cjoint

Publicité


Publicité

Format du document : text/plain

Prévisualisation

Malwarebytes
www.malwarebytes.com

-Détails du journal-
Date de l'analyse: 01/02/2017
Heure de l'analyse: 15:46
Fichier journal: malwarebytes export.txt
Administrateur: Oui

-Informations du logiciel-
Version: 3.0.6.1469
Version de composants: 1.0.50
Version de pack de mise à jour: 1.0.1150
Licence: Gratuit

-Informations système-
Système d'exploitation: Windows 10
Processeur: x64
Système de fichiers: NTFS
Utilisateur: DESKTOP-V9PH9PA\C\u00c3\u00a9dric

-Résumé de l'analyse-
Type d'analyse: Analyse des menaces
Résultat: Terminé
Objets analysés: 422142
Temps écoulé: 3 min, 43 s

-Options d'analyse-
Mémoire: Activé
Démarrage: Activé
Système de fichiers: Activé
Archives: Activé
Rootkits: Désactivé
Heuristique: Activé
PUP: Activé
PUM: Activé

-Détails de l'analyse-
Processus: 6
PUP.Optional.MyWebShield, C:\PROGRAM FILES\MY WEB SHIELD\MWESHIELD.EXE, En quarantaine, [641], [308998],1.0.1150
PUP.Optional.MyWebShield, C:\PROGRAM FILES\MY WEB SHIELD\MWESHIELDUP.EXE, En quarantaine, [641], [308998],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\ssn.exe, En quarantaine, [1854], [258239],1.0.1150
Adware.Tuto4PC.Generic, C:\Program Files\9CK2WYOVVK\T4F440QGP.exe, En quarantaine, [2400], [357599],1.0.1150
Adware.Tuto4PC.Generic, C:\Program Files\MNTG42CRGT\MNTG42CRG.exe, En quarantaine, [2400], [357599],1.0.1150
Adware.Tuto4PC.Generic, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\{dce-e3-1d-fe4dc-b4a4b-abde-c3b2f}\6nhQ-'oj9n.exe, En quarantaine, [2400], [365964],1.0.1150

Module: 26
PUP.Optional.StartGo123, C:\WINDOWS\SYSTEM32\NETUTILS2016.DLL, En quarantaine, [862], [318108],1.0.1150
Adware.Elex, C:\PROGRAM FILES (X86)\CLERFGHTSTERFIRY MONITOR\LOCAL64SPL.DLL, En quarantaine, [1623], [360556],1.0.1150
PUP.Optional.MyWebShield, C:\PROGRAM FILES\MY WEB SHIELD\LIBEAY32.DLL, En quarantaine, [641], [308997],1.0.1150
PUP.Optional.MyWebShield, C:\PROGRAM FILES\MY WEB SHIELD\MWESHIELD.EXE, En quarantaine, [641], [308998],1.0.1150
PUP.Optional.MyWebShield, C:\PROGRAM FILES\MY WEB SHIELD\MWESHIELDUP.EXE, En quarantaine, [641], [308998],1.0.1150
PUP.Optional.MyWebShield, C:\PROGRAM FILES\MY WEB SHIELD\SSLEAY32.DLL, En quarantaine, [641], [308997],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\msvcr100.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\freebl3.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\gkmedias.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\icudt52.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\icuin52.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\icuuc52.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\mozalloc.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\mozglue.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\mozjs.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\msvcp100.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\nss3.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\nssckbi.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\nssdbm3.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\sandboxbroker.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\softokn3.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\ssn.exe, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\xul.dll, En quarantaine, [1854], [258239],1.0.1150
Adware.Tuto4PC.Generic, C:\Program Files\9CK2WYOVVK\T4F440QGP.exe, En quarantaine, [2400], [357599],1.0.1150
Adware.Tuto4PC.Generic, C:\Program Files\MNTG42CRGT\MNTG42CRG.exe, En quarantaine, [2400], [357599],1.0.1150
Adware.Tuto4PC.Generic, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\{dce-e3-1d-fe4dc-b4a4b-abde-c3b2f}\6nhQ-'oj9n.exe, En quarantaine, [2400], [365964],1.0.1150

Clé du registre: 27
PUP.Optional.MyWebShield, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\mweshield, En quarantaine, [641], [308998],1.0.1150
PUP.Optional.MyWebShield, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\mweshieldup, En quarantaine, [641], [308998],1.0.1150
PUP.Optional.MyWebShield, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\mwescontroller, En quarantaine, [641], [326162],1.0.1150
PUP.Optional.StartGo123, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\NetUtils2016, En quarantaine, [862], [325509],1.0.1150
PUP.Optional.MyWebShield, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\mweshield, En quarantaine, [641], [308997],1.0.1150
PUP.Optional.ContentDefender, HKLM\SOFTWARE\CLASSES\INTERFACE\{B910D9A1-9F21-484A-8650-82250DABF38E}, En quarantaine, [8302], [169993],1.0.1150
PUP.Optional.ContentDefender, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{B910D9A1-9F21-484A-8650-82250DABF38E}, En quarantaine, [8302], [169993],1.0.1150
PUP.Optional.ContentDefender, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{B910D9A1-9F21-484A-8650-82250DABF38E}, En quarantaine, [8302], [169993],1.0.1150
PUP.Optional.ContentDefender, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{D5397E85-8AF4-414B-90FC-9F4244CD46FA}, En quarantaine, [8302], [169993],1.0.1150
PUP.Optional.ContentDefender, HKLM\SOFTWARE\CLASSES\WOW6432NODE\TYPELIB\{D5397E85-8AF4-414B-90FC-9F4244CD46FA}, En quarantaine, [8302], [169993],1.0.1150
PUP.Optional.ContentDefender, HKLM\SOFTWARE\CLASSES\TYPELIB\{D5397E85-8AF4-414B-90FC-9F4244CD46FA}, En quarantaine, [8302], [169993],1.0.1150
PUP.Optional.ContentDefender, HKLM\SOFTWARE\CLASSES\INTERFACE\{B28F9114-243E-4046-B173-11825352D18A}, En quarantaine, [8302], [169992],1.0.1150
PUP.Optional.ContentDefender, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{B28F9114-243E-4046-B173-11825352D18A}, En quarantaine, [8302], [169992],1.0.1150
PUP.Optional.ContentDefender, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{B28F9114-243E-4046-B173-11825352D18A}, En quarantaine, [8302], [169992],1.0.1150
PUP.Optional.ContentDefender, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{CCA2A357-CCB4-41C9-B6F5-4F202B8CDC82}, En quarantaine, [8302], [169992],1.0.1150
PUP.Optional.ContentDefender, HKLM\SOFTWARE\CLASSES\WOW6432NODE\TYPELIB\{CCA2A357-CCB4-41C9-B6F5-4F202B8CDC82}, En quarantaine, [8302], [169992],1.0.1150
PUP.Optional.ContentDefender, HKLM\SOFTWARE\CLASSES\TYPELIB\{CCA2A357-CCB4-41C9-B6F5-4F202B8CDC82}, En quarantaine, [8302], [169992],1.0.1150
PUP.Optional.Kuaizip, HKLM\SOFTWARE\CLASSES\CLSID\{AAA0C5B8-933F-4200-93AD-B143D7FFF9F2}, En quarantaine, [1407], [346210],1.0.1150
PUP.Optional.SSN, HKU\S-1-5-21-3438501669-548247117-2326432306-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\ssn, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.Yelloader, HKU\S-1-5-21-3438501669-548247117-2326432306-1001\SOFTWARE\ssn, En quarantaine, [1708], [251340],1.0.1150
PUP.Optional.Goobzo, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{4409ACFB-665D-4795-886E-736590D6AC23}, En quarantaine, [435], [258228],1.0.1150
Rogue.SearchEngage, HKLM\SOFTWARE\MICROSOFT\TRACING\saveup_RASAPI32, En quarantaine, [2363], [357112],1.0.1150
Rogue.SearchEngage, HKLM\SOFTWARE\MICROSOFT\TRACING\saveup_RASMANCS, En quarantaine, [2363], [357112],1.0.1150
PUP.Optional.Goobzo, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\SMW_UpdateTask_Time_323836313938393032362d4137345a376c453278345a41, En quarantaine, [435], [186804],1.0.1150
PUP.Optional.Yelloader, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\SSN_RASAPI32, En quarantaine, [1708], [247073],1.0.1150
PUP.Optional.Yelloader, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\SSN_RASMANCS, En quarantaine, [1708], [247073],1.0.1150
Adware.Sasquor.SPL, HKLM\SYSTEM\CURRENTCONTROLSET\CONTROL\PRINT\PROVIDERS\mwyhtxtg, En quarantaine, [2085], [339986],1.0.1150

Valeur du registre: 10
PUP.Optional.SSN, HKU\S-1-5-21-3438501669-548247117-2326432306-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|ssn, En quarantaine, [1854], [258239],1.0.1150
Adware.Tuto4PC.Generic, HKU\S-1-5-21-3438501669-548247117-2326432306-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|UZZPH646Z3, En quarantaine, [2400], [357599],1.0.1150
Adware.Tuto4PC.Generic, HKU\S-1-5-21-3438501669-548247117-2326432306-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|M6W1ZQ4A2V, En quarantaine, [2400], [357599],1.0.1150
Adware.Tuto4PC.Generic, HKU\S-1-5-21-3438501669-548247117-2326432306-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|6nhQ-'oj9n.exe, En quarantaine, [2400], [365964],1.0.1150
Adware.Tuto4PC.Generic, HKU\S-1-5-21-3438501669-548247117-2326432306-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|zMiNo7RDMX.exe, En quarantaine, [2400], [365964],1.0.1150
Adware.Tuto4PC.Generic, HKU\S-1-5-21-3438501669-548247117-2326432306-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|P0YMANQJAQ, En quarantaine, [2400], [353568],1.0.1150
PUP.Optional.Goobzo, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{4409ACFB-665D-4795-886E-736590D6AC23}|PATH, En quarantaine, [435], [258228],1.0.1150
PUP.Optional.MyWebShield, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\mweshield|IMAGEPATH, En quarantaine, [641], [326218],1.0.1150
PUP.Optional.MyWebShield, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\mweshieldup|IMAGEPATH, En quarantaine, [641], [326218],1.0.1150
Adware.Sasquor.SPL, HKLM\SYSTEM\CURRENTCONTROLSET\CONTROL\PRINT\PROVIDERS\mwyhtxtg|NAME, En quarantaine, [2085], [339986],1.0.1150

Données du registre: 0
(Aucun élément malveillant détecté)

Flux de données: 0
(Aucun élément malveillant détecté)

Dossier: 14
PUP.Optional.MyWebShield, C:\Program Files\My Web Shield\cert\SSL, En quarantaine, [641], [308997],1.0.1150
PUP.Optional.MyWebShield, C:\Program Files\My Web Shield\cert, En quarantaine, [641], [308997],1.0.1150
PUP.Optional.MyWebShield, C:\Program Files\My Web Shield\nss, En quarantaine, [641], [308997],1.0.1150
PUP.Optional.MyWebShield, C:\PROGRAM FILES\My Web Shield, En quarantaine, [641], [308997],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\dictionaries, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\gmp-fake\1.0, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\gmp-fake, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\Update, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\ROAMING\SSN, En quarantaine, [1854], [258239],1.0.1150
Adware.Tuto4PC.Generic, C:\PROGRAM FILES\9CK2WYOVVK, En quarantaine, [2400], [357599],1.0.1150
Adware.Tuto4PC.Generic, C:\PROGRAM FILES\MNTG42CRGT, En quarantaine, [2400], [357599],1.0.1150
Adware.Elex.Generic, C:\PROGRAM FILES (X86)\CLERFGHTSTERFIRY MONITOR, En quarantaine, [2424], [358300],1.0.1150
Adware.Tuto4PC.Generic, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\ROAMING\{DCE-E3-1D-FE4DC-B4A4B-ABDE-C3B2F}, En quarantaine, [2400], [365964],1.0.1150
Adware.Tuto4PC.Generic, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\SMI5L3HYKC, En quarantaine, [2400], [360183],1.0.1150

Fichier: 137
PUP.Optional.StartGo123, C:\WINDOWS\SYSTEM32\NETUTILS2016.DLL, En quarantaine, [862], [318108],1.0.1150
Adware.Elex, C:\PROGRAM FILES (X86)\CLERFGHTSTERFIRY MONITOR\LOCAL64SPL.DLL, En quarantaine, [1623], [360556],1.0.1150
PUP.Optional.MyWebShield, C:\PROGRAM FILES\MY WEB SHIELD\LIBEAY32.DLL, En quarantaine, [641], [308997],1.0.1150
PUP.Optional.MyWebShield, C:\PROGRAM FILES\MY WEB SHIELD\MWESHIELD.EXE, En quarantaine, [641], [308998],1.0.1150
PUP.Optional.MyWebShield, C:\PROGRAM FILES\MY WEB SHIELD\MWESHIELDUP.EXE, En quarantaine, [641], [308998],1.0.1150
PUP.Optional.MyWebShield, C:\PROGRAM FILES\MY WEB SHIELD\SSLEAY32.DLL, En quarantaine, [641], [308997],1.0.1150
PUP.Optional.MyWebShield, C:\WINDOWS\SYSTEM32\DRIVERS\MWESCONTROLLER.SYS, En quarantaine, [641], [326162],1.0.1150
PUP.Optional.StartGo123, C:\WINDOWS\SYSTEM32\DRIVERS\NETUTILS2016.SYS, En quarantaine, [862], [325509],1.0.1150
PUP.Optional.MyWebShield, C:\Program Files\My Web Shield\cert\SSL\cert.db, En quarantaine, [641], [308997],1.0.1150
PUP.Optional.MyWebShield, C:\Program Files\My Web Shield\cert\SSL\My Web Shield 2.cer, En quarantaine, [641], [308997],1.0.1150
PUP.Optional.MyWebShield, C:\Program Files\My Web Shield\nss\certutil.exe, En quarantaine, [641], [308997],1.0.1150
PUP.Optional.MyWebShield, C:\Program Files\My Web Shield\nss\mozcrt19.dll, En quarantaine, [641], [308997],1.0.1150
PUP.Optional.MyWebShield, C:\Program Files\My Web Shield\nss\nspr4.dll, En quarantaine, [641], [308997],1.0.1150
PUP.Optional.MyWebShield, C:\Program Files\My Web Shield\nss\nss3.dll, En quarantaine, [641], [308997],1.0.1150
PUP.Optional.MyWebShield, C:\Program Files\My Web Shield\nss\plc4.dll, En quarantaine, [641], [308997],1.0.1150
PUP.Optional.MyWebShield, C:\Program Files\My Web Shield\nss\plds4.dll, En quarantaine, [641], [308997],1.0.1150
PUP.Optional.MyWebShield, C:\Program Files\My Web Shield\nss\smime3.dll, En quarantaine, [641], [308997],1.0.1150
PUP.Optional.MyWebShield, C:\Program Files\My Web Shield\nss\softokn3.dll, En quarantaine, [641], [308997],1.0.1150
PUP.Optional.MyWebShield, C:\Program Files\My Web Shield\mwescontroller.sys, En quarantaine, [641], [308997],1.0.1150
PUP.Optional.MyWebShield, C:\Program Files\My Web Shield\mwesmanager.exe, En quarantaine, [641], [308997],1.0.1150
PUP.Optional.MyWebShield, C:\Program Files\My Web Shield\mwessweeper.exe, En quarantaine, [641], [308997],1.0.1150
PUP.Optional.MyWebShield, C:\Program Files\My Web Shield\mwesuninstall.exe, En quarantaine, [641], [308997],1.0.1150
PUP.Optional.MyWebShield, C:\Program Files\My Web Shield\My Web Shield.zip, En quarantaine, [641], [308997],1.0.1150
PUP.Optional.SSN, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\ROAMING\SSN\README.XULRUNNER, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\dictionaries\en-US.aff, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\dictionaries\en-US.dic, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\gmp-fake\1.0\fake.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\gmp-fake\1.0\fake.info, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\Update\setup.php, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\Geckofx-Winforms.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\msvcr100.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\AccessibleMarshal.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\breakpadinjector.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\crashreporter.exe, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\crashreporter.ini, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\D3DCompiler_43.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\d3dcompiler_46.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\dependentlibs.list, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\freebl3.chk, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\freebl3.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\Geckofx-Core.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\gkmedias.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\IA2Marshal.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\icudt52.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\icuin52.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\icuuc52.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\js-gdb.py, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\js.exe, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\libEGL.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\libGLESv2.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\LICENSE, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\mozalloc.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\mozglue.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\mozjs.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\msvcp100.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\Newtonsoft.Json.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\Newtonsoft.Json.xml, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\nss3.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\nssckbi.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\nssdbm3.chk, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\nssdbm3.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\omni.ja, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\platform.ini, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\plugin-container.exe, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\plugin-hang-ui.exe, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\precomplete, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\redit.exe, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\sandboxbroker.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\saveup.exe, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\softokn3.chk, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\softokn3.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\ssn.exe, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\Uninstall.exe, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\updater.exe, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\version.txt, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\xul.dll, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\xulrunner-stub.exe, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.SSN, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\ssn\xulrunner.exe, En quarantaine, [1854], [258239],1.0.1150
PUP.Optional.StartGo123, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\ROAMING\ZHP\QUARANTINE\NETUTILS2016.SYS, En quarantaine, [862], [325509],1.0.1150
Adware.Eszjuxuan, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\ROAMING\ZHP\QUARANTINE\SERVICE.EXE, En quarantaine, [60], [333631],1.0.1150
PUP.Optional.SearchModule, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\ROAMING\ZHP\QUARANTINE\SMU.EXE, En quarantaine, [814], [112036],1.0.1150
PUP.Optional.Elex, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\ROAMING\ZHP\QUARANTINE\TROTUX.EXE, En quarantaine, [15], [339258],1.0.1150
Adware.Kuaiba, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\ROAMING\ZHP\QUARANTINE\UPDATE.EXE, En quarantaine, [84], [360271],1.0.1150
Adware.Tuto4PC.Generic, C:\PROGRAM FILES\9CK2WYOVVK\CAST.CONFIG, En quarantaine, [2400], [357599],1.0.1150
Adware.Tuto4PC.Generic, C:\Program Files\9CK2WYOVVK\T4F440QGP.exe, En quarantaine, [2400], [357599],1.0.1150
Adware.Tuto4PC.Generic, C:\Program Files\9CK2WYOVVK\T4F440QGP.exe.config, En quarantaine, [2400], [357599],1.0.1150
Adware.Tuto4PC.Generic, C:\Program Files\9CK2WYOVVK\uninstaller.exe, En quarantaine, [2400], [357599],1.0.1150
Adware.Tuto4PC.Generic, C:\Program Files\9CK2WYOVVK\uninstaller.exe.config, En quarantaine, [2400], [357599],1.0.1150
Adware.Tuto4PC.Generic, C:\PROGRAM FILES\MNTG42CRGT\CAST.CONFIG, En quarantaine, [2400], [357599],1.0.1150
Adware.Tuto4PC.Generic, C:\Program Files\MNTG42CRGT\MNTG42CRG.exe, En quarantaine, [2400], [357599],1.0.1150
Adware.Tuto4PC.Generic, C:\Program Files\MNTG42CRGT\MNTG42CRG.exe.config, En quarantaine, [2400], [357599],1.0.1150
Adware.Tuto4PC.Generic, C:\Program Files\MNTG42CRGT\uninstaller.exe, En quarantaine, [2400], [357599],1.0.1150
Adware.Tuto4PC.Generic, C:\Program Files\MNTG42CRGT\uninstaller.exe.config, En quarantaine, [2400], [357599],1.0.1150
Adware.Elex.Generic, C:\PROGRAM FILES (X86)\CLERFGHTSTERFIRY MONITOR\LOCAL64SPL.DLL.INI, En quarantaine, [2424], [358300],1.0.1150
Adware.Tuto4PC, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\ROAMING\ZHP\QUARANTINE\GQH8O57O2D.EXE, En quarantaine, [2315], [350731],1.0.1150
PUP.Optional.ChinAd, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\ROAMING\ZHP\QUARANTINE\KUAIZIP.DIR\KTPOP3.EXE, En quarantaine, [709], [361902],1.0.1150
Adware.Tuto4PC.Generic, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\ROAMING\{DCE-E3-1D-FE4DC-B4A4B-ABDE-C3B2F}\ZMINO7RDMX.EXE.CONFIG, En quarantaine, [2400], [365964],1.0.1150
Adware.Tuto4PC.Generic, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\{dce-e3-1d-fe4dc-b4a4b-abde-c3b2f}\6nhQ-'oj9n.exe, En quarantaine, [2400], [365964],1.0.1150
Adware.Tuto4PC.Generic, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\{dce-e3-1d-fe4dc-b4a4b-abde-c3b2f}\6nhQ-'oj9n.exe.config, En quarantaine, [2400], [365964],1.0.1150
Adware.Tuto4PC.Generic, C:\Users\C\u00c3\u00a9dric\AppData\Roaming\{dce-e3-1d-fe4dc-b4a4b-abde-c3b2f}\zMiNo7RDMX.exe, En quarantaine, [2400], [365964],1.0.1150
PUP.Optional.ChinAd, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\ROAMING\ZHP\QUARANTINE\KTPOP3.EXE, En quarantaine, [709], [361902],1.0.1150
Adware.Tuto4PC, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\ROAMING\ZHP\QUARANTINE\BESTCLEANER\UNINSTALLER.EXE, En quarantaine, [2315], [350732],1.0.1150
Adware.Social2Search, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\ROAMING\ZHP\QUARANTINE\WAJAM_INSTALL.EXE, En quarantaine, [2419], [366032],1.0.1150
PUP.Optional.EventMonitor, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\ROAMING\ZHP\QUARANTINE\EVENT MONITOR\EM.EXE, En quarantaine, [1696], [117244],1.0.1150
Adware.Elex.Generic, C:\PROGRAM FILES (X86)\THUJEPHZIMUT\CNSADAPTER.DLL, En quarantaine, [2424], [362676],1.0.1150
PUP.Optional.ChinAd, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\ROAMING\ZHP\QUARANTINE\KUAIZIP.DIR\MININEWSXKTT.EXE, En quarantaine, [709], [361905],1.0.1150
PUP.Optional.Booking, C:\USERS\C\u00c3\u00a9DRIC\DESKTOP\BOOKING.COM.URL, En quarantaine, [503], [360411],1.0.1150
PUP.Optional.Kuaizip, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\KZ7ZDATA.7Z, En quarantaine, [1407], [353144],1.0.1150
Adware.Tuto4PC, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\AIWMZ9CHQDSP.EXE, En quarantaine, [2315], [350732],1.0.1150
Adware.Tuto4PC, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\GLOBAL_INSTALLER.EXE, En quarantaine, [2315], [350730],1.0.1150
Adware.NeoBar, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\VK_OK_ADBLOCK.EXE, En quarantaine, [2747], [363188],1.0.1150
Adware.Elex.SHHKRST, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\WOK3888.TMP, En quarantaine, [2214], [362727],1.0.1150
Adware.Agent, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\00004912\NEWAUTOTIME_51477.JPG, En quarantaine, [315], [323624],1.0.1150
Adware.Tuto4PC, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\SYP0IZW6O9JP.EXE, En quarantaine, [2315], [350732],1.0.1150
Adware.Tuto4PC, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\MSV4C18NS2I3.EXE, En quarantaine, [2315], [350732],1.0.1150
PUP.Optional.ConvertAd, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\NST3442.TMP, En quarantaine, [78], [290930],1.0.1150
Adware.Eszjuxuan, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\00004856\51477.TOP.EXE, En quarantaine, [60], [359097],1.0.1150
PUP.Optional.Kuaizip, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\00005166\KUAIZIP_SETUP_129823379_ZZLM_013.EXE, En quarantaine, [1407], [353144],1.0.1150
Adware.Elex.SHHKRST, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\WOKA85D.TMP, En quarantaine, [2214], [362727],1.0.1150
Adware.Eszjuxuan, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\00004931\SERVICE.EXE, En quarantaine, [60], [333631],1.0.1150
Adware.Eszjuxuan, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\00004856\KPZIP.EXE, En quarantaine, [60], [359616],1.0.1150
Adware.Tuto4PC, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\63395M55QP\UNINMODULE.EXE, En quarantaine, [2315], [350732],1.0.1150
PUP.Optional.MyWebShield, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\893BA3CE-51AD-4317-9FE4-894C086BA373\893BA3CE-51AD-4317-9FE4-894C086BA373.EXE, En quarantaine, [641], [308998],1.0.1150
PUP.Optional.Elex, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\CHOWO6IBY\P6VBW5OCX.EXE, En quarantaine, [15], [339258],1.0.1150
Adware.Tuto4PC, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\CFBU5U2KKY\UNINMODULE.EXE, En quarantaine, [2315], [350732],1.0.1150
PUP.Optional.Tuto4PC, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\SMI5L3HYKC\CAS.EXE, En quarantaine, [113], [331647],1.0.1150
PUP.Optional.SystemHealer, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\TRKECASIJ\TRKECASIJ.EXE, En quarantaine, [1225], [363442],1.0.1150
Adware.Tuto4PC, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\SMI5L3HYKC\APPSOFT.EXE, En quarantaine, [2315], [350732],1.0.1150
Adware.Agent, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\IS-UANUT.TMP\AUTOTIME.EXE, En quarantaine, [315], [323847],1.0.1150
Adware.Tuto4PC.Generic, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\SMI5L3HYKC\APPSOFT.EXE.CONFIG.CONFIG, En quarantaine, [2400], [360183],1.0.1150
Adware.Tuto4PC.Generic, C:\Users\C\u00c3\u00a9dric\AppData\Local\Temp\SMI5L3HYKC\asasa.exe, En quarantaine, [2400], [360183],1.0.1150
Adware.Tuto4PC.Generic, C:\Users\C\u00c3\u00a9dric\AppData\Local\Temp\SMI5L3HYKC\asasa.exe.config.config, En quarantaine, [2400], [360183],1.0.1150
Adware.Tuto4PC.Generic, C:\Users\C\u00c3\u00a9dric\AppData\Local\Temp\SMI5L3HYKC\cas.exe.config.config, En quarantaine, [2400], [360183],1.0.1150
Adware.Tuto4PC, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\R5KH7Y0F7C\UNINMODULE.EXE, En quarantaine, [2315], [350732],1.0.1150
PUP.Optional.Elex, C:\USERS\C\u00c3\u00a9DRIC\APPDATA\LOCAL\TEMP\W9JYW8KWR\W9JYW8KWR.EXE, En quarantaine, [15], [339258],1.0.1150
PUP.Optional.SearchModule, C:\WINDOWS\TEMP\SM_CACHE_CHROME.EXE.CACHE, En quarantaine, [814], [242733],1.0.1150
PUP.Optional.Goobzo, C:\WINDOWS\SYSTEM32\TASKS\SMW_UpdateTask_Time_323836313938393032362d4137345a376c453278345a41, En quarantaine, [435], [189916],1.0.1150

Secteur physique: 0
(Aucun élément malveillant détecté)


(end)

Publicité


Signaler le contenu de ce document

Publicité