Format du document : text/plain
Prévisualisation
Malwarebytes Anti-Malware
www.malwarebytes.org
Date de l'analyse: 06/08/2016
Heure de l'analyse: 17:37
Fichier journal:
Administrateur: Oui
Version: 2.2.1.1043
Base de données de programmes malveillants: v2016.08.06.10
Base de données de rootkits: v2016.05.27.01
Licence: Gratuit
Protection contre les programmes malveillants: Désactivé
Protection contre les sites Web malveillants: Désactivé
Autoprotection: Désactivé
Système d'exploitation: Windows 10
Processeur: x64
Système de fichiers: NTFS
Utilisateur: clafo
Type d'analyse: Analyse des menaces
Résultat: Terminé
Objets analysés: 303978
Temps écoulé: 27 min, 32 s
Mémoire: Activé
Démarrage: Activé
Système de fichiers: Activé
Archives: Activé
Rootkits: Activé
Heuristique: Activé
PUP: Activé
PUM: Activé
Processus: 1
Trojan.ProxyHijacker, C:\Program Files (x86)\WildTangent Games\App\GamesAppIntegrationService.exe, 6568, Supprimer au redémarrage, [3ea4cc7b5446dd59d1c07d1960a235cb]
Modules: 0
(Aucun élément malveillant détecté)
Clés du Registre: 53
Trojan.Injector, HKLM\SOFTWARE\CLASSES\CLSID\{59810A5F-916B-4570-86D6-2BE98FEAB846}, En quarantaine, [04de380fb0ea3ef8d1499b1743be22de],
Trojan.Injector, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{59810A5F-916B-4570-86D6-2BE98FEAB846}, En quarantaine, [04de380fb0ea3ef8d1499b1743be22de],
Trojan.Injector, HKLM\SOFTWARE\CLASSES\TYPELIB\{9AE7A6AE-162E-44c4-9A2B-A6B4EF19909D}, En quarantaine, [04de380fb0ea3ef8d1499b1743be22de],
Trojan.Injector, HKLM\SOFTWARE\CLASSES\INTERFACE\{E4C3E50F-5761-4BF8-95A0-939A819DF1C3}, En quarantaine, [04de380fb0ea3ef8d1499b1743be22de],
Trojan.Injector, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{E4C3E50F-5761-4BF8-95A0-939A819DF1C3}, En quarantaine, [04de380fb0ea3ef8d1499b1743be22de],
Trojan.Injector, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{E4C3E50F-5761-4BF8-95A0-939A819DF1C3}, En quarantaine, [04de380fb0ea3ef8d1499b1743be22de],
Trojan.Injector, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{9AE7A6AE-162E-44c4-9A2B-A6B4EF19909D}, En quarantaine, [04de380fb0ea3ef8d1499b1743be22de],
Trojan.Injector, HKLM\SOFTWARE\CLASSES\WOW6432NODE\TYPELIB\{9AE7A6AE-162E-44c4-9A2B-A6B4EF19909D}, En quarantaine, [04de380fb0ea3ef8d1499b1743be22de],
Trojan.Injector, HKLM\SOFTWARE\CLASSES\Extension.Lhmorv.1, En quarantaine, [04de380fb0ea3ef8d1499b1743be22de],
Trojan.Injector, HKLM\SOFTWARE\CLASSES\Extension.Lhmorv, En quarantaine, [04de380fb0ea3ef8d1499b1743be22de],
Trojan.Injector, HKLM\SOFTWARE\WOW6432NODE\CLASSES\Extension.Lhmorv, En quarantaine, [04de380fb0ea3ef8d1499b1743be22de],
Trojan.Injector, HKLM\SOFTWARE\CLASSES\WOW6432NODE\Extension.Lhmorv, En quarantaine, [04de380fb0ea3ef8d1499b1743be22de],
Trojan.Injector, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{59810A5F-916B-4570-86D6-2BE98FEAB846}, En quarantaine, [04de380fb0ea3ef8d1499b1743be22de],
Trojan.Injector, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{59810A5F-916B-4570-86D6-2BE98FEAB846}, En quarantaine, [04de380fb0ea3ef8d1499b1743be22de],
Trojan.Injector, HKLM\SOFTWARE\WOW6432NODE\CLASSES\Extension.Lhmorv.1, En quarantaine, [04de380fb0ea3ef8d1499b1743be22de],
Trojan.Injector, HKLM\SOFTWARE\CLASSES\WOW6432NODE\Extension.Lhmorv.1, En quarantaine, [04de380fb0ea3ef8d1499b1743be22de],
Trojan.Injector, HKLM\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{59810A5F-916B-4570-86D6-2BE98FEAB846}, En quarantaine, [04de380fb0ea3ef8d1499b1743be22de],
Trojan.Injector, HKU\S-1-5-21-954712899-2948078468-259400359-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{59810A5F-916B-4570-86D6-2BE98FEAB846}, En quarantaine, [04de380fb0ea3ef8d1499b1743be22de],
Trojan.Injector, HKU\S-1-5-21-954712899-2948078468-259400359-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{59810A5F-916B-4570-86D6-2BE98FEAB846}, En quarantaine, [04de380fb0ea3ef8d1499b1743be22de],
Trojan.Injector, HKLM\SOFTWARE\CLASSES\CLSID\{59810A5F-916B-4570-86D6-2BE98FEAB846}\INPROCSERVER32, En quarantaine, [04de380fb0ea3ef8d1499b1743be22de],
Trojan.ProxyHijacker, HKLM\SOFTWARE\CLASSES\Microsoft Toolkit 2.6.6__9465_il71602.DynamicNS, En quarantaine, [32b049fe9ffbc0768110dfb703ffcb35],
Trojan.ProxyHijacker, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\GamesAppIntegrationService, En quarantaine, [3ea4cc7b5446dd59d1c07d1960a235cb],
Trojan.ProxyHijacker, HKLM\SOFTWARE\WOW6432NODE\CLASSES\Microsoft Toolkit 2.6.6__9465_il71602.DynamicNS, En quarantaine, [3ea4cc7b5446dd59d1c07d1960a235cb],
Trojan.ProxyHijacker, HKLM\SOFTWARE\CLASSES\WOW6432NODE\Microsoft Toolkit 2.6.6__9465_il71602.DynamicNS, En quarantaine, [3ea4cc7b5446dd59d1c07d1960a235cb],
PUP.Optional.VBates.WnskRST, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{59810A5F-916B-4570-86D6-2BE98FEAB846}, En quarantaine, [568c4afdd6c481b59f617c5fe12010f0],
PUP.Optional.VBates.WnskRST, HKLM\SOFTWARE\CLASSES\TYPELIB\{9AE7A6AE-162E-44c4-9A2B-A6B4EF19909D}, En quarantaine, [568c4afdd6c481b59f617c5fe12010f0],
PUP.Optional.VBates.WnskRST, HKLM\SOFTWARE\CLASSES\INTERFACE\{E4C3E50F-5761-4BF8-95A0-939A819DF1C3}, En quarantaine, [568c4afdd6c481b59f617c5fe12010f0],
PUP.Optional.VBates.WnskRST, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{E4C3E50F-5761-4BF8-95A0-939A819DF1C3}, En quarantaine, [568c4afdd6c481b59f617c5fe12010f0],
PUP.Optional.VBates.WnskRST, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{E4C3E50F-5761-4BF8-95A0-939A819DF1C3}, En quarantaine, [568c4afdd6c481b59f617c5fe12010f0],
PUP.Optional.VBates.WnskRST, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{9AE7A6AE-162E-44c4-9A2B-A6B4EF19909D}, En quarantaine, [568c4afdd6c481b59f617c5fe12010f0],
PUP.Optional.VBates.WnskRST, HKLM\SOFTWARE\CLASSES\WOW6432NODE\TYPELIB\{9AE7A6AE-162E-44c4-9A2B-A6B4EF19909D}, En quarantaine, [568c4afdd6c481b59f617c5fe12010f0],
PUP.Optional.VBates.WnskRST, HKLM\SOFTWARE\CLASSES\Extension.Lhmorv.1, En quarantaine, [568c4afdd6c481b59f617c5fe12010f0],
PUP.Optional.VBates.WnskRST, HKLM\SOFTWARE\CLASSES\Extension.Lhmorv, En quarantaine, [568c4afdd6c481b59f617c5fe12010f0],
PUP.Optional.VBates.WnskRST, HKLM\SOFTWARE\WOW6432NODE\CLASSES\Extension.Lhmorv, En quarantaine, [568c4afdd6c481b59f617c5fe12010f0],
PUP.Optional.VBates.WnskRST, HKLM\SOFTWARE\CLASSES\WOW6432NODE\Extension.Lhmorv, En quarantaine, [568c4afdd6c481b59f617c5fe12010f0],
PUP.Optional.VBates.WnskRST, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{59810A5F-916B-4570-86D6-2BE98FEAB846}, En quarantaine, [568c4afdd6c481b59f617c5fe12010f0],
PUP.Optional.VBates.WnskRST, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{59810A5F-916B-4570-86D6-2BE98FEAB846}, En quarantaine, [568c4afdd6c481b59f617c5fe12010f0],
PUP.Optional.VBates.WnskRST, HKLM\SOFTWARE\WOW6432NODE\CLASSES\Extension.Lhmorv.1, En quarantaine, [568c4afdd6c481b59f617c5fe12010f0],
PUP.Optional.VBates.WnskRST, HKLM\SOFTWARE\CLASSES\WOW6432NODE\Extension.Lhmorv.1, En quarantaine, [568c4afdd6c481b59f617c5fe12010f0],
PUP.Optional.VBates.WnskRST, HKLM\SOFTWARE\CLASSES\CLSID\{59810A5F-916B-4570-86D6-2BE98FEAB846}, En quarantaine, [568c4afdd6c481b59f617c5fe12010f0],
PUP.Optional.VBates.WnskRST, HKLM\SOFTWARE\CLASSES\CLSID\{59810A5F-916B-4570-86D6-2BE98FEAB846}\INPROCSERVER32, En quarantaine, [568c4afdd6c481b59f617c5fe12010f0],
PUP.Optional.VBates.WnskRST, HKLM\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{59810A5F-916B-4570-86D6-2BE98FEAB846}, En quarantaine, [568c4afdd6c481b59f617c5fe12010f0],
PUP.Optional.VBates.WnskRST, HKU\S-1-5-21-954712899-2948078468-259400359-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{59810A5F-916B-4570-86D6-2BE98FEAB846}, En quarantaine, [568c4afdd6c481b59f617c5fe12010f0],
PUP.Optional.VBates.WnskRST, HKU\S-1-5-21-954712899-2948078468-259400359-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{59810A5F-916B-4570-86D6-2BE98FEAB846}, En quarantaine, [568c4afdd6c481b59f617c5fe12010f0],
PUP.Optional.VBates.Gen, HKLM\SOFTWARE\GUMCILROZ, En quarantaine, [9e44a5a28218053130c255a4b64d30d0],
PUP.Optional.IDSCProduct, HKLM\SOFTWARE\MICROSOFT\TRACING\idscservice_RASAPI32, En quarantaine, [766ce166118972c4fb0e49b37f849a66],
PUP.Optional.Tuto4PC, HKLM\SOFTWARE\MICROSOFT\TRACING\otutnetwork_RASMANCS, En quarantaine, [3fa3de698416d85ed8f226d513f0cc34],
PUP.Optional.WizzCaster, HKLM\SOFTWARE\MICROSOFT\TRACING\wizzcaster_RASMANCS, En quarantaine, [4c963a0d9a00a88e96cfdb2316ed53ad],
PUP.Optional.HohoSearch, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}, En quarantaine, [37abb592a3f74ee8e4fa3ac38281cb35],
PUP.Optional.VBates.Gen, HKLM\SOFTWARE\WOW6432NODE\GUMCILROZ, En quarantaine, [fce6f94e6f2bf6404aa857a24ab9f60a],
PUP.Optional.Linkury.ACMB1, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SILENTPROCESSEXIT\Statdex.exe, En quarantaine, [1ac8aa9d504a8fa7d3f2f2d7dc26d62a],
PUP.Optional.HohoSearch, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\QifiryplohelebuilderSrv, En quarantaine, [a33f1b2ca6f4063062c7996670937987],
PUP.Optional.WizzCaster, HKU\S-1-5-21-954712899-2948078468-259400359-1001\SOFTWARE\WindowsScreenManager, En quarantaine, [ba28c384d0ca2115f66eee1023e02dd3],
Valeurs du Registre: 8
PUP.Optional.VBates.Gen, HKLM\SOFTWARE\Gumcilroz|installer_name, vbates_csmdfrex-00-Bitshakers_.exe, En quarantaine, [9e44a5a28218053130c255a4b64d30d0]
PUP.Optional.HohoSearch, HKLM\SOFTWARE\MICROSOFT|help, http://d391tbweljugwk.cloudfront.net/?ts=AHEqBHMrB3MrBk..&v=20160607&uid=F842BAEC318E1909BD8A6C2B6096C86B&ptid=sqr1&mode=loadmex, En quarantaine, [db077bcce6b4c76fad9f28d8c1438c74]
PUP.Optional.HohoSearch, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|hp, http://d391tbweljugwk.cloudfront.net/?ts=AHEqBHMrB3MrBk..&v=20160607&uid=F842BAEC318E1909BD8A6C2B6096C86B&ptid=sqr1&mode=ffsengext, En quarantaine, [37abb592a3f74ee8e4fa3ac38281cb35]
PUP.Optional.HohoSearch, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|tab, http://d391tbweljugwk.cloudfront.net/?ts=AHEqBHMrB3MrBk..&v=20160607&uid=F842BAEC318E1909BD8A6C2B6096C86B&ptid=sqr1&mode=ffsengext, En quarantaine, [a83a3017d4c634022eb0d22b44bf1ce4]
PUP.Optional.VBates.Gen, HKLM\SOFTWARE\WOW6432NODE\Gumcilroz|installer_name, vbates_csmdfrex-00-Bitshakers_.exe, En quarantaine, [fce6f94e6f2bf6404aa857a24ab9f60a]
Adware.EoRezo, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|sun21, En quarantaine, [667c9baccecc6ec81735dd16ef142ad6],
PUP.Optional.Linkury.ACMB1, HKU\S-1-5-18\ENVIRONMENT|SNP, http://%66%65%65%64.%73%6E%61%70%64%6F.%63%6F%6D?publisher=APSnapdoCSDIRev&co=FR&userid=793806c6-d414-aa9e-5739-8678a265d1b0&searchtype=sc&installDate=11/06/2016&barcodeid=51213003&channelid=3&av=windows, En quarantaine, [618162e57d1d56e0fa3a21d4828153ad]
PUP.Optional.BrowserAir, HKU\S-1-5-21-954712899-2948078468-259400359-1001\SOFTWARE\REGISTEREDAPPLICATIONS|BrowserAir.4CYGAOJXPS5DNEZSFCIVB37YVE, Software\Clients\StartMenuInternet\BrowserAir.4CYGAOJXPS5DNEZSFCIVB37YVE\Capabilities, En quarantaine, [22c0b097e9b11d19dd15658be1226898]
Données du Registre: 0
(Aucun élément malveillant détecté)
Dossiers: 8
PUP.Optional.HohoSearch, C:\Program Files (x86)\Bmotain, En quarantaine, [8c5656f1f2a84fe726d53e8a9072c040],
PUP.Optional.VBates, C:\Users\clafo\AppData\LocalLow000002821EEA2628, En quarantaine, [30b23512663464d28298d5f400024db3],
PUP.Optional.Linkury.ACMB1, C:\Program Files (x86)\Common Files\Stat-Tip, En quarantaine, [a0423d0acecc3afc240e7825976d0000],
PUP.Optional.Linkury.ACMB1, C:\Program Files (x86)\Common Files\Lamla, En quarantaine, [5b87de6966347fb74207950848bca55b],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\libraries, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\nss, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\resources, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
Fichiers: 243
Trojan.Injector, C:\Program Files\Gumcilroz\Gugqe64.dll, En quarantaine, [04de380fb0ea3ef8d1499b1743be22de],
Trojan.Injector, C:\Program Files\Gumcilroz\Gugqe.dll, En quarantaine, [04de380fb0ea3ef8d1499b1743be22de],
Trojan.ProxyHijacker, C:\Program Files (x86)\WildTangent Games\App\GamesAppIntegrationService.exe, Supprimer au redémarrage, [3ea4cc7b5446dd59d1c07d1960a235cb],
PUP.Optional.WizzCaster, C:\Users\clafo\AppData\Roaming\Mjvyk\uninstaller.exe, En quarantaine, [c220aa9de6b46dc92beafd97768e659b],
PUP.Optional.WizzCaster, C:\Users\clafo\AppData\Roaming\Mjvyk\windows screen manager.exe, En quarantaine, [6a7856f1980254e2fc19e4b011f329d7],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\bugreport.exe, En quarantaine, [4d9575d2a4f681b5b1ae62c156ab9769],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\curlpp.dll, En quarantaine, [01e189be5743be78c7983ce716eb1ce4],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\iCommon.dll, En quarantaine, [8c56c7804a5054e265fad54e03fe24dc],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\iCommu.dll, En quarantaine, [f7ebb592e4b62a0c431c77acd0312ed2],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\iddmgr.dll, En quarantaine, [f4ee4700debc31057de2c36080818977],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\iDskDllPatch.dll, En quarantaine, [d50dc5821a80ed49c59a2af9dc25fa06],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\iDskDllPatch64.dll, En quarantaine, [aa3825227921cd69aeb135ee19e813ed],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\iImportLib.dll, En quarantaine, [964c78cf3e5c1c1ae47b27fc20e1718f],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\ipcdl.exe, En quarantaine, [8e54c87fddbd68ce1a45a87b827ff60a],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\ipcproxy.dll, En quarantaine, [6f73ea5d4e4c55e1f36ce53eb64b9070],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\iSafe.exe, En quarantaine, [ca18d473e2b8db5b09560320b8499a66],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\isafeadfv.dll, En quarantaine, [35adb2956d2d9d99f867eb38d32eb24e],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\iSafeAdless.dll, En quarantaine, [5e843512e5b5e74f3a259192a35ef20e],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\isafebase.dll, En quarantaine, [fde5b196b7e3ba7ca5ba75aedc2545bb],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\isafebs.dll, En quarantaine, [4c96192e6733d5610b5436eda1605aa6],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\iSafeBugReport.exe, En quarantaine, [ca18fd4a0c8e65d1c699978c7d848e72],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\iDesk.exe, En quarantaine, [eef4044303973df91d42f92adc25936d],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\iSafeSvc.exe, En quarantaine, [c31f58ef306aa2947fe057cc8a770000],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\isafechlp.dll, En quarantaine, [8f531f28108a80b6451a50d36f9202fe],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\isafeclc.dll, En quarantaine, [c022d0774a50082e5c038d96d031f30d],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\isafeclcv.dll, En quarantaine, [11d1fb4cb2e8a6908cd378ab4eb34ab6],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\iSafeDisp.dll, En quarantaine, [eef45dea1585f343aeb19d869d646c94],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\iSafeKrnl.sys, En quarantaine, [6e7482c5d9c1ce686df290930ff22dd3],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\iSafeKrnlKit.sys, En quarantaine, [9e443d0a2179c96d293645ded42d5ca4],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\iSafeKrnlMon.sys, En quarantaine, [90523017c7d346f0441bb86bdd24f808],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\iSafeKrnlR3.sys, En quarantaine, [a1419aad2476bb7b85da170ccb360000],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\iSafeNetFilter.sys, En quarantaine, [35ad26215e3c94a2302f1a09e41d1fe1],
PUP.Optional.Ghokswa, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Birdsarah\Application\delegate_execute.exe, En quarantaine, [3da5ba8d8416ad89459a239fc93bc937],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\bugreport.exe, En quarantaine, [5c86ca7daeec01354916b27146bbc53b],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\curlpp.dll, En quarantaine, [82607bccc7d3fa3cc7980e15d0316799],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iCommon.dll, En quarantaine, [eef4dc6b2e6ca195c6999e8558a9df21],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iCommu.dll, En quarantaine, [a9397ccb63379f9760ff2201c839639d],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iddmgr.dll, En quarantaine, [d50dde69b6e4c2748dd2061ddc259e62],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iDesk.exe, En quarantaine, [eaf8f3547426092d6cf3ab789e636b95],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iDskDllPatch.dll, En quarantaine, [01e155f27228092dd18ed74c1ae714ec],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iDskDllPatch64.dll, En quarantaine, [e0020b3cfe9cee48352a36ed8c7509f7],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iImportLib.dll, En quarantaine, [29b9b3941c7ec076f06faa79b051ce32],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\ipcdl.exe, En quarantaine, [439fcd7ad9c177bf6bf4b27120e14ab6],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\ipcproxy.dll, En quarantaine, [e3ff5bec13871026e27dcb588c75738d],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iSafe.exe, En quarantaine, [479b0c3b465448eef16e44dfc14006fa],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iSafeAdless.dll, En quarantaine, [e7fb182f2971dd59d98654cf03fe5da3],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\isafebase.dll, En quarantaine, [964cb790d3c72c0a6bf4bb689170fe02],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\isafebs.dll, En quarantaine, [637f3a0de5b5e94d0d52e83b26db5fa1],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iSafeBugReport.exe, En quarantaine, [92509ea98a1069cd4f1034ef16ebd22e],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\isafechlp.dll, En quarantaine, [20c25deacbcf8aac1b44b96ac9387888],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\isafeclc.dll, En quarantaine, [7072dc6bcdcd3cfaa2bdab7890712cd4],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\isafeclcv.dll, En quarantaine, [32b0cd7a366482b419465ec57c8547b9],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iSafeDisp.dll, En quarantaine, [6f73c6815f3bd363ce912ff48081df21],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iSafeKrnl.sys, En quarantaine, [697975d2fb9f04326cf3978cee137f81],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iSafeKrnlBoot.sys, En quarantaine, [db076adddfbb5dd94d124fd47f82768a],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iSafeKrnlCall64.dll, En quarantaine, [da08eb5ca5f584b28ad59a89748d7b85],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iSafeKrnlKit.sys, En quarantaine, [2bb7e5622179ac8a3b244ad90df4ab55],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iSafeKrnlMon.sys, En quarantaine, [06dcf2557b1f1d1967f8ea3919e8b64a],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iSafeKrnlMonCall.dll, En quarantaine, [edf51e298317e353550a9d86629f9769],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iSafeKrnlR3.sys, En quarantaine, [9250b196c5d5bc7a68f7d44fa45d6e92],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iSafeKrnlShell.dll, En quarantaine, [eef486c127732b0b5a059f841de4b848],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\isafemadwc.dll, En quarantaine, [e3ff62e59cfef244213ee93a5fa22ad6],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\isafembp.dll, En quarantaine, [80620245debc81b593ccce5516ebc33d],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\isafemc.dll, En quarantaine, [d40e5cebc9d154e296c935eede237789],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\isafemgc.dll, En quarantaine, [b52dee59fe9c94a285daca5918e9f10f],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iSafeMon.dll, En quarantaine, [5290df68c0da6bcbdd824dd627da9e62],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iSafeMon64.dll, En quarantaine, [6e745fe8debc66d0203f3ee5867b8f71],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\isafemoptv.dll, En quarantaine, [cb1712359cfe1d19aab575ae847d40c0],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\isafemsmv.dll, En quarantaine, [736f9daa772376c05e01a67d51b0a35d],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iSafeNetFilter.sys, En quarantaine, [568c48fffe9c75c1035ce43f6c956799],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iSafenpf.dll, En quarantaine, [5989db6cdbbf1e184f10939053aee61a],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\isafepxy.dll, En quarantaine, [a73bb88faeec47ef74eb58cbde2301ff],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\isaferpt.dll, En quarantaine, [4b9787c0cad096a0a7b85cc7649db64a],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\isafesmgr.dll, En quarantaine, [7d656fd8485251e50e51bf64bc45b54b],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\isafesopt.dll, En quarantaine, [4d9564e38f0bfc3ae07f50d3966b8977],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\isafesptv.dll, En quarantaine, [449ed176bae06cca035cc95aa65be31d],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\isafesv.dll, En quarantaine, [6082d1768a10df5787d853d0c33e659b],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iSafeSvc.exe, En quarantaine, [717164e36238f73fd18e0c170001669a],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iSafeSvc2.exe, En quarantaine, [c71b3b0c4f4b092d253ace55ce335ca4],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\isafetbv.dll, En quarantaine, [974b2621c4d6e74f015e1d0643be54ac],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iSafeTHlp.exe, En quarantaine, [8c56ee5991092b0b1d42968d9e638a76],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iSafeTHlp64.exe, En quarantaine, [aa386bdcb7e3c96dfc63e43f3ac738c8],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iSafeTray.exe, En quarantaine, [30b22522fc9eb08673ecb3701ae7b64a],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\isafeupbiz.dll, En quarantaine, [548e51f60f8bc86e580756cdbc458080],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iStart.exe, En quarantaine, [736f91b6d4c6a393fb642af90ef3a25e],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iSvc.dll, En quarantaine, [18cae5621387ab8be17ea67da65bbe42],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iSvc2.dll, En quarantaine, [974ba6a1d3c792a461fe46dd8d74b749],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iTPAutoClean.dll, En quarantaine, [fee4e661f0aae84edd8273b038c90ff1],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iTPDesk.dll, En quarantaine, [8d559bac801a37ff96c926fd857c5ba5],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iTPFloaty.dll, En quarantaine, [4f931a2d0595d660cb9436ed54ade41c],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iTPMsgCenter.dll, En quarantaine, [5a884bfc9406b3831d425fc435cc5aa6],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iTpNodisturb.dll, En quarantaine, [0ad8a1a6a5f5e056fa657ea5976a0ff1],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iTPProtect.dll, En quarantaine, [568c2a1dc2d88caaed72859e42bf916f],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iTPPush.dll, En quarantaine, [e6fcf2550e8c58de441b64bfce339e62],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\isafeadfv.dll, En quarantaine, [a14167e06a302313d58a2003e31e41bf],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iSafeKrnlCall.dll, En quarantaine, [4a9863e4f8a21224d18ee43fd22fb44c],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\isafemclv.dll, En quarantaine, [7a683c0b24762115421dde45f908a957],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\iSafeSrvMon64.dll, En quarantaine, [e20063e41d7dd2644312eaa542c247b9],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\Elex-tech.DIR\YAC\uninstall.exe, En quarantaine, [1cc6a4a3c6d4191dd38baa79fa072dd3],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\bugreport.exe, En quarantaine, [934f6cdb9ffbc4725708f033df226f91],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\curlpp.dll, En quarantaine, [835f6ddae1b94fe7bea18e9548b9e020],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iCommon.dll, En quarantaine, [8b57f651f4a6a88e77e81e0534cd5fa1],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iCommu.dll, En quarantaine, [91513c0bfd9dac8a84dbd54efb06ef11],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iddmgr.dll, En quarantaine, [e9f9af98a5f5191ddc83c95a1ae75da3],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iDesk.exe, En quarantaine, [07dbb3944e4c38fe530c5ec535ccf20e],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iDskDllPatch.dll, En quarantaine, [4d95f25525758da9b8a7f033ca374cb4],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iDskDllPatch64.dll, En quarantaine, [875b71d6c4d678be312e81a29071b44c],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iImportLib.dll, En quarantaine, [3ea43b0c7d1dd85e98c7e142996808f8],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\ipcdl.exe, En quarantaine, [519162e5405a0e28c9963be8a45dba46],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\ipcproxy.dll, En quarantaine, [766c4afd752559dd520d929151b036ca],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iSafe.exe, En quarantaine, [38aaab9c11891c1acf9045de49b8fb05],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iSafeAdless.dll, En quarantaine, [80621d2ae1b952e4e57a9f84df22a060],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\isafebase.dll, En quarantaine, [9b4710373b5f65d191cebf64778af60a],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\isafebs.dll, En quarantaine, [b32f0f38b6e492a479e61a09f80940c0],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iSafeBugReport.exe, En quarantaine, [ad354cfb3f5bab8b3a2570b348b9926e],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\isafechlp.dll, En quarantaine, [bf23fd4a8f0bdb5bacb3b76c1be6a759],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\isafeclc.dll, En quarantaine, [855d7ccbfd9dec4a2738c162dd246c94],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\isafeclcv.dll, En quarantaine, [459ddc6b0d8d73c375ea0b185da42ed2],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iSafeDisp.dll, En quarantaine, [25bd41060b8fce6872ed180b28d9ca36],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iSafeKrnl.sys, En quarantaine, [25bdd5727129c76f590658cb57aa3ac6],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iSafeKrnlBoot.sys, En quarantaine, [02e05dea297148ee045b65be19e84eb2],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iSafeKrnlCall64.dll, En quarantaine, [766c093e1a800333d98661c2d92843bd],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iSafeKrnlKit.sys, En quarantaine, [538f20275743999de47b4bd8d22fbb45],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iSafeKrnlMon.sys, En quarantaine, [835f71d6455579bde778f132738e728e],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iSafeKrnlMonCall.dll, En quarantaine, [19c90b3c3f5b39fdcd92fa2998699c64],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iSafeKrnlR3.sys, En quarantaine, [20c2b88ff3a7df579bc4be656c9537c9],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iSafeKrnlShell.dll, En quarantaine, [35ad2f18950564d282dd0f1446bb1ee2],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\isafemadwc.dll, En quarantaine, [e6fce067148688ae76e99291d72ac13f],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\isafembp.dll, En quarantaine, [ae34a6a18b0f4de9a9b6849ff30e0af6],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\isafemc.dll, En quarantaine, [3fa34ff8a8f2e353bba42bf87c859070],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\isafemgc.dll, En quarantaine, [736f96b19efc90a62936fc2713ee837d],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iSafeMon.dll, En quarantaine, [06dc80c7ddbd72c4ff60051ebe43a25e],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iSafeMon64.dll, En quarantaine, [6a78ab9cd7c3aa8c95caff2427da8e72],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\isafemoptv.dll, En quarantaine, [2bb799ae2971c076dc83e53e936e59a7],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\isafemsmv.dll, En quarantaine, [d1115ee93169d363dc83fd26b24f49b7],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iSafeNetFilter.sys, En quarantaine, [6979fb4c1b7ff3432d329291867bad53],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iSafenpf.dll, En quarantaine, [7b677ec96634e353055ad74cc041ac54],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\isafepxy.dll, En quarantaine, [0dd56ed9e1b9e94d213e38eb748d31cf],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\isaferpt.dll, En quarantaine, [6c7696b13e5cf04684db21027f82db25],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\isafesmgr.dll, En quarantaine, [38aa1532c0da092da1bef72c8081ca36],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\isafesopt.dll, En quarantaine, [f9e90344207a171f411e32f1768b7c84],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\isafesptv.dll, En quarantaine, [9b47c582a3f7e254ed729192857cba46],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\isafesv.dll, En quarantaine, [f4ee74d32773f442a7b84ad9ca37fb05],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iSafeSvc.exe, En quarantaine, [875b00479703d363382791925aa70ff1],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iSafeSvc2.exe, En quarantaine, [db07c087faa0e84e18475fc480810df3],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\isafetbv.dll, En quarantaine, [6e743c0bc8d238fecb9451d2659c16ea],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iSafeTHlp.exe, En quarantaine, [0dd597b0a0fab28477e89c8752aff20e],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iSafeTHlp64.exe, En quarantaine, [4c9699ae04967abc213eae756f9222de],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iSafeTray.exe, En quarantaine, [a53d58ef5743e0566af549dae61b07f9],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\isafeupbiz.dll, En quarantaine, [6e74e85f5545cc6aa4bb25fe0bf61fe1],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iStart.exe, En quarantaine, [a939dc6b66341323abb44fd4df22ec14],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iSvc.dll, En quarantaine, [8f5378cfc4d6c670f16ec3600bf62fd1],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iSvc2.dll, En quarantaine, [786a6ddae3b7f83e164938eb07fa7c84],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iTPAutoClean.dll, En quarantaine, [be246dda336738fe8bd48e958d748c74],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iTPDesk.dll, En quarantaine, [d01289be9307ce68c29df52e2fd2f60a],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iTPFloaty.dll, En quarantaine, [15cd4bfca0fafd39f56a051e28d9cb35],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iTPMsgCenter.dll, En quarantaine, [3fa335124f4b3ef8b0af4fd4936ed52b],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iTpNodisturb.dll, En quarantaine, [21c1ff488812dd59e47b140fc0415aa6],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iTPProtect.dll, En quarantaine, [4f9350f7ecae10260e51849fa95811ef],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iTPPush.dll, En quarantaine, [f3efb4936733e452b6a94ad93bc67e82],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\isafeadfv.dll, En quarantaine, [2cb6dd6ae6b467cf8ed145deef121be5],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iSafeKrnlCall.dll, En quarantaine, [509271d6e3b72115a6b9b76c7c851fe1],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\isafemclv.dll, En quarantaine, [b82a67e0e8b2b482d98679aa3ec33cc4],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\iSafeSrvMon64.dll, En quarantaine, [ca1840078b0f90a6f5603a55877de719],
FraudTool.YAC, C:\Users\clafo\AppData\Roaming\ZHP\Quarantine\YAC.DIR\uninstall.exe, En quarantaine, [b9294ef9aeecc571c599958ec839a45c],
PUP.Optional.PerionTB, C:\Program Files\Gumcilroz\bsdp32.sys, En quarantaine, [33af4502cbcfaa8c106bc904ef123fc1],
Adware.PennyBee, C:\Program Files\Gumcilroz\Ciexxa.dll, En quarantaine, [9b47db6cc0da1e18bb5b7a605fa2867a],
Adware.PennyBee, C:\Program Files\Gumcilroz\Ciexxa64.dll, En quarantaine, [13cf1433e9b184b246d01ebc649d7987],
Adware.PennyBee, C:\Program Files\Gumcilroz\Coxkak.dll, En quarantaine, [e4fe5dea3b5fe6503fd75585db26c33d],
Adware.PennyBee, C:\Program Files\Gumcilroz\Coxkak64.dll, En quarantaine, [786a96b1d5c568cefd19d2088b7615eb],
PUP.Optional.VBates.WnskRST, C:\Program Files\Gumcilroz\Gugqe.dll, En quarantaine, [568c4afdd6c481b59f617c5fe12010f0],
PUP.Optional.VBates.WnskRST, C:\Program Files\Gumcilroz\Gugqe64.dll, En quarantaine, [568c4afdd6c481b59f617c5fe12010f0],
Adware.PennyBee, C:\Program Files\Gumcilroz\Iguouc.dll, En quarantaine, [35adb1969406af8751c5469410f1827e],
Adware.PennyBee, C:\Program Files\Gumcilroz\Iguouc64.dll, En quarantaine, [6f737bcc762464d2e43219c15ea3e51b],
PUP.Optional.VBates, C:\Program Files\Gumcilroz\nfregdrv64.exe, En quarantaine, [ba2866e19a00ca6c14e95486e51c2dd3],
Adware.PennyBee, C:\Program Files\Gumcilroz\Sehgholo.dll, En quarantaine, [6b7761e6fe9c7cba1afcc61454ad936d],
Adware.PennyBee, C:\Program Files\Gumcilroz\Sehgholo64.dll, En quarantaine, [479b0e395e3cac8a5bbb34a612efd22e],
PUP.Optional.PennyBee, C:\Program Files\GumcilrozUn\unins000.exe, En quarantaine, [51911a2dabef3bfb75ba3a3dc14014ec],
PUP.Optional.HohoSearch, C:\Program Files (x86)\Kbickwulsp_\AppleVersions.dll, En quarantaine, [3aa8d4734a50c76f97238f5d5da47090],
PUP.Optional.HohoSearch, C:\Program Files (x86)\Kbickwulsp_\atahis.dll, En quarantaine, [9b473f08613992a49426c02c7091738d],
PUP.Optional.HohoSearch, C:\Program Files (x86)\Kbickwulsp_\ghugiward.dll, En quarantaine, [07db5dea2872b87eb7039e4e53aeea16],
PUP.Optional.HohoSearch, C:\Program Files (x86)\Stbied\StbHstTask.exe, En quarantaine, [e8fa4bfc940663d3af0bc329e41da55b],
PUP.Optional.Nice, C:\Users\clafo\AppData\Roaming\Mozilla\Firefox\Profiles\vh2k1h8a.default\searchplugins\nice.xml, En quarantaine, [bc265ceb534758de7c1deedbe81a45bb],
PUP.Optional.Linkury, C:\Users\clafo\AppData\Roaming\md.xml, En quarantaine, [34ae3611f1a90234fcaad01f1ce7b64a],
PUP.Optional.ProntSpooler, C:\Users\clafo\AppData\Local\Apps\2.0\abril.stt, En quarantaine, [a14148ff9dfd063000af20d8d2310000],
PUP.Optional.NueSearch.ShrtCln, C:\Users\clafo\AppData\Roaming\Mozilla\Firefox\Profiles\vh2k1h8a.default\searchplugins\nuesearch.xml, En quarantaine, [db0715329802e45281e3b2f60cf87f81],
PUP.Optional.VBates, C:\Users\clafo\AppData\LocalLow000002821EEA2628\000002821EEB4348, En quarantaine, [30b23512663464d28298d5f400024db3],
PUP.Optional.Linkury.ACMB1, C:\Program Files (x86)\Common Files\Stat-Tip\InstallationConfiguration.xml, En quarantaine, [a0423d0acecc3afc240e7825976d0000],
PUP.Optional.Linkury.ACMB1, C:\Program Files (x86)\Common Files\Stat-Tip\uninstall.dat, En quarantaine, [a0423d0acecc3afc240e7825976d0000],
PUP.Optional.Linkury.ACMB1, C:\Program Files (x86)\Common Files\Stat-Tip\uninstall.ico, En quarantaine, [a0423d0acecc3afc240e7825976d0000],
PUP.Optional.Linkury.ACMB1, C:\Program Files (x86)\Common Files\Lamla\InstallationConfiguration.xml, En quarantaine, [5b87de6966347fb74207950848bca55b],
PUP.Optional.Linkury.ACMB1, C:\Program Files (x86)\Common Files\Lamla\uninstall.dat, En quarantaine, [5b87de6966347fb74207950848bca55b],
PUP.Optional.Linkury.ACMB1, C:\Program Files (x86)\Common Files\Lamla\uninstall.ico, En quarantaine, [5b87de6966347fb74207950848bca55b],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\tree.js, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\Ciexxa.dll, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\Ciexxa64.dll, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\Coxkak.dll, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\Coxkak64.dll, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\Iguouc.dll, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\Iguouc64.dll, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\Jukpudrisqofawi.dat, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\Oham.dat, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\Ruupinomco.dat, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\Sehgholo.dll, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\Sehgholo64.dll, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\setup.ico, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\Urujydecvaoeyt.dat, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\libraries\DataExchangeScript.js, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\nss\certutil.exe, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\nss\mozcrt19.dll, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\nss\nspr4.dll, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\nss\nss3.dll, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\nss\plc4.dll, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\nss\plds4.dll, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\nss\smime3.dll, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\nss\softokn3.dll, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\resources\config.js, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\resources\LocalScript.js, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\resources\uninstall.html, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.VBates.BrwsrFlsh, C:\Program Files\Gumcilroz\resources\wlist.js, En quarantaine, [b62ce1660298d56153fbf8a5a85c60a0],
PUP.Optional.Linkury.ACMB1, C:\Users\clafo\AppData\Roaming\Config.xml, En quarantaine, [6b7793b4643654e249e00c91f70d46ba],
PUP.Optional.Linkury.ACMB1, C:\Users\clafo\AppData\Roaming\InstallationConfiguration.xml, En quarantaine, [835fb592cad0a19561c93b62c53f17e9],
PUP.Optional.YesSearches, C:\Users\clafo\AppData\Roaming\Mozilla\Firefox\Profiles\vh2k1h8a.default\searchplugins\2nt99cbp.xml, En quarantaine, [e6fcee59a5f537ff63626f2e0301d32d],
PUP.Optional.HohoSearch, C:\Users\clafo\AppData\Roaming\Profiles\2kd9dwqh.default\searchplugins\mr674qlp.xml, En quarantaine, [3aa86dda02989f97467c534a62a2c937],
PUP.Optional.YesSearches, C:\Users\clafo\AppData\Roaming\Profiles\95qnv0su.default\searchplugins\2nt99cbp.xml, En quarantaine, [cd151235bae0db5b0bb8702d996b837d],
PUP.Optional.HohoSearch, C:\Users\clafo\AppData\Roaming\Profiles\95qnv0su.default\searchplugins\mr674qlp.xml, En quarantaine, [449e65e2b9e12115ae148c113fc556aa],
PUP.Optional.HijackHosts.Gen, C:\Windows\System32\ohhf\pogd\gid.dat, En quarantaine, [e5fd9ea93664072f6faa0b8f16eeb848],
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (#107.178.247.130 connect.facebook.net), Remplacé,[e20069debfdbb87e6d99bde18a7a0cf4]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (book.net
#107.178.255.88 www.google-), Remplacé,[9250b7901783f145f80ef4aadb294eb2]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (107.178.248.130 static.doubleclick.net), Échec de la suppression,[f2f0ab9c504af5418d7a38667490ff01]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (book.net
#107.178.255.88 www.google-an), Remplacé,[12d0dd6ab3e75bdb02057f1f16eeb14f]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (#107.178.255.88 www.google-analytics.com), Échec de la suppression,[35ad4dfa861495a150b8148a30d425db]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (analytics.com
107.178.255.88 www.), Échec de la suppression,[717126219109b086f711dec0ce366d93]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (ogle-analytics.com
107.178.25), Échec de la suppression,[449eb0974852c274a95ff1adca3a29d7]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (w.google-analytics.com
107.178.255.88 ), Échec de la suppression,[0fd39ea9afeb4fe742c6fba30afa8878]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (analytics.com
107.178.255.88 www.statcount), Échec de la suppression,[21c177d0ecaecc6a24e4c4da0bf9a65a]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (ytics.com
107.178.255.88 www.statc), Échec de la suppression,[6b77c78014861c1a6e9a3d61d72d06fa]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (er.com
107.178.255.88 ssl.google-analyt), Échec de la suppression,[dc06cb7cd6c49f9721e7dcc2b84cdb25]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (analytics.com
107.178.255.88 www.s), Échec de la suppression,[3da5b592d8c2320470986d31788c9070]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (ogle-analytics.com
107.178.255), Échec de la suppression,[a53d7fc8cdcd7fb742c6039b59ab5ba5]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (w.google-analytics.com
107.178.255.88 w), Échec de la suppression,[b32f2621d6c4082e81875b43e81c09f7]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (analytics.com
107.178.255.88 www.statcounte), Échec de la suppression,[8a58d473e9b178be7a8e3a64887c9d63]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (ytics.com
107.178.255.88 www.statco), Échec de la suppression,[3ca6f5529bffc2747197ebb3cc38ca36]
Secteurs physiques: 0
(Aucun élément malveillant détecté)
(end)