeb64a],
PUP.Optional.BundleInstaller, C:\$Recycle.Bin\S-1-5-21-3838763673-1115839168-2840729140-1001\$RL7WVJS.exe, En quarantaine, [5501cc97dcbd37ff5ab3aab4fe02d927],
PUP.Optional.Iminent, C:\$Recycle.Bin\S-1-5-21-3838763673-1115839168-2840729140-1001\$RUCXLDN.tmp, En quarantaine, [b89e441fb8e1fb3bfdd80a09f90c49b7],
PUP.Optional.SpaceSoundPro, C:\$Recycle.Bin\S-1-5-21-3838763673-1115839168-2840729140-1001\$RGGKFH7\newversion.exe, En quarantaine, [8fc74221e8b10630ba356c8321e07a86],
PUP.Optional.Linkury.ShrtCln, C:\$Recycle.Bin\S-1-5-21-3838763673-1115839168-2840729140-1001\$RA61WUI\EX34FWEKV.exe, En quarantaine, [b99d67fc0099ae888cfbba3c9a6743bd],
PUP.Optional.Linkury.ShrtCln, C:\$Recycle.Bin\S-1-5-21-3838763673-1115839168-2840729140-1001\$RYRAPTO\5QV9RV0X3.exe, En quarantaine, [cd892a394b4e31052760f9fd56ab48b8],
PUP.Optional.PennyBee, C:\$Recycle.Bin\S-1-5-21-3838763673-1115839168-2840729140-1001\$RIFYV96\RZ05ALZC7.exe, En quarantaine, [1d3975ee4c4d4cea87abc303d62bf10f],
PUP.Optional.ZombieNews, C:\$Recycle.Bin\S-1-5-21-3838763673-1115839168-2840729140-1001\$ROQ5UJL\7JL1S9FGX.exe, En quarantaine, [5501adb69efb47efedba171726daa858],
PUP.Optional.ZombieNews, C:\$Recycle.Bin\S-1-5-21-3838763673-1115839168-2840729140-1001\$RKJMDST\UUEMKA9FY.exe, En quarantaine, [084eec77b6e370c61394a6883ec2a759],
PUP.Optional.PennyBee, C:\$Recycle.Bin\S-1-5-21-3838763673-1115839168-2840729140-1001\$REPDUJF\ZQXZR5018.exe, En quarantaine, [f264d58e3168d36382b096305da442be],
PUP.Optional.Komodia.WnskRST, C:\Windows\System32\zdengine64.dll, En quarantaine, [23332f34c0d952e420434aa5ba47b34d],
PUP.Optional.Komodia.WnskRST, C:\Windows\SysWOW64\zdengine.dll, En quarantaine, [5006164dd2c7fa3c1c47c629b15007f9],
Rootkit.Komodia.PUA, C:\Windows\System32\drivers\bsdriver.sys, Supprimer au redémarrage, [223492d11386082ec03013a94db46b95],
PUP.Optional.BundleInstaller, C:\Users\Marie\AppData\Local\Temp\102B.tmp.exe, En quarantaine, [69edf073a0f9fd3953ba60fef80842be],
PUP.Optional.BundleInstaller, C:\Users\Marie\AppData\Local\Temp\610E.tmp.exe, En quarantaine, [4f07dc877128043285883e2058a8c739],
PUP.Optional.BundleInstaller, C:\Users\Marie\AppData\Local\Temp\78E8.tmp.exe, En quarantaine, [b3a34d164d4c06307499f965659b4ab6],
PUP.Optional.BundleInstaller, C:\Users\Marie\AppData\Local\Temp\FC83.tmp.exe, En quarantaine, [ef67d48fc9d048ee38d5c19dbf41a957],
PUP.Optional.Bundler, C:\Users\Marie\AppData\Local\Temp\fsdC093.exe, En quarantaine, [f95db2b1bedb340229ecdf51b64adb25],
PUP.Optional.ConvertAd, C:\Users\Marie\AppData\Local\Temp\nsoBDE5.tmp, En quarantaine, [6bebbba8bddc9e98c728825538c9c43c],
PUP.Optional.ConvertAd, C:\Users\Marie\AppData\Local\Temp\nsxBBB2.tmp, En quarantaine, [83d32c375643b97d21ce498e7b860df3],
PUP.Optional.SilentInstaller, C:\Users\Marie\AppData\Local\Temp\f9626892-7a78-3199-abd2-97bbce96297b\OfferInstaller.exe, En quarantaine, [d87ee97a0891fb3b03f055f01be52bd5],
PUP.Optional.CheckOffer, C:\Users\Marie\AppData\Local\Temp\nsoBE81.tmp\nsCBHTML5.dll, En quarantaine, [f462dc870792b77f246ad43f0bf69e62],
Adware.PennyBee, C:\Windows\Temp\bobca\Hurlokle.exe, En quarantaine, [a2b495cefa9f6ec8bad719ddb74ab44c],
PUP.Optional.Nosibay, C:\Windows\System32\Tasks\WindApp Update, En quarantaine, [0d490d563366d85eb62657a5867dd32d],
PUP.Optional.SelectionTools, C:\Windows\System32\Tasks\Selection Tools Update, En quarantaine, [5df9b8aba3f62e08257beb1c659f0000],
PUP.Optional.FakeIELaunch, C:\Users\Marie\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Launch Internet-Explorer Browser.lnk, En quarantaine, [cb8b0b581c7d71c563ea3de274909e62],
PUP.Optional.Iminent, C:\Users\Marie\AppData\Local\Chrome .lnk, En quarantaine, [e373d78c336662d4c480103d956f8878],
PUP.Optional.Iminent, C:\Users\Marie\AppData\Local\Firefox .lnk, En quarantaine, [5402a6bdbedbec4aec5986c7c63e9d63],
PUP.Optional.Iminent, C:\Users\Marie\AppData\Local\Iexplore .lnk, En quarantaine, [59fd8dd63c5d320472d4f95404000df3],
PUP.Optional.TheBrowser, C:\Users\Marie\Desktop\TheBrowser.lnk, En quarantaine, [0a4c491a2574fc3a12a0d17efe06d22e],
PUP.Optional.TheBrowser, C:\Users\Marie\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\TheBrowser.lnk, En quarantaine, [6de9f96a59402115ff13c987d82ce41c],
PUP.Optional.Linkury, C:\ProgramData\CloudPrinter\CloudPrinter.dat, En quarantaine, [b99d8cd721788ea88e94b7afa361bf41],
PUP.Optional.Linkury, C:\ProgramData\CloudPrinter\Config.xml, En quarantaine, [b99d8cd721788ea88e94b7afa361bf41],
PUP.Optional.Linkury, C:\Users\Marie\AppData\Roaming\md.xml, En quarantaine, [dc7ac49f5a3f7eb87ae92343be467e82],
PUP.Optional.Linkury, C:\Users\Marie\AppData\Roaming\noah.dat, En quarantaine, [0e48560d6a2f83b381e3a8bea064e917],
PUP.Optional.Linkury, C:\Users\Marie\AppData\Roaming\uninstall_temp.ico, En quarantaine, [05510b588c0da492db8a3f27798bb44c],
PUP.Optional.Linkury, C:\Users\Marie\AppData\Roaming\lobby.dat, En quarantaine, [2e28372c970237ff17f8175008fc5ca4],
PUP.Optional.Linkury.ShrtCln, C:\ProgramData\Ecoiss\ff.HP, En quarantaine, [89cd451edcbd72c471e5b4613acb29d7],
PUP.Optional.Linkury.ShrtCln, C:\ProgramData\Ecoiss\ff.NT, En quarantaine, [89cd451edcbd72c471e5b4613acb29d7],
PUP.Optional.Linkury.ShrtCln, C:\ProgramData\Ecoiss\snp.sc, En quarantaine, [89cd451edcbd72c471e5b4613acb29d7],
PUP.Optional.PullUpdate, C:\ProgramData\toWMQmgq\dat\GOAMQrDmk.exe.config, En quarantaine, [b1a5c3a0cecbc57173b09288c1446f91],
PUP.Optional.PullUpdate, C:\ProgramData\toWMQmgq\dat\pTNzTkc.exe.config, En quarantaine, [b1a5c3a0cecbc57173b09288c1446f91],
PUP.Optional.PullUpdate, C:\ProgramData\toWMQmgq\CeWWGhfsjE.dat, En quarantaine, [b1a5c3a0cecbc57173b09288c1446f91],
PUP.Optional.PullUpdate, C:\ProgramData\toWMQmgq\CeWWGhfsjE.exe.config, En quarantaine, [b1a5c3a0cecbc57173b09288c1446f91],
PUP.Optional.PullUpdate, C:\ProgramData\toWMQmgq\info.dat, En quarantaine, [b1a5c3a0cecbc57173b09288c1446f91],
PUP.Optional.HijackHosts.Gen, C:\Windows\System32\gobp\don\vobf.dat, En quarantaine, [e2743f244b4eef47b03f47d00bfa7090],

Secteurs physiques: 0
(Aucun élément malveillant détecté)


(end)

Publicité


Signaler le contenu de ce document

Publicité