cjoint

Publicité


Publicité

Format du document : text/plain

Prévisualisation

Malwarebytes Anti-Malware
www.malwarebytes.org

Date de l'examen: 01/05/2014
Heure de l'examen: 00:34:13
Fichier journal: Malwarebyte 4.txt
Administrateur: Oui

Version: 2.00.1.1004
Base de donn�es Malveillants: v2014.04.30.02
Base de donn�es Rootkits: v2014.03.27.01
Licence: Gratuite
Protection contre les malveillants: D�sactiv�(e)
Protection contre les sites Web malveillants: D�sactiv�(e)
Chameleon: D�sactiv�(e)

Syst�me d'exploitation: Windows 7 Service Pack 1
Processeur: x64
Syst�me de fichiers: NTFS
Utilisateur: jn

Type d'examen: Examen "Personnalis�"
R�sultat: Termin�
Objets analys�s: 745541
Temps �coul�: 15 h, 56 min, 57 sec

M�moire: Activ�(e)
D�marrage: Activ�(e)
Syst�me de fichiers: Activ�(e)
Archives: Activ�(e)
Rootkits: Activ�(e)
Shuriken: Activ�(e)
PUP: Activ�(e)
PUM: Activ�(e)

Processus: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Cl�s du Registre: 0
(No malicious items detected)

Valeurs du Registre: 0
(No malicious items detected)

Donn�es du Registre: 0
(No malicious items detected)

Dossiers: 0
(No malicious items detected)

Fichiers: 19
PUP.Optional.GenericExt.A, C:\Users\jn\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\APIO4H5F\MinibarChrome[1].exe, Mis en quarantaine, [f20e6799f907c8381c1cfe3f10f01ce4],
Adware.Linkular, C:\Users\jn\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\APIO4H5F\Boxore_AM[1].exe, Mis en quarantaine, [3ac6b14f14ec857b3eca82d87e864eb2],
PUP.Optional.Amonetize.A, C:\Users\jn\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\O0813ZDR\Launcher[1].exe, Mis en quarantaine, [34cc24dcc7396997f37263d701ffb14f],
PUP.Optional.Iminent.A, C:\Users\jn\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\O0813ZDR\IminentMinibarIE[1].exe, Mis en quarantaine, [f907c33d5fa1ab5595e55ea745bc01ff],
PUP.Optional.Conduit.A, C:\Users\jn\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\O0813ZDR\spstub[1].exe, Mis en quarantaine, [52aea45c748c36ca002a918847ba669a],
PUP.Optional.Wajam.A, C:\Users\jn\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\O0813ZDR\wajam_install[2].exe, Mis en quarantaine, [bf41e91715eb88785a3634061be55da3],
PUP.Optional.SkyTech.A, C:\Users\jn\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\O0813ZDR\adks_awesomehp[1].exe, Mis en quarantaine, [57a9ea16639db9478b5a173b51b0c838],
PUP.Optional.Conduit.A, C:\Users\jn\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VA4314CZ\SPSetup[1].exe, Mis en quarantaine, [13edd82849b7e02098567d9d0ff225db],
PUP.Optional.Iminent.A, C:\Users\jn\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VA4314CZ\IminentSetup[1].exe, Mis en quarantaine, [5aa69769c9379070301062c827da52ae],
PUP.Optional.Iminent, C:\Users\jn\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VA4314CZ\IMinentToolbar[1].exe, Mis en quarantaine, [15eb996704fc17e9c0c4dd58db255fa1],
PUP.Optional.Iminent.A, C:\Users\jn\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VA4314CZ\iminent[1].msi, Mis en quarantaine, [0ef2dd23877922dede621a10b1506898],
PUP.Optional.Amonetize.AS, C:\Users\jn\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VA4314CZ\setup__1728[1].exe, Mis en quarantaine, [e51b926e41bf7888693e52bf738ef907],
PUP.Optional.Amonetize.AS, C:\Users\jn\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VA4314CZ\setup__1729[1].exe, Mis en quarantaine, [23dd43bdaf51b0508e19ff12ac556e92],
PUP.Optional.BundleInstaller.A, C:\Users\jn\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VA4314CZ\EasyPHP.exe, Mis en quarantaine, [b848f7093fc15aa6977ec1798e726e92],
Trojan.Dropper.SCT, C:\Users\jn\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VA4314CZ\scstmp[1].exe, Mis en quarantaine, [1be554acd22ea45cca5baaaf748d7987],
Adware.Linkular, C:\Users\jn\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VOHR489V\ShoppingChip[1].exe, Mis en quarantaine, [42bede2230d07d83ca3ea4b6e71d52ae],
PUP.Optional.Surftastic.A, C:\Users\jn\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VOHR489V\Setup[1].exe, Mis en quarantaine, [a25eed13b74933cdf9656be55fa2ce32],
PUP.Optional.Amonetize.A, C:\Users\jn\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VOHR489V\Bundle[1].exe, Mis en quarantaine, [fa062fd1a65a808082a45b67f2110ef2],
PUP.Optional.Iminent.A, C:\Users\jn\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VOHR489V\MinibarFirefox[1].exe, Mis en quarantaine, [6e92a15f2ad6cb357ffbd233bd4444bc],

Secteurs physiques: 0
(No malicious items detected)


(end)

Publicité


Signaler le contenu de ce document

Publicité