Malwarebytes Anti-Malware www.malwarebytes.org Date de l'analyse: 11/04/2016 Heure de l'analyse: 15:28 Fichier journal: Rapport MBAM 1.txt Administrateur: Oui Version: 2.2.1.1043 Base de données de programmes malveillants: v2016.04.11.03 Base de données de rootkits: v2016.04.09.01 Licence: Gratuit Protection contre les programmes malveillants: Désactivé Protection contre les sites Web malveillants: Désactivé Autoprotection: Désactivé Système d'exploitation: Windows 7 Service Pack 1 Processeur: x64 Système de fichiers: NTFS Utilisateur: Julian Type d'analyse: Analyse des menaces Résultat: Terminé Objets analysés: 425154 Temps écoulé: 33 min, 12 s Mémoire: Activé Démarrage: Activé Système de fichiers: Activé Archives: Activé Rootkits: Désactivé Heuristique: Activé PUP: Activé PUM: Activé Processus: 0 (Aucun élément malveillant détecté) Modules: 0 (Aucun élément malveillant détecté) Clés du Registre: 4 PUP.Optional.Vosteran, HKLM\SOFTWARE\CLIENTS\STARTMENUINTERNET\Vosteran.ZYBNXKGBLCG3FLWOC6X5QAY3CE, En quarantaine, [58371e8fe6b3082e5c870f386a9a05fb], PUP.Optional.Vosteran, HKLM\SOFTWARE\WOW6432NODE\CLIENTS\STARTMENUINTERNET\Vosteran.ZYBNXKGBLCG3FLWOC6X5QAY3CE, En quarantaine, [e5aad5d8613800364e95f25517ed8b75], PUP.Optional.Vosteran, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\MEDIAPLAYER\SHIMINCLUSIONLIST\vosteran.exe, En quarantaine, [66297e2fbcdd9e988462f552d133af51], PUP.Optional.DynamoCombo, HKU\S-1-5-21-817038105-3695911761-3900319429-1000\SOFTWARE\Dynamo Combo, En quarantaine, [58371895257485b1174a0c110004e020], Valeurs du Registre: 3 PUP.Optional.Vosteran, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY|AppPath, C:\Program Files (x86)\WSE_Vosteran\\, En quarantaine, [9ef18c21b1e8a690abcc946bb64d29d7] PUP.Optional.DynamoCombo, HKU\S-1-5-21-817038105-3695911761-3900319429-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|AutoConfigURL, file://C:\Program Files (x86)\Dynamo Combo\bin\Pac8807.js, En quarantaine, [a1eea9043c5d241276ec4bd29f65ac54] PUP.Optional.Vosteran, HKU\S-1-5-21-817038105-3695911761-3900319429-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE|WSE_Vosteran, C:\Windows\SysWOW64\wscript.exe /E:vbscript /B "C:\Users\Julian\AppData\Roaming\WSE_Vosteran\UpdateProc\bkup.dat", En quarantaine, [e5aa28853861d264429e291eb84c33cd] Données du Registre: 2 PUP.Optional.Qone8, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES|DefaultScope, {33BB0A4E-99AF-4226-BDF6-49120163DE86}, Bon : ({0633EE93-D776-472f-A0FF-E1416B8B2E3A}), Mauvais : ({33BB0A4E-99AF-4226-BDF6-49120163DE86}),Remplacé,[424de8c529700b2bd4b1230d48bdf709] PUP.Optional.Qone8, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES|DefaultScope, {33BB0A4E-99AF-4226-BDF6-49120163DE86}, Bon : ({0633EE93-D776-472f-A0FF-E1416B8B2E3A}), Mauvais : ({33BB0A4E-99AF-4226-BDF6-49120163DE86}),Remplacé,[e6a99f0e5940c96deb9ab57b2bda3ac6] Dossiers: 6 PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.ASK.Gen, C:\Windows\Temp\APN-Stub, En quarantaine, [513efab3bcddd6602461eb3b24df4ab6], PUP.Optional.ASK.Gen, C:\Windows\Temp\APN-Stub\ORJ-V7C, En quarantaine, [513efab3bcddd6602461eb3b24df4ab6], PUP.Optional.DesktopTool, C:\Users\Public\Documents\Baidu\Common\I18N\IPCSUpdateCache\DesktopToolMini_global, En quarantaine, [97f8ad0055445adc6711cd5dab5808f8], PUP.Optional.PullUpdate, C:\ProgramData\cNMTsQMLg\dat, En quarantaine, [99f6496431682e08ef19421b18ed50b0], PUP.Optional.PullUpdate, C:\ProgramData\cNMTsQMLg, En quarantaine, [99f6496431682e08ef19421b18ed50b0], Fichiers: 114 PUP.Optional.PullUpdate, C:\ProgramData\cNMTsQMLg\dat\dDlDmIk.dll, En quarantaine, [e2adc8e56138fe38bab7f57fc839c23e], PUP.Optional.ZombieInvasion, C:\ProgramData\cNMTsQMLg\dat\jqUGuD.dll, En quarantaine, [0d822c818a0fc57107b4d219ef157987], PUP.Optional.PayByAds, C:\Users\Julian\AppData\Roaming\ZHP\Quarantine\res.dll, En quarantaine, [0887d6d7c4d5aa8cabb490bf927353ad], PUP.Optional.ConvertAd, C:\Users\Julian\AppData\Roaming\ZHP\Quarantine\223F.tmp.exe, En quarantaine, [414ec3ea29703501db14749215edd030], PUP.Optional.ConvertAd, C:\Users\Julian\AppData\Roaming\ZHP\Quarantine\45CE.tmp.exe, En quarantaine, [1976515c82177abc02ed6d9924de6898], PUP.Optional.ConvertAd, C:\Users\Julian\AppData\Roaming\ZHP\Quarantine\66FC.tmp.exe, En quarantaine, [3956ddd05b3e55e177a124be4bb60af6], PUP.Optional.HealthAlert, C:\Users\Julian\AppData\Roaming\ZHP\Quarantine\gohIyEdlJ.exe, En quarantaine, [49467b326930999dd6668dbfd52cd12f], PUP.Optional.ChinAd, C:\Users\Julian\AppData\Roaming\ZHP\Quarantine\InstallHelper.exe, En quarantaine, [c5ca218c4455c47287e16858d22f6b95], PUP.Optional.Somoto, C:\Users\Julian\AppData\Roaming\ZHP\Quarantine\bitool.dll, En quarantaine, [cec11c91edac1e18229f1d408b77da26], PUP.Optional.Nosibay, C:\Users\Julian\AppData\Roaming\ZHP\Quarantine\Bubble Dock Uninstall.exe, En quarantaine, [4946e1ccbbde9b9b3b6f5bf8d332ee12], PUP.Optional.HealthAlert, C:\Users\Julian\AppData\Roaming\ZHP\Quarantine\Rlkepq.exe, En quarantaine, [147bb1fc18811c1aaf8d70dcbb46df21], PUP.Optional.HealthAlert, C:\Users\Julian\AppData\Roaming\ZHP\Quarantine\rlkepq.exe.VIR, En quarantaine, [a3ec37761089be786bd157f513ee19e7], PUP.Optional.Nosibay, C:\Users\Julian\AppData\Roaming\ZHP\Quarantine\Selection Tools Uninstall.exe, En quarantaine, [a1ee8e1f4e4bbf77951576dd0203768a], PUP.Optional.CinePlus, C:\Users\Julian\AppData\Roaming\ZHP\Quarantine\setup.exe, En quarantaine, [d2bd624b267365d16f5ab99541c47888], PUP.Optional.StartPoint, C:\Users\Julian\AppData\Roaming\ZHP\Quarantine\startpoint_1.exe, En quarantaine, [b5da941951480b2b4b9e2b02e41c6f91], PUP.Optional.StartPoint, C:\Users\Julian\AppData\Roaming\ZHP\Quarantine\startup.exe, En quarantaine, [c4cb7b32841540f633b69a93619fdb25], PUP.Optional.Nosibay, C:\Users\Julian\AppData\Roaming\ZHP\Quarantine\WindApp Uninstall.exe, En quarantaine, [93fc6e3f75243600d9d12d26e02542be], PUP.Optional.HealthAlert, C:\Users\Julian\AppData\Roaming\ZHP\Quarantine\xIdLGczqToR.exe, En quarantaine, [038cc0ed277237ff1c206ede28d924dc], PUP.Optional.PullUpdate, C:\Users\Julian\AppData\Roaming\ZHP\Quarantine\Radio.DIR\prompt.exe, En quarantaine, [b2dd98157c1daf8734de0f4054ad9f61], PUP.Optional.IStartPageing.ChrPRST, C:\Users\Julian\AppData\Local\Temp\nsaF8AC.tmp, En quarantaine, [325d8b2249502214c0e19cb9d82da759], PUP.Optional.CheckOffer, C:\Users\Julian\AppData\Local\Temp\nsb16F8.tmp, En quarantaine, [5c334865eeab082e6901b4711ae78f71], PUP.Optional.CalendarTool, C:\Users\Julian\AppData\Local\Temp\DesktopToolMini_global.exe, En quarantaine, [96f9c2ebc9d0be78b3921cdbf20f8779], PUP.Optional.ConvertAd, C:\Users\Julian\AppData\Local\Temp\nsb7468.tmp, En quarantaine, [3758a706fd9c211592e38960a25f9b65], PUP.Optional.Amonetize, C:\Users\Julian\AppData\Local\Temp\Pharaon+Gold+BPCD+BMULTID__10924_i1725139106_il2775605.exe, En quarantaine, [8d02535acecb9a9ca440a823fe03ad53], Adware.EoRezo, C:\Users\Julian\AppData\Local\Temp\nsp1147.tmp, En quarantaine, [533cf9b47623c86e09a0885aea177f81], PUP.Optional.Somoto, C:\Users\Julian\AppData\Local\Temp\nspA459.tmp, En quarantaine, [5f304469e9b0003635c016e83ec31de3], PUP.Optional.CheckOffer, C:\Users\Julian\AppData\Local\Temp\nsq5436.tmp, En quarantaine, [f39c4e5f7c1d6fc794d6f33242bfc23e], Adware.EoRezo, C:\Users\Julian\AppData\Local\Temp\nsuA7F7.tmp, En quarantaine, [8807911c2b6e51e55851a53d38c99e62], PUP.Optional.CheckOffer, C:\Users\Julian\AppData\Local\Temp\nsv2EA3.tmp, En quarantaine, [a9e66e3f990041f54c1ebf66c63b4bb5], Adware.EoRezo, C:\Users\Julian\AppData\Local\Temp\nsv6D55.tmp, En quarantaine, [a3ec35787821270fadfcf3ef738e22de], Adware.EoRezo, C:\Users\Julian\AppData\Local\Temp\nsvCB6C.tmp, En quarantaine, [7d127736f4a5c96d3475dc06d32e28d8], PUP.Optional.PreInstaller, C:\Users\Julian\AppData\Local\Temp\nsvF3B9.tmp, En quarantaine, [256ad4d940591c1aa64bf05e9c659967], PUP.Optional.OutBrowse, C:\Users\Julian\AppData\Local\Temp\nswF4EB.tmp, En quarantaine, [404f7c312277f73f40fc5673a0610af6], PUP.Optional.PreInstaller, C:\Users\Julian\AppData\Local\Temp\nsx766.tmp, En quarantaine, [aae5515cd5c442f425cc8fbf6899748c], PUP.Optional.ConvertAd, C:\Users\Julian\AppData\Local\Temp\nsy886.tmp, En quarantaine, [d6b92c81badf9e98b8673b42857d966a], PUP.Optional.Bundler, C:\Users\Julian\AppData\Local\Temp\fsd1675.exe, En quarantaine, [e0af68456237e6501cc1c768659b817f], PUP.Optional.Bundler, C:\Users\Julian\AppData\Local\Temp\fsd895C.exe, En quarantaine, [4b44bcf109907db9d409e54ac13f8d73], PUP.Optional.Bundler, C:\Users\Julian\AppData\Local\Temp\fsdC90.exe, En quarantaine, [9cf33b724d4cb08609d48aa532ce50b0], PUP.Optional.Bundler, C:\Users\Julian\AppData\Local\Temp\fsdFB66.exe, En quarantaine, [c4cbac01eaaf5dd99449a08f7c8456aa], PUP.Optional.IStartPageing.ChrPRST, C:\Users\Julian\AppData\Local\Temp\nscDF3E.tmp, En quarantaine, [800f129b386106301e8360f50302df21], PUP.Optional.PreInstaller, C:\Users\Julian\AppData\Local\Temp\nsf8216.tmp, En quarantaine, [d0bf0da01b7e3df96e838fbfac55c43c], PUP.Optional.ConvertAd, C:\Users\Julian\AppData\Local\Temp\nsg92D8.tmp, En quarantaine, [5e31ac01e1b8e25496b7bade9f6324dc], PUP.Optional.PreInstaller, C:\Users\Julian\AppData\Local\Temp\nsgA614.tmp, En quarantaine, [6f206944f0a98ea81ed390bed22f7987], PUP.Optional.ConvertAd, C:\Users\Julian\AppData\Local\Temp\nsj7E1E.tmp, En quarantaine, [deb14568019822143af8148626dc6997], PUP.Optional.CheckOffer, C:\Users\Julian\AppData\Local\Temp\nsn5EEE.tmp, En quarantaine, [b9d607a64c4ddd595614ff2612eff60a], Adware.EoRezo, C:\Users\Julian\AppData\Local\Temp\nsn8AD2.tmp, En quarantaine, [bad51b9253463cfa2584984ada27aa56], PUP.Optional.OutBrowse, C:\Users\Julian\AppData\Local\Temp\nsn8CF3.tmp, En quarantaine, [850a1c912b6e49ed6fcd8e3bb64b24dc], PUP.Optional.Tuto4PC, C:\Users\Julian\AppData\Local\Temp\is-AM550.tmp\gentlemjmp_ieu.exe, En quarantaine, [543b05a80495b87e4b469628f20f639d], PUP.Optional.Tuto4PC, C:\Users\Julian\AppData\Local\Temp\is-C4A5V.tmp\TUTOBUN.exe, En quarantaine, [117e8726d9c0290d443ca23004fd8f71], Adware.EoRezo, C:\Users\Julian\AppData\Local\Temp\is-F72JM.tmp\493.exe, En quarantaine, [bbd4416c9bfe9d9976021fc7f20f28d8], Adware.EoRezo, C:\Users\Julian\AppData\Local\Temp\is-F72JM.tmp\583.exe, En quarantaine, [e0af0f9e752465d1abcd885ebe439b65], Adware.EoRezo, C:\Users\Julian\AppData\Local\Temp\is-F72JM.tmp\648.exe, En quarantaine, [4847426b3d5c9a9c5d1b697df011956b], Adware.EoRezo, C:\Users\Julian\AppData\Local\Temp\is-F72JM.tmp\package_AnySend_installer_multilang.exe, En quarantaine, [6f20c3ea1e7b7bbb780019cdf20f728e], Adware.EoRezo, C:\Users\Julian\AppData\Local\Temp\is-F72JM.tmp\package_pzombie_installer_multilang.exe, En quarantaine, [236c8627f2a777bf9fd93aacd031827e], Adware.EoRezo.Gen, C:\Users\Julian\AppData\Local\Temp\is-IO0FH.tmp\493.exe, En quarantaine, [127d911c6831c472f8e5edfa4bb614ec], Adware.EoRezo, C:\Users\Julian\AppData\Local\Temp\is-JE821.tmp\493.exe, En quarantaine, [e9a67538b0e9a39367114a9c25dcfe02], Adware.EoRezo, C:\Users\Julian\AppData\Local\Temp\is-JE821.tmp\583.exe, En quarantaine, [9cf3cde00a8f35017602e105cf32cf31], Adware.EoRezo, C:\Users\Julian\AppData\Local\Temp\is-JE821.tmp\648.exe, En quarantaine, [800f16973465df5747315e88768ba957], Adware.EoRezo, C:\Users\Julian\AppData\Local\Temp\is-JE821.tmp\package_AnySend_installer_multilang.exe, En quarantaine, [bdd208a5f6a360d6195f24c231d06799], Adware.EoRezo, C:\Users\Julian\AppData\Local\Temp\is-JE821.tmp\package_pzombie_installer_multilang.exe, En quarantaine, [f29d14996b2ef145fb7dc620f1100bf5], Adware.EoRezo.Gen, C:\Users\Julian\AppData\Local\Temp\is-KTTGJ.tmp\493.exe, En quarantaine, [4e41e8c5c6d343f3ebf20ed969980ff1], Adware.EoRezo.Gen, C:\Users\Julian\AppData\Local\Temp\is-KTTGJ.tmp\package_pzombie_installer_multilang.exe, En quarantaine, [6c239617792058de12cb35b26c956e92], Adware.EoRezo.Gen, C:\Users\Julian\AppData\Local\Temp\is-N64QJ.tmp\11.exe, En quarantaine, [9bf40da0801975c12ab280677091e11f], Adware.EoRezo, C:\Users\Julian\AppData\Local\Temp\is-N64QJ.tmp\465.exe, En quarantaine, [523d8429e9b07fb7776c7e661fe28e72], Adware.EoRezo.Gen, C:\Users\Julian\AppData\Local\Temp\is-N64QJ.tmp\493.exe, En quarantaine, [b5da733a6e2b49ed31ac3daa38c953ad], Adware.EoRezo.Gen, C:\Users\Julian\AppData\Local\Temp\is-N64QJ.tmp\583.exe, En quarantaine, [d7b8e9c47c1d8caa6a736c7b9f6252ae], Adware.EoRezo.Gen, C:\Users\Julian\AppData\Local\Temp\is-N64QJ.tmp\607.exe, En quarantaine, [820daffe8e0bf93dd4091acd21e03ec2], Adware.EoRezo.Gen, C:\Users\Julian\AppData\Local\Temp\is-N64QJ.tmp\692.exe, En quarantaine, [dcb3d2db64357eb816c7549313ee25db], Adware.EoRezo.Gen, C:\Users\Julian\AppData\Local\Temp\is-N64QJ.tmp\package_AnySend_installer_multilang.exe, En quarantaine, [f19eb7f6693004327d608e59dc25e31d], Adware.EoRezo.Gen, C:\Users\Julian\AppData\Local\Temp\is-N64QJ.tmp\package_BubbleSound_installer_multilang.exe, En quarantaine, [8807f2bb80198aacd904b92ed42d8b75], Adware.EoRezo.Gen, C:\Users\Julian\AppData\Local\Temp\is-N64QJ.tmp\package_pzombie_installer_multilang.exe, En quarantaine, [d0bffbb20d8c8aacc91418cf7f8217e9], Adware.EoRezo, C:\Users\Julian\AppData\Local\Temp\is-FPNE2.tmp\dm.exe, En quarantaine, [9ef1703dfa9f0f27644d77db649c24dc], PUP.Optional.CheckOffer, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\nsCBHTML5.dll, En quarantaine, [642b5e4fa5f4023481e985a038c95ea2], PUP.Optional.Clara, C:\Windows\Temp\SienUpdater\s1sg.exe, En quarantaine, [97f8b4f98a0f2b0b384ddc7a52b3ef11], PUP.Optional.OpenCandy, C:\Users\Julian\Downloads\daemon-tools-lite_4-49-1_fr_10729.exe, En quarantaine, [d5badad303962a0cd3d51236e3224db3], PUP.Optional.InstallCore, C:\Users\Julian\Downloads\daemon-tools-lite_4-49_fr_10729.exe, En quarantaine, [028d6449dcbda2943d4469d0e51c06fa], PUP.Optional.Boxore.WnskRST, C:\Windows\Temp\BoxoreService.log, En quarantaine, [5a351a938f0a8caa9b30f192d331728e], PUP.Optional.Boxore.WnskRST, C:\Windows\Temp\BoxoreServicer.log, En quarantaine, [bfd0901d336638fe9e2d740f04009f61], PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\OfferScreen_397.html, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\blowfish.dll, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\FirstResult.txt, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\GetVersion.dll, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\HA_logo.png, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\header.bmp, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\img12_1.jpg, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\inner.png, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\logoWajam.png, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\manlib.dll, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\Math.dll, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\nsDialogs.dll, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\nsisunz.dll, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\Offer1.zip, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\Offer2.zip, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\Offer3.zip, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\Offer4.zip, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\OfferScreen_12.html, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\OfferScreen_38.html, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\OfferScreen_590.html, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\registry.dll, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\SecondResult.txt, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\serlib.dll, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\System.dll, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.OfferScreen, C:\Users\Julian\AppData\Local\Temp\nsh3646.tmp\UserInfo.dll, En quarantaine, [008f9e0f4f4a4ee8fb85b4e9e222f50b], PUP.Optional.ASK.Gen, C:\Windows\Temp\APN-Stub\ORJ-V7C\Msi3422e001-8440-4fa4-9506-a53921ff9e25.log, En quarantaine, [513efab3bcddd6602461eb3b24df4ab6], PUP.Optional.ASK.Gen, C:\Windows\Temp\APN-Stub\ORJ-V7C\Msiae72b7aa-2481-4e69-bf3f-d52626dfc461.log, En quarantaine, [513efab3bcddd6602461eb3b24df4ab6], PUP.Optional.ASK.Gen, C:\Windows\Temp\APN-Stub\ORJ-V7C\Stb3422e001-8440-4fa4-9506-a53921ff9e25.log, En quarantaine, [513efab3bcddd6602461eb3b24df4ab6], PUP.Optional.ASK.Gen, C:\Windows\Temp\APN-Stub\ORJ-V7C\Stbae72b7aa-2481-4e69-bf3f-d52626dfc461.log, En quarantaine, [513efab3bcddd6602461eb3b24df4ab6], PUP.Optional.ASK.Gen, C:\Windows\Temp\APN-Stub\ORJ-V7C\Stbecb13a95-edfd-4643-829f-bf8a43693b0a.log, En quarantaine, [513efab3bcddd6602461eb3b24df4ab6], PUP.Optional.PullUpdate, C:\ProgramData\cNMTsQMLg\dat\gohIyEdlJ.exe.config, En quarantaine, [99f6496431682e08ef19421b18ed50b0], PUP.Optional.PullUpdate, C:\ProgramData\cNMTsQMLg\dat\xIdLGczqToR.exe.config, En quarantaine, [99f6496431682e08ef19421b18ed50b0], PUP.Optional.PullUpdate, C:\ProgramData\cNMTsQMLg\info.dat, En quarantaine, [99f6496431682e08ef19421b18ed50b0], PUP.Optional.PullUpdate, C:\ProgramData\cNMTsQMLg\Rlkepq.dat, En quarantaine, [99f6496431682e08ef19421b18ed50b0], PUP.Optional.Amonetize, C:\Users\Julian\AppData\Local\Temp\amipixel.cfg, En quarantaine, [b9d6604d7128a98d926a79e607fe916f], PUP.Optional.IStartPageing, C:\Users\Julian\AppData\Local\Temp\HomePage.dat, En quarantaine, [99f6416cb9e089ad7ca99ec2986d8b75], Secteurs physiques: 0 (Aucun élément malveillant détecté) (end)