Malwarebytes Anti-Malware www.malwarebytes.org Date de l'analyse: 09/01/2016 Heure de l'analyse: 11:45 Fichier journal: mbam.txt Administrateur: Oui Version: 2.2.0.1024 Base de données de programmes malveillants: v2016.01.09.01 Base de données de rootkits: v2016.01.05.01 Licence: Gratuit Protection contre les programmes malveillants: Désactivé Protection contre les sites Web malveillants: Désactivé Autoprotection: Désactivé Système d'exploitation: Windows 8.1 Processeur: x64 Système de fichiers: NTFS Utilisateur: Lindsay.Neth Type d'analyse: Analyse des menaces Résultat: Terminé Objets analysés: 323258 Temps écoulé: 13 min, 15 s Mémoire: Activé Démarrage: Activé Système de fichiers: Activé Archives: Activé Rootkits: Activé Heuristique: Activé PUP: Activé PUM: Activé Processus: 3 Adware.PennyBee, C:\Users\Lindsay.Neth\AppData\Roaming\IgodmoUke\Ucemn.exe, 1816, Supprimer au redémarrage, [880d42f51e7b75c15c949733d52c42be] Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\SunnyDay3\usun.exe, 4076, Supprimer au redémarrage, [c3d2092e574248ee5259b30e61a04cb4] Adware.EoRezo, C:\Program Files (x86)\SunnyDay3\SunnyDay.exe, 4144, Supprimer au redémarrage, [abea2c0bdcbd280e06396b193ec36e92] Modules: 0 (Aucun élément malveillant détecté) Clés du Registre: 20 Adware.PennyBee, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\Khhip, En quarantaine, [880d42f51e7b75c15c949733d52c42be], PUP.Optional.PennyBee, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{85AD98BB-B6B2-4982-a8A1-9718E0044CFC}, En quarantaine, [eca99c9b336660d6d8adba03956c926e], Adware.EoRezo, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\SunnyDay3_is1, En quarantaine, [e0b585b2edac60d6421a988d91735fa1], PUP.Optional.Palikan, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0633EE93-D776-472F-A0FF-E1416B8B2E3A}, En quarantaine, [860f1c1b0f8a60d6436f0abbdb2843bd], PUP.Optional.WinYahoo, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{1B31C9D2-7135-442B-BB93-7C002172ADC6}, En quarantaine, [2a6bdf583c5d171f3b066683e51e0af6], PUP.Optional.MyBrowser, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\IBUpd2, Supprimer au redémarrage, [ade8cd6ac0d995a124a950d35ba935cb], PUP.Optional.PriceFountain, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Lindsay.NethCrucifiesImpellorV2, Supprimer au redémarrage, [5144e6515c3dff37848151d09f65bd43], PUP.Optional.SearchModule, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\RSPro, Supprimer au redémarrage, [2c693700138681b57ce852d232d26a96], PUP.Optional.Snoozer, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Seventh, Supprimer au redémarrage, [3560c572a1f82610b5684d9bb84bea16], PUP.Optional.Snoozer, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Sixth, Supprimer au redémarrage, [5e3744f3dfba310572ac32b6a95a55ab], PUP.Optional.Palikan, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\Palikan, En quarantaine, [5a3b96a14950aa8c3c7b8c3909faa759], PUP.Optional.Shopperz, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{E70B9B44-50C9-4FAF-8BA6-CA81156447A1}, En quarantaine, [6a2be3549cfd89ad5713b76e7193ed13], PUP.Optional.Tuto4PC, HKLM\SOFTWARE\WOW6432NODE\TUTORIALS, En quarantaine, [583d93a4a0f971c50650d4042fd47e82], PUP.Optional.Shopperz.BrwsrFlsh, HKU\.DEFAULT\SOFTWARE\MICROSOFT\INTERNET EXPLORER\INTERNETREGISTRY\REGISTRY\USER\S-1-5-18\SOFTWARE\shopperz030120161448, En quarantaine, [81144deaa5f4a492b6bb36eb47bdad53], PUP.Optional.Shopperz.BrwsrFlsh, HKU\.DEFAULT\SOFTWARE\MICROSOFT\INTERNET EXPLORER\INTERNETREGISTRY\REGISTRY\USER\S-1-5-18\SOFTWARE\shopperz080120161440, En quarantaine, [771ee65180190036e68b49d80afaab55], PUP.Optional.InstallCore, HKU\S-1-5-21-452054049-3322805463-2325735685-1001\SOFTWARE\ICSW1.17, En quarantaine, [7e17f245abee241207539326b350728e], PUP.Optional.Palikan, HKU\S-1-5-21-452054049-3322805463-2325735685-1001\SOFTWARE\palikan, En quarantaine, [544176c14950b185575744817c874eb2], PUP.Optional.Searching, HKU\S-1-5-21-452054049-3322805463-2325735685-1001\SOFTWARE\GOOGLE\CHROME\EXTENSIONS\jlcgehabolcakkjhgmgpkagpolbjlhfa, En quarantaine, [ebaada5d9efb8caa029007c1f60c16ea], PUP.Optional.PCMechanic, HKU\S-1-5-21-452054049-3322805463-2325735685-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOWREGISTRY\AUDIO\POLICYCONFIG\PROPERTYSTORE\924296F4_0, En quarantaine, [9ef7b87f3267c96d35854dd4bb49df21], PUP.Optional.Tuto4PC, HKU\S-1-5-21-452054049-3322805463-2325735685-1001\SOFTWARE\TUTORIALS\updatetutorialeshp, En quarantaine, [484d55e28f0a9c9a4d02aa2e768d4eb2], Valeurs du Registre: 17 Adware.EoRezo, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE|usun.exe, C:\Users\Lindsay.Neth\AppData\Local\SunnyDay3\usun.exe -runonce, En quarantaine, [c3d2092e574248ee5259b30e61a04cb4] Adware.EoRezo, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|sun3, "C:\Program Files (x86)\SunnyDay3\SunnyDay.exe", En quarantaine, [abea2c0bdcbd280e06396b193ec36e92] PUP.Optional.Palikan, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}|URL, http://www.palikan.com/results.php?f=4&q={searchTerms}&a=plk_mlvi_15_53&cd=2XzuyEtN2Y1L1Qzu0D0AyD0D0EtB0Ezz0ByDtDyBzy0BtD0FtN0D0Tzu0StCyEyCtBtN1L2XzutAtFtCyDtFtAtFtDtN1L1Czu1StN1L1G1B1V1N2Y1L1Qzu2StC0E0FtDtDyD0CzytGtBtAyE0AtGtDyEzztAtGtCyCtCzztG0EtDtA0CtB0CtDtA0DyDtAtC2QtN1M1F1B2Z1V1N2Y1L1Qzu2StCyEyE0DyCyByCzztGyC0FtA0AtGyEyDyDtDtG0AyB0CtCtGyE0B0D0FtDzytAyCtDtD0B0E2QtN0A0LzuyE&cr=518125211&ir=, En quarantaine, [860f1c1b0f8a60d6436f0abbdb2843bd] PUP.Optional.Palikan, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}|TopResultURLFallback, http://www.palikan.com/results.php?f=4&q={searchTerms}&a=plk_mlvi_15_53&cd=2XzuyEtN2Y1L1Qzu0D0AyD0D0EtB0Ezz0ByDtDyBzy0BtD0FtN0D0Tzu0StCyEyCtBtN1L2XzutAtFtCyDtFtAtFtDtN1L1Czu1StN1L1G1B1V1N2Y1L1Qzu2StC0E0FtDtDyD0CzytGtBtAyE0AtGtDyEzztAtGtCyCtCzztG0EtDtA0CtB0CtDtA0DyDtAtC2QtN1M1F1B2Z1V1N2Y1L1Qzu2StCyEyE0DyCyByCzztGyC0FtA0AtGyEyDyDtDtG0AyB0CtCtGyE0B0D0FtDzytAyCtDtD0B0E2QtN0A0LzuyE&cr=518125211&ir=, En quarantaine, [2e67d2652b6ea591981a8a3bf211817f] PUP.Optional.Palikan, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}|FaviconPath, C:\Users\Lindsay.Neth\AppData\LocalLow\Microsoft\Internet Explorer\Services\Palikan.ico, En quarantaine, [3f561e19f1a8a98d783ac6ffe81b1ae6] PUP.Optional.Palikan, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}, Palikan, En quarantaine, [d7be67d0cbce47ef0da5596c8083946c] PUP.Optional.Palikan, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}|DisplayName, Palikan, En quarantaine, [8c091c1b0693b5812c8652732bd81ae6] PUP.Optional.WinYahoo, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{1b31c9d2-7135-442b-bb93-7c002172adc6}|URL, https://fr.search.yahoo.com/yhs/search?hspart=iry&hsimp=yhs-fullyhosted_003&type=wncy_popjar_15_52_ssg04¶m1=1¶m2=f[2a6bdf583c5d171f3b066683e51e0af6]D4%26b[2a6bdf583c5d171f3b066683e51e0af6]DIE%26cc[2a6bdf583c5d171f3b066683e51e0af6]Dfr%26pa[2a6bdf583c5d171f3b066683e51e0af6]DWincy%26cd[2a6bdf583c5d171f3b066683e51e0af6]D2XzuyEtN2Y1L1Qzu0D0AyD0D0EtB0Ezz0ByDtDyBzy0BtD0FtN0D0Tzu0StCyEyDtCtN1L2XzutAtFtCyCtFtCtFtDtN1L1Czu1TtN1L1G1B1V1N2Y1L1Qzu2SyC0C0AyByBtB0F0FtGyBtCzytAtGyD0AyCyDtGyBtBtCtCtG0CtAzyyDtAtA0EyCyC0B0FtD2QtN1M1F1B2Z1V1N2Y1L1Qzu2StCyEyE0DyCyByCzztGyC0FtA0AtGyEyDyDtDtG0AyB0CtCtGyE0B0D0FtDzytAyCtDtD0B0E2QtN0A0LzuyE%26cr[2a6bdf583c5d171f3b066683e51e0af6]D1888211929%26a[2a6bdf583c5d171f3b066683e51e0af6]Dwncy_popjar_15_52_ssg04%26os_ver[2a6bdf583c5d171f3b066683e51e0af6]D6.3%26os[2a6bdf583c5d171f3b066683e51e0af6]DWindowsEn quarantaineB8.1En quarantaineBConnected&p={searchTerms}, %4, %5 PUP.Optional.WinYahoo, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{1b31c9d2-7135-442b-bb93-7c002172adc6}|TopResultURLFallback, https://fr.search.yahoo.com/yhs/search?hspart=iry&hsimp=yhs-fullyhosted_003&type=wncy_popjar_15_52_ssg04¶m1=1¶m2=f[276ed26549504bebeb56e80137cc45bb]D4%26b[276ed26549504bebeb56e80137cc45bb]DIE%26cc[276ed26549504bebeb56e80137cc45bb]Dfr%26pa[276ed26549504bebeb56e80137cc45bb]DWincy%26cd[276ed26549504bebeb56e80137cc45bb]D2XzuyEtN2Y1L1Qzu0D0AyD0D0EtB0Ezz0ByDtDyBzy0BtD0FtN0D0Tzu0StCyEyDtCtN1L2XzutAtFtCyCtFtCtFtDtN1L1Czu1TtN1L1G1B1V1N2Y1L1Qzu2SyC0C0AyByBtB0F0FtGyBtCzytAtGyD0AyCyDtGyBtBtCtCtG0CtAzyyDtAtA0EyCyC0B0FtD2QtN1M1F1B2Z1V1N2Y1L1Qzu2StCyEyE0DyCyByCzztGyC0FtA0AtGyEyDyDtDtG0AyB0CtCtGyE0B0D0FtDzytAyCtDtD0B0E2QtN0A0LzuyE%26cr[276ed26549504bebeb56e80137cc45bb]D1888211929%26a[276ed26549504bebeb56e80137cc45bb]Dwncy_popjar_15_52_ssg04%26os_ver[276ed26549504bebeb56e80137cc45bb]D6.3%26os[276ed26549504bebeb56e80137cc45bb]DWindowsEn quarantaineB8.1En quarantaineBConnected&p={searchTerms}, %4, %5 PUP.Optional.3DBubbleSound, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|3D BubbleSound, "C:\Program Files\BubbleSound\3D BubbleSound.exe", En quarantaine, [692c65d263363303bd14a6f6a75c926e] PUP.Optional.Shopperz, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{85AD98BB-B6B2-4982-a8A1-9718E0044CFC}|DisplayIcon, C:\Program Files\shopperz030120161448\setup.ico, En quarantaine, [0095c6712079a591e9815bca49bb9d63] PUP.Optional.Shopperz, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{E70B9B44-50C9-4FAF-8BA6-CA81156447A1}|DisplayIcon, C:\Program Files\shopperz080120161440\setup.ico, En quarantaine, [6a2be3549cfd89ad5713b76e7193ed13] PUP.Optional.Tuto4PC, HKLM\SOFTWARE\WOW6432NODE\TUTORIALS|HostGUID, 1C06F948-7279-4662-A89A-DA78F28544B9, En quarantaine, [583d93a4a0f971c50650d4042fd47e82] PUP.Optional.PCMechanic, HKU\S-1-5-21-452054049-3322805463-2325735685-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOWREGISTRY\AUDIO\POLICYCONFIG\PROPERTYSTORE\924296f4_0, {2}.\\?\hdaudio#func_01&ven_10ec&dev_0282&subsys_103c802a&rev_1000#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\singlelineouttopo/00010001|\Device\HarddiskVolume3\Program Files (x86)\Uniblue\PC-Mechanic\pc-mechanic.exe%b{00000000-0000-0000-0000-000000000000}, En quarantaine, [9ef7b87f3267c96d35854dd4bb49df21] PUP.Optional.DeskBar, HKU\S-1-5-21-452054049-3322805463-2325735685-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION|DeskBar.exe, 8888, En quarantaine, [c3d25bdc8712d6609ba159c705ffd22e] PUP.Optional.SelectionTools, HKU\S-1-5-21-452054049-3322805463-2325735685-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION|Selection Tools.exe, 11000, En quarantaine, [eaab6dcad1c8be787efcfd24758f05fb] PUP.Optional.NotChromeRun, HKU\S-1-5-21-452054049-3322805463-2325735685-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|GoogleChromeAutoLaunch_B89666D905302C84A70114465088E791, "C:\Users\Lindsay.Neth\AppData\Local\Chromium\Application\chrome.exe" --auto-launch-at-startup --profile-directory="Default" --restore-last-session, En quarantaine, [8015d166a7f2201649e6e3e1679c0bf5] Données du Registre: 0 (Aucun élément malveillant détecté) Dossiers: 13 PUP.Optional.PullUpdate.Gen, C:\ProgramData\Paxecsednig\1.0.7.1, En quarantaine, [1f76092eb6e30f27391e0790ff0407f9], PUP.Optional.PullUpdate.Gen, C:\ProgramData\Paxecsednig, En quarantaine, [1f76092eb6e30f27391e0790ff0407f9], PUP.Optional.WombatService, C:\ProgramData\Service1291, En quarantaine, [870ebf78188161d569e40dd0c73cc23e], PUP.Optional.VBates, C:\Users\Lindsay.Neth\AppData\LocalLow\Company\Product\1.0, En quarantaine, [7025181fc3d63105b782ac3d13f026da], PUP.Optional.VBates, C:\Users\Lindsay.Neth\AppData\LocalLow\Company\Product, En quarantaine, [7025181fc3d63105b782ac3d13f026da], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\SunnyDay3, Supprimer au redémarrage, [efa6f93e6b2e6cca91caf72ea55fe41c], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\SunnyDay3\Download, En quarantaine, [efa6f93e6b2e6cca91caf72ea55fe41c], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\SunnyDay3\SunnyDay3, En quarantaine, [efa6f93e6b2e6cca91caf72ea55fe41c], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\SunnyDay3\SunnyDay3\1.20, En quarantaine, [efa6f93e6b2e6cca91caf72ea55fe41c], Adware.EoRezo, C:\Program Files (x86)\SunnyDay3, Supprimer au redémarrage, [e0b585b2edac60d6421a988d91735fa1], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030120161448, Supprimer au redémarrage, [841173c46d2cd16524fc336048bace32], Adware.LaSuperba, C:\uninst, En quarantaine, [b3e2e7500e8b171ff93a07ccf31102fe], PUP.Optional.PriceFountain.Gen, C:\Users\Lindsay.Neth\AppData\Local\CrucifiesImpellor, En quarantaine, [0f86d067bbde6ec8d9b04d869074c53b], Fichiers: 143 Rootkit.Komodia.PUA, C:\WINDOWS\SYSTEM32\drivers\bsdriver.sys, Supprimer au redémarrage, , PUP.Optional.Cherimoya, C:\WINDOWS\SYSTEM32\drivers\cherimoya.sys, Supprimer au redémarrage, , Trojan.FilePatch.DNSApi, C:\Windows\System32\dnsapi.dll, Remplacer au redémarrage, [430bdae504c9ae76bf2a9edc23d4ea70], Trojan.FilePatch.DNSApi, C:\Windows\SysWOW64\dnsapi.dll, Remplacer au redémarrage, [1bf582b77e99f9da08ff0f42c1e62801], Adware.PennyBee, C:\Users\Lindsay.Neth\AppData\Roaming\IgodmoUke\Ucemn.exe, Supprimer au redémarrage, [880d42f51e7b75c15c949733d52c42be], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\SunnyDay3\usun.exe, Supprimer au redémarrage, [c3d2092e574248ee5259b30e61a04cb4], Adware.EoRezo, C:\Program Files (x86)\SunnyDay3\SunnyDay.exe, Supprimer au redémarrage, [abea2c0bdcbd280e06396b193ec36e92], PUP.Optional.ZombieNews, C:\ProgramData\MljvcAJBu\FTxFHn.exe, En quarantaine, [217402355d3c5adc39f4e155689958a8], PUP.Optional.PullUpdate.MSIL, C:\ProgramData\Paxecsednig\1.0.7.1\uonuvnud.exe, En quarantaine, [3f56ff380495b38396aaa9fcee13639d], Backdoor.Bot, C:\Program Files\shopperz030120161448\csrcc.exe, Supprimer au redémarrage, [d6bfbe79dbbe1125d90326110df4a858], PUP.Optional.PennyBee, C:\Program Files\shopperz030120161448\unins000.exe, Supprimer au redémarrage, [eca99c9b336660d6d8adba03956c926e], Adware.EoRezo, C:\Program Files (x86)\SunnyDay3\predm.exe, En quarantaine, [bbdafe39b5e4f0462f2bb514748ddd23], PUP.Optional.InstallCore, C:\Users\Lindsay.Neth\AppData\Local\Temp\ICReinstall_Malavida_Download_Manager.exe, En quarantaine, [5441bd7a2475e74f3db7d3f7659fd030], PUP.Optional.PennyBee, C:\Users\Lindsay.Neth\AppData\Local\Temp\oprun11835.exe, En quarantaine, [2c6993a4cdcca492275ea914fc05a15f], PUP.Optional.PennyBee, C:\Users\Lindsay.Neth\AppData\Local\Temp\oprun17664.exe, En quarantaine, [d5c0c86f881196a0e0a5cdf01be6768a], PUP.Optional.PennyBee, C:\Users\Lindsay.Neth\AppData\Local\Temp\oprun24684.exe, En quarantaine, [3d5846f1c1d854e25e276c518e73f10f], PUP.Optional.PennyBee, C:\Users\Lindsay.Neth\AppData\Local\Temp\oprun6135.exe, En quarantaine, [badbe2551c7de94db7ce3d808c75c33d], PUP.Optional.CouponMarvel, C:\Users\Lindsay.Neth\AppData\Local\Temp\Flashbeat_Setup.exe, En quarantaine, [1b7a54e37722a88e5859c6c932cfbe42], PUP.Optional.IStartPageing.ChrPRST, C:\Users\Lindsay.Neth\AppData\Local\Temp\nsb1BFE.tmp, En quarantaine, [a6ef30076336fe38e6b2735618ec0000], PUP.Optional.ConvertAd, C:\Users\Lindsay.Neth\AppData\Local\Temp\nsbFF30.tmp, En quarantaine, [96ffac8bd6c3f93d64b6f134659d13ed], PUP.Optional.QualityChecker, C:\Users\Lindsay.Neth\AppData\Local\Temp\nsc1164.tmp, En quarantaine, [bdd820172e6b49ed1aa02aa15ca59c64], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\nsf6548.tmp, En quarantaine, [474eef487326c373bbc27c4c926f9e62], PUP.Optional.PennyBee, C:\Users\Lindsay.Neth\AppData\Local\Temp\nsg39B1.tmp, En quarantaine, [445164d3732669cd087dc5f8a75a5da3], PUP.Optional.Komodia.WnskRST, C:\Users\Lindsay.Neth\AppData\Local\Temp\nspA7F2.tmp, En quarantaine, [4b4ace69821769cda473c500c14031cf], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\nspFD4E.tmp, En quarantaine, [f99cf1463465e1558fee9434c43dd62a], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\nsr9E10.tmp, En quarantaine, [afe690a7eeabff371964497fab5656aa], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\nssF965.tmp, En quarantaine, [ace9b58262378aac2a53d5f3ea170ef2], PUP.Optional.QualityChecker, C:\Users\Lindsay.Neth\AppData\Local\Temp\nsuFE5A.tmp, En quarantaine, [81149b9c22778fa7dcde89427889a35d], PUP.Optional.BundleInstaller, C:\Users\Lindsay.Neth\AppData\Local\Temp\Set4487.tmp, En quarantaine, [316467d08d0c92a42f8d089437cdd32d], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\nsi531.tmp, En quarantaine, [029352e59dfcbe7883faffc97e8315eb], PUP.Optional.QualityChecker, C:\Users\Lindsay.Neth\AppData\Local\Temp\nsj854B.tmp, En quarantaine, [b3e24bec0f8ab87e7d3da229fa0702fe], PUP.Optional.IStartPageing.ChrPRST, C:\Users\Lindsay.Neth\AppData\Local\Temp\nswDF01.tmp, En quarantaine, [1a7b81b63e5b50e61d7bd1f8d62eb14f], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\nsyF9D7.tmp, En quarantaine, [8b0ab08759402610a7d611b7b849758b], PUP.Optional.PriceFountain, C:\Users\Lindsay.Neth\AppData\Local\Temp\ColloquialismsEmbryos.dll, En quarantaine, [b1e43106adeca78fd1bdf2cf22dfab55], PUP.Optional.PCSpeedUp, C:\Users\Lindsay.Neth\AppData\Local\Temp\pcspeedup_soft_.exe, En quarantaine, [841172c5efaa0b2bfff563d006fb35cb], PUP.Optional.RegistryReviver, C:\Users\Lindsay.Neth\AppData\Local\Temp\RegistryReviverFreeSetup_Dec2.exe, En quarantaine, [8c0957e02772171fc89fef45e61b19e7], PUP.Optional.QualityChecker, C:\Users\Lindsay.Neth\AppData\Local\Temp\nsp7E2A.tmp, En quarantaine, [3d58e84f9efb70c68733be0d1ce5ba46], PUP.Optional.Tuto4PC, C:\Users\Lindsay.Neth\AppData\Local\Temp\nsvA992.tmp, En quarantaine, [1e77a1961b7e42f431fad07838ca7888], Adware.ClickShell, C:\Users\Lindsay.Neth\AppData\Local\Temp\01-3c5ad226-199b-459e-8426-92d154ca01db\finalBundle, En quarantaine, [197cfa3d6c2d8ea8103f76547f820af6], PUP.Optional.Nosibay, C:\Users\Lindsay.Neth\AppData\Local\Temp\412016203848\Bubble Dock Uninstall.exe, En quarantaine, [5d387dba0f8ad85ecd9b6167c3410df3], PUP.Optional.Nosibay, C:\Users\Lindsay.Neth\AppData\Local\Temp\412016204057\Bubble Dock Uninstall.exe, En quarantaine, [ccc91324d1c8c96d64048f3913f1d828], Adware.EoRezo.Gen, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-40ETK.tmp\437.exe, En quarantaine, [4352d95ed1c8a195b606be0f1be6fa06], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-NUVSG.tmp\package_pzombie_installer_multilang.exe, En quarantaine, [197c8ea9cdcc1c1a5df54e7e8f72ad53], PUP.Optional.MaxDriverUpdater, C:\Users\Lindsay.Neth\AppData\Local\Temp\XX78LPY4CUBE\newversion.exe, En quarantaine, [6e27fa3d11888caa626ebe8fe021fa06], PUP.Optional.MaxDriverUpdater, C:\Users\Lindsay.Neth\AppData\Local\Temp\XX9UA4LWJ5FC\newversion.exe, En quarantaine, [9df87abd6c2d70c6854be568d72a6c94], PUP.Optional.MaxDriverUpdater, C:\Users\Lindsay.Neth\AppData\Local\Temp\XXGKG358WR6Q\newversion.exe, En quarantaine, [8e07c077ecadfd3911bfdc7157aa60a0], PUP.Optional.MaxDriverUpdater, C:\Users\Lindsay.Neth\AppData\Local\Temp\XXHYT9LX1CGC\newversion.exe, En quarantaine, [5d38043397020630a32ddb7255ac42be], PUP.Optional.SystemHealer, C:\Users\Lindsay.Neth\AppData\Local\Temp\in6B0A2FEB\68F92EA5_stp\SystemHealer_def.exe, En quarantaine, [b2e3db5cc6d396a023772a77ba473ec2], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-0AKHF.tmp\109.exe, En quarantaine, [abea4cebc3d688aebc9689434fb27a86], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-0AKHF.tmp\package_bobrowser_installer_multilang.exe, En quarantaine, [6c2992a51f7a3600dd75527a44bd27d9], Adware.EoRezo.Gen, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-1TLRD.tmp\package_AnySend_installer_multilang.exe, En quarantaine, [0590f93e5b3e152145772da0d22f0df3], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-28G4D.tmp\648.exe, En quarantaine, [8c09d067b4e55dd9b79bab2158a9738d], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-Q1CG5.tmp\109.exe, En quarantaine, [266fc572cbcedd59e0724b81a45df30d], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-Q1CG5.tmp\381.exe, En quarantaine, [3f566acd9405e84ece80b91057aa18e8], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-Q1CG5.tmp\623.exe, En quarantaine, [41543106fe9bb3837cd68349c73ad62a], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-Q1CG5.tmp\648.exe, En quarantaine, [6a2b54e31b7e2214153dd6f6639e6f91], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-Q1CG5.tmp\662.exe, En quarantaine, [b7de49ee59400a2c153dd2fa28d9c739], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-Q1CG5.tmp\package_bobrowser_installer_multilang.exe, En quarantaine, [593c6ccb4950db5b52007e4e639ef50b], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-Q1CG5.tmp\package_speedup_installer_multilang.exe, En quarantaine, [c8cd21164c4dad89f65cebe109f807f9], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-Q1CG5.tmp\package_wajam_installer_multilang.exe, En quarantaine, [217464d33b5ee35379d907c502ff956b], Adware.EoRezo.Gen, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-QC79M.tmp\package_AnySend_installer_multilang.exe, En quarantaine, [97fe0a2dfb9e81b57d3f16b7639ebf41], Adware.EoRezo.Gen, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-QEQ2S.tmp\109.exe, En quarantaine, [ebaa092e0e8b82b4229a834a4db4fa06], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-U05I7.tmp\109.exe, En quarantaine, [97feea4d2e6b1f17c68cdaf229d805fb], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-U05I7.tmp\package_AnySend_installer_multilang.exe, En quarantaine, [3a5ba2956b2e2b0b63ef5676ce330cf4], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-U05I7.tmp\package_bobrowser_installer_multilang.exe, En quarantaine, [e1b449eeadecd066a1b11bb1fd04bb45], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-U05I7.tmp\package_pzombie_installer_multilang.exe, En quarantaine, [4b4aea4d3069d75fdc76bd0f6c95dd23], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-U05I7.tmp\package_speedup_installer_multilang.exe, En quarantaine, [73223403fe9b4beb381a715b9d64bf41], PUP.Optional.PCSpeedUp, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-UJ5M2.tmp\speedup_soft_partner.exe, En quarantaine, [5d38a097ecad9f97e70dbc77c23f04fc], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-VL4N0.tmp\381.exe, En quarantaine, [f2a36fc8f7a24cea57f77e4b6b969769], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-VL4N0.tmp\623.exe, En quarantaine, [bfd6a88f5544aa8c95bd537921e0639d], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-VL4N0.tmp\662.exe, En quarantaine, [4055280fa9f0de58450dd1fbba47b749], PUP.Optional.PCMechanic, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-EP66U.tmp\pm-standalone-setup.exe, En quarantaine, [dabb8cab30695fd769a06db57d84b14f], Adware.EoRezo.Gen, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-FIB3M.tmp\package_AnySend_installer_multilang.exe, En quarantaine, [b5e0f542e0b944f25369dcf144bdd729], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-G3D63.tmp\package_wajam_installer_multilang.exe, En quarantaine, [d5c0092e2e6b61d5e1713a92d928f50b], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-GCOK7.tmp\643.exe, En quarantaine, [593c8aad9dfc42f4ee6413b97889e020], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-GCOK7.tmp\package_bubbledock_installer_multilang.exe, En quarantaine, [fa9bb2857029ac8a0a489537b64bb848], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-GCOK7.tmp\package_BubbleSound_installer_multilang.exe, En quarantaine, [841161d6f9a0ac8a8fc3ebe18f72ce32], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-GCOK7.tmp\package_vuupc_installer_multilang.exe, En quarantaine, [fb9a96a1a2f792a4c9af2d9fd8296e92], Adware.EoRezo.Gen, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-GOUMN.tmp\109.exe, En quarantaine, [4a4b2e09cdccbd79259711bc0ef38c74], Adware.EoRezo.Gen, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-GOUMN.tmp\package_AnySend_installer_multilang.exe, En quarantaine, [f0a504337128b581d9e33796c33ee61a], Adware.EoRezo.Gen, C:\Users\Lindsay.Neth\AppData\Local\Temp\is-GOUMN.tmp\package_bobrowser_installer_multilang.exe, En quarantaine, [2273c671e9b020161d9f17b6a65bd22e], PUP.Optional.MaxDriverUpdater, C:\Users\Lindsay.Neth\AppData\Local\Temp\XXIR7W536E45\newversion.exe, En quarantaine, [2f663502d1c867cfcc04c38af40d629e], PUP.Optional.MaxDriverUpdater, C:\Users\Lindsay.Neth\AppData\Local\Temp\XXPS496OBPKZ\newversion.exe, En quarantaine, [a3f2f1468811fe38399784c9e021d42c], PUP.Optional.MaxDriverUpdater, C:\Users\Lindsay.Neth\AppData\Local\Temp\XXUZ830AJ5YC\newversion.exe, En quarantaine, [732268cf7524e94d7e5261ec24dda957], PUP.Optional.Tuto4PC, C:\Users\Lindsay.Neth\AppData\Local\Temp\XXUZ830AJ5YC\SVH.exe, En quarantaine, [088d4ee9089177bf7b0f7abf13ed27d9], PUP.Optional.ConvertAd, C:\Windows\temp\rns6745.tmp.exe, En quarantaine, [ccc988af5e3bfa3cf970557817ea659b], Adware.ConvertAd, C:\Windows\temp\rns854C.tmp.exe, En quarantaine, [4f467fb84d4cc571775acf794cb6867a], PUP.Optional.ConvertAd, C:\Windows\temp\rnsA90B.tmp.exe, En quarantaine, [7b1a8cabf2a721153af7dbf271907789], Adware.ConvertAd, C:\Windows\temp\vns9BDB.tmp, En quarantaine, [8c0965d2c9d05fd7be01faa3857fad53], PUP.Optional.ConvertAd, C:\Windows\temp\vnsD7AF.tmp, En quarantaine, [7c1958df0e8b33036c83616d778af50b], Adware.ConvertAd, C:\Windows\temp\rnsBCF4.tmp.exe, En quarantaine, [d9bccc6b504924123b96cd7bc14128d8], Adware.ConvertAd, C:\Windows\temp\rnsDBD7.tmp.exe, En quarantaine, [c2d37cbb3a5f0b2bcea3d0781ae8d32d], Adware.PennyBee, C:\Windows\temp\bobca\Mojkiop.exe, En quarantaine, [029389aecbce9c9ae40c4684bd44c23e], PUP.Optional.PriceFountain, C:\Users\Lindsay.Neth\AppData\Local\CrucifiesImpellor\ColloquialismsEmbryos.dll, En quarantaine, [a6ef4bec554473c31f6fc10010f142be], PUP.Optional.AdPeak, C:\Users\Lindsay.Neth\AppData\Local\CrucifiesImpellor\uninst.exe, En quarantaine, [dfb6e057eeab300671acb8c219e8ca36], PUP.Optional.Tuto4PC, C:\Users\Lindsay.Neth\AppData\Local\SunnyDay3\Download\myoffergroup_fr.exe, En quarantaine, [c0d5fa3d6237b086c36cb1f3867b07f9], PUP.Optional.Tuto4PC, C:\Users\Lindsay.Neth\AppData\Local\SunnyDay3\Download\setup_rec_fr_150.exe, En quarantaine, [eca9c2758a0f1b1b9b5882477091a25e], Trojan.Agent, C:\Users\Lindsay.Neth\AppData\Local\Temp\oprun11835.exe, En quarantaine, [1580d1661d7c2313c6c3fb1e42c19070], Trojan.Agent, C:\Users\Lindsay.Neth\AppData\Local\Temp\oprun17664.exe, En quarantaine, [f5a0ee490f8ab87e7712ec2d8e75d22e], Trojan.Agent, C:\Users\Lindsay.Neth\AppData\Local\Temp\oprun24684.exe, En quarantaine, [4c49b87f8f0a043289001efb0300b050], Trojan.Agent, C:\Users\Lindsay.Neth\AppData\Local\Temp\oprun6135.exe, En quarantaine, [7a1b4beccdccd4624c3db762be45ff01], PUP.Optional.PullUpdate.Gen, C:\ProgramData\Paxecsednig\1.0.7.1\uonuvnud.exe.config, En quarantaine, [1f76092eb6e30f27391e0790ff0407f9], PUP.Optional.PullUpdate.Gen, C:\ProgramData\Paxecsednig\1.0.7.1\sqlite3.dll, En quarantaine, [1f76092eb6e30f27391e0790ff0407f9], PUP.Optional.PullUpdate.Gen, C:\ProgramData\Paxecsednig\1.0.7.1\time.dat, En quarantaine, [1f76092eb6e30f27391e0790ff0407f9], PUP.Optional.PullUpdate.Gen, C:\ProgramData\Paxecsednig\dat.dat, En quarantaine, [1f76092eb6e30f27391e0790ff0407f9], PUP.Optional.BubbleDock, C:\Users\Lindsay.Neth\AppData\Local\Temp\Bubble Dock.txt, En quarantaine, [b0e5e05776230630ca059c074eb524dc], PUP.Optional.BubbleDock, C:\Users\Lindsay.Neth\AppData\Local\Temp\LBubble Dock.txt, En quarantaine, [2b6abb7c30694de9fed32e75e0237c84], PUP.Optional.WombatService, C:\ProgramData\Service1291\Service1291.exe, En quarantaine, [870ebf78188161d569e40dd0c73cc23e], PUP.Optional.PastaLeads, C:\Users\Lindsay.Neth\AppData\Roaming\Opera Software\Opera Stable\Local Storage\http_nps.pastaleads.com_0.localstorage, En quarantaine, [375ef4436633072f483f875f649f4bb5], PUP.Optional.PastaLeads, C:\Users\Lindsay.Neth\AppData\Roaming\Opera Software\Opera Stable\Local Storage\http_nps.pastaleads.com_0.localstorage-journal, En quarantaine, [8a0bdc5be6b343f3d5b28c5a60a319e7], PUP.Optional.Snoozer, C:\Windows\System32\Tasks\Seventh, En quarantaine, [761f4deab9e0f83e61b8b236c340fa06], PUP.Optional.Snoozer, C:\Windows\System32\Tasks\Sixth, En quarantaine, [247147f0a7f200360911e008758ebb45], PUP.Optional.VBates, C:\Users\Lindsay.Neth\AppData\LocalLow\Company\Product\1.0\localStorageIE.txt, En quarantaine, [7025181fc3d63105b782ac3d13f026da], PUP.Optional.VBates, C:\Users\Lindsay.Neth\AppData\LocalLow\Company\Product\1.0\localStorageIE_backup.txt, En quarantaine, [7025181fc3d63105b782ac3d13f026da], PUP.Optional.VBates.WnskRST, C:\Users\Lindsay.Neth\AppData\Local\Temp\shopperz030120161448_installer_1451826843.txt, En quarantaine, [167fc4736039f64010bb56bfe321ca36], PUP.Optional.VBates.WnskRST, C:\Users\Lindsay.Neth\AppData\Local\Temp\shopperz080120161440_installer_1452335087.txt, En quarantaine, [4c494dea0e8bba7ccffc2fe630d4758b], PUP.Optional.IStartPageing.ChrPRST, C:\Users\Lindsay.Neth\AppData\Roaming\Opera Software\Opera Stable\Local Storage\http_www.istartpageing.com_0.localstorage, En quarantaine, [514462d571280a2cb672cf4f2cd8f20e], PUP.Optional.IStartPageing.ChrPRST, C:\Users\Lindsay.Neth\AppData\Roaming\Opera Software\Opera Stable\Local Storage\http_www.istartpageing.com_0.localstorage-journal, En quarantaine, [e1b441f60693d3637dabf82650b4926e], PUP.Optional.WinYahoo, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\HowToRemove.html.lnk, En quarantaine, [5a3b082f0c8ded49cb70aa746c98fa06], PUP.Optional.BestPriceNinja, C:\Users\Lindsay.Neth\AppData\Roaming\Opera Software\Opera Stable\Local Storage\http_pstatic.bestpriceninja.com_0.localstorage, En quarantaine, [009552e52970dc5ae1a18799a0649967], PUP.Optional.BestPriceNinja, C:\Users\Lindsay.Neth\AppData\Roaming\Opera Software\Opera Stable\Local Storage\http_pstatic.bestpriceninja.com_0.localstorage-journal, En quarantaine, [61342b0c6e2bec4a2b579b85758f2ed2], PUP.Optional.PriceFountain, C:\Windows\System32\Tasks\Lindsay.NethCrucifiesImpellorV2, En quarantaine, [e4b167d0f5a4340206fd43def80c7f81], PUP.Optional.Komodia, C:\Users\Lindsay.Neth\AppData\Local\Temp\zcengine.log, En quarantaine, [00955cdbff9a25114534160c9a6abd43], PUP.Optional.Komodia, C:\Windows\temp\zcengine.log, En quarantaine, [771e74c37b1e3cfaf881fd257b89c13f], PUP.Optional.MyBrowser, C:\Windows\System32\Tasks\IBUpd2, En quarantaine, [1b7a2017c2d70e2817b49a896e960cf4], PUP.Optional.Palikan, C:\Users\Lindsay.Neth\AppData\LocalLow\Microsoft\Internet Explorer\Services\Palikan.ico, En quarantaine, [82133bfc38614ee80b56180c887c16ea], PUP.Optional.SearchModule, C:\Windows\System32\Tasks\RSPro, En quarantaine, [0392c3748217270f6bf7eb3942c22bd5], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\SunnyDay3\conf.cyl, En quarantaine, [efa6f93e6b2e6cca91caf72ea55fe41c], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\SunnyDay3\user_profil.cyp, En quarantaine, [efa6f93e6b2e6cca91caf72ea55fe41c], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\SunnyDay3\Download\myoffergroup_fr.exe, En quarantaine, [efa6f93e6b2e6cca91caf72ea55fe41c], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\SunnyDay3\Download\setup_rec_fr_150.exe, En quarantaine, [efa6f93e6b2e6cca91caf72ea55fe41c], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\SunnyDay3\Download\setup_rec_fr_161.exe, En quarantaine, [efa6f93e6b2e6cca91caf72ea55fe41c], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\SunnyDay3\SunnyDay3\1.20\cnf.cyl, En quarantaine, [efa6f93e6b2e6cca91caf72ea55fe41c], Adware.EoRezo, C:\Users\Lindsay.Neth\AppData\Local\SunnyDay3\SunnyDay3\1.20\eorezo.cyl, En quarantaine, [efa6f93e6b2e6cca91caf72ea55fe41c], Adware.EoRezo, C:\Program Files (x86)\SunnyDay3\unins000.dat, En quarantaine, [e0b585b2edac60d6421a988d91735fa1], Adware.EoRezo, C:\Program Files (x86)\SunnyDay3\unins000.exe, En quarantaine, [e0b585b2edac60d6421a988d91735fa1], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030120161448\csrcc.exe, Supprimer au redémarrage, [841173c46d2cd16524fc336048bace32], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030120161448\prc.exe, Supprimer au redémarrage, [841173c46d2cd16524fc336048bace32], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030120161448\Ticsifi.dll, Supprimer au redémarrage, [841173c46d2cd16524fc336048bace32], PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030120161448\Ticsifi64.dll, Supprimer au redémarrage, [841173c46d2cd16524fc336048bace32], Adware.LaSuperba, C:\uninst\uninstall.html, En quarantaine, [b3e2e7500e8b171ff93a07ccf31102fe], PUP.Optional.PriceFountain.Gen, C:\Users\Lindsay.Neth\AppData\Local\CrucifiesImpellor\Rkey.dat, En quarantaine, [0f86d067bbde6ec8d9b04d869074c53b], PUP.Optional.PriceFountain.Gen, C:\Users\Lindsay.Neth\AppData\Local\CrucifiesImpellor\OrphanElidible.dat, En quarantaine, [0f86d067bbde6ec8d9b04d869074c53b], PUP.Optional.HijackHosts.Gen, C:\Windows\System32\egi\banb\eilo.dat, En quarantaine, [633250e710892b0b4baa16b8b25212ee], PUP.Optional.HijackHosts.Gen, C:\Windows\System32\kei\woq\nalec.dat, En quarantaine, [8114f146cecbcf6742b499355ca84bb5], Secteurs physiques: 0 (Aucun élément malveillant détecté) (end)