cjoint

Publicité


Publicité

Format du document : text/plain

Prévisualisation

Malwarebytes Anti-Malware
www.malwarebytes.org

Date de l'examen: 14/05/2014
Heure de l'examen: 19:54:16
Fichier journal: AMB.txt
Administrateur: Oui

Version: 2.00.1.1004
Base de donn�es Malveillants: v2014.05.14.08
Base de donn�es Rootkits: v2014.03.27.01
Licence: Gratuite
Protection contre les malveillants: D�sactiv�(e)
Protection contre les sites Web malveillants: D�sactiv�(e)
Chameleon: D�sactiv�(e)

Syst�me d'exploitation: Windows 7 Service Pack 1
Processeur: x64
Syst�me de fichiers: NTFS
Utilisateur: JeanMichel

Type d'examen: Examen "Menaces"
R�sultat: Termin�
Objets analys�s: 312143
Temps �coul�: 28 min, 57 sec

M�moire: Activ�(e)
D�marrage: Activ�(e)
Syst�me de fichiers: Activ�(e)
Archives: Activ�(e)
Rootkits: D�sactiv�(e)
Shuriken: Activ�(e)
PUP: Activ�(e)
PUM: Activ�(e)

Processus: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Cl�s du Registre: 1
PUP.Optional.MoviesToolBar.A, HKU\S-1-5-21-598655617-3088951219-708655410-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\ilividmoviestoolbarha, Mis en quarantaine, [a1af2e23740788ae1218a1f9c0424eb2],

Valeurs du Registre: 0
(No malicious items detected)

Donn�es du Registre: 1
PUP.Optional.SearchCertifiedTB.A, HKU\S-1-5-21-598655617-3088951219-708655410-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHURI|(Default), http://search.certified-toolbar.com?si=64843&st=bs&tid=6581&ver=4.6&ts=1377437101518.000008&tguid=64843-6581-1377437101518-D0B6BD7E53409F886F7757AAF5FC6658&q=%s, Bon: (http://www.google.com), Mauvais: (http://search.certified-toolbar.com?si=64843&st=bs&tid=6581&ver=4.6&ts=1377437101518.000008&tguid=64843-6581-1377437101518-D0B6BD7E53409F886F7757AAF5FC6658&q=%s),Remplac�,[430d074ae4973df93fa45debdd27f010]

Dossiers: 1
PUP.Optional.Conduit.A, C:\Users\JeanMichel\AppData\Local\Temp\CT3300844, Mis en quarantaine, [81cfb79a5427b086b30c6708a1615ba5],

Fichiers: 44
Trojan.Sefnit, C:\Users\JeanMichel\AppData\Local\Temp\setup_fsu_cid.exe, Mis en quarantaine, [242c044da0db7eb8d3cbbd4d986a4eb2],
PUP.Optional.Conduit.A, C:\Users\JeanMichel\AppData\Local\Temp\SPStub.exe, Mis en quarantaine, [55fb044d295236004b8555c6eb16fa06],
PUP.Optional.PerformerSoft.A, C:\Users\JeanMichel\AppData\Local\Temp\8835.tmp, Mis en quarantaine, [054b91c0f883e2544f9b9b7aac5555ab],
PUP.Optional.Conduit.A, C:\Users\JeanMichel\AppData\Local\Temp\ToolbarHelper.exe, Mis en quarantaine, [5bf5b39e4536ba7ca28d140aed131de3],
PUP.Optional.FileScout.A, C:\Users\JeanMichel\AppData\Local\Temp\7B76.tmp, Mis en quarantaine, [024e66eb710a01353be430d7fe033ac6],
Trojan.RotBrowse, C:\Users\JeanMichel\AppData\Local\Temp\94B0.tmp, Mis en quarantaine, [94bcca876e0d2b0bb8f409337490f30d],
PUP.Optional.Conduit.A, C:\Users\JeanMichel\AppData\Local\Temp\nsb248C.exe, Mis en quarantaine, [53fd232eb2c9c86ee0b4e63730d1a65a],
PUP.Optional.Conduit.A, C:\Users\JeanMichel\AppData\Local\Temp\nsb3ACD.exe, Mis en quarantaine, [e16ff75a6f0cf44210849a83cc3508f8],
PUP.Optional.Conduit.A, C:\Users\JeanMichel\AppData\Local\Temp\nsgB21E.exe, Mis en quarantaine, [d47c4a0746351d195e3672ab7c852bd5],
PUP.Optional.Conduit.A, C:\Users\JeanMichel\AppData\Local\Temp\nsl506C.exe, Mis en quarantaine, [9fb1b69bcbb03bfb0a8a59c4e21fa55b],
PUP.Optional.Conduit.A, C:\Users\JeanMichel\AppData\Local\Temp\nsl9155.exe, Mis en quarantaine, [163acd8414674beb9afaac713fc28a76],
PUP.Optional.Conduit.A, C:\Users\JeanMichel\AppData\Local\Temp\nsqA2CF.exe, Mis en quarantaine, [5ff1aca5611ab680237162bb0ef30ff1],
PUP.Optional.Conduit.A, C:\Users\JeanMichel\AppData\Local\Temp\che9F07.tmp, Mis en quarantaine, [351b1d341c5f54e2b102c67cf30d738d],
PUP.Optional.HomeTab.A, C:\Users\JeanMichel\AppData\Local\Temp\tbuCF12.exe, Mis en quarantaine, [f759a8a992e9979fe93d0921d72aee12],
PUP.Optional.HomeTab.A, C:\Users\JeanMichel\AppData\Local\Temp\tbuD548.exe, Mis en quarantaine, [2729b0a1e299e65035f14fdbf908ca36],
Trojan.RotBrowse, C:\Users\JeanMichel\AppData\Local\Temp\C496.tmp, Mis en quarantaine, [c58b74dd394215215a529aa2a85ce917],
Trojan.RotBrowse, C:\Users\JeanMichel\AppData\Local\Temp\517A.tmp, Mis en quarantaine, [b69a163b126976c01498a4987094c63a],
PUP.Optional.Iminent.A, C:\Users\JeanMichel\AppData\Local\Temp\air2737.exe, Mis en quarantaine, [c090133efc7f81b59d4777b5cb36d927],
PUP.Optional.Babylon.A, C:\Users\JeanMichel\AppData\Local\Temp\airA6DC.exe, Mis en quarantaine, [9ab6c68b126987af7db5dc29b1503bc5],
PUP.Optional.Babylon.A, C:\Users\JeanMichel\AppData\Local\Temp\B3A5B865-BAB0-7891-885D-CA51AE86FBFF\Latest\BExternal.dll, Mis en quarantaine, [272955fce3989e9892520121b44c07f9],
Trojan.RotBrowse, C:\Users\JeanMichel\AppData\Local\Temp\B3A5B865-BAB0-7891-885D-CA51AE86FBFF\Latest\ccp.exe, Mis en quarantaine, [153b92bf03788caa6f3dd16b0ff58b75],
PUP.Optional.Babylon.A, C:\Users\JeanMichel\AppData\Local\Temp\B3A5B865-BAB0-7891-885D-CA51AE86FBFF\Latest\CrxInstaller.dll, Mis en quarantaine, [a6aa3120a8d340f68bd00216f70a6898],
PUP.Optional.Delta, C:\Users\JeanMichel\AppData\Local\Temp\B3A5B865-BAB0-7891-885D-CA51AE86FBFF\Latest\MyDeltaTB.exe, Mis en quarantaine, [0b45a3ae6a118da9f454d92f08f90bf5],
PUP.Optional.Babylon.A, C:\Users\JeanMichel\AppData\Local\Temp\B3A5B865-BAB0-7891-885D-CA51AE86FBFF\Latest\Setup.exe, Mis en quarantaine, [ba9672df5a219c9a1f091a045fa1fc04],
Trojan.RotBrowse, C:\Users\JeanMichel\AppData\Local\Temp\9C4E416A-BAB0-7891-8BCA-5362B64C7C4E\Latest\ccp.exe, Mis en quarantaine, [0a4655fc1c5f320405a7d56761a3a65a],
PUP.Optional.Babylon.A, C:\Users\JeanMichel\AppData\Local\Temp\9C4E416A-BAB0-7891-8BCA-5362B64C7C4E\Latest\CrxInstaller.dll, Mis en quarantaine, [b39dba97512a4ceaa0bbb464b44da858],
PUP.Optional.Delta.A, C:\Users\JeanMichel\AppData\Local\Temp\9C4E416A-BAB0-7891-8BCA-5362B64C7C4E\Latest\MyBabylonTB.exe, Mis en quarantaine, [212faaa7710a53e3b55d2847f809926e],
PUP.Optional.OpenCandy, C:\Users\JeanMichel\AppData\Local\Temp\CDBurnerXP-updates\cdbxp_setup_4.5.2.4214.exe, Mis en quarantaine, [67e971e052296acc3f259b8434cc8e72],
PUP.Optional.Delta.A, C:\Users\JeanMichel\AppData\Local\Temp\anonymous417184588.webdriver-profile\extensions\ffxtlbr@delta.com\uninstall.exe, Mis en quarantaine, [a1afc68b1665f93d24eeafc0a75a6c94],
PUP.Optional.Babylon.A, C:\Users\JeanMichel\AppData\Local\Temp\F5E3123B-BAB0-7891-B4B6-92F69159805E\Latest\BExternal.dll, Mis en quarantaine, [d779cc856318fa3c5490ab779868ed13],
PUP.Optional.BabSolution.A, C:\Users\JeanMichel\AppData\Local\Temp\F5E3123B-BAB0-7891-B4B6-92F69159805E\Latest\BUSolution.dll, Mis en quarantaine, [0947e96884f7cc6a3770cf3c08f9ca36],
Trojan.RotBrowse, C:\Users\JeanMichel\AppData\Local\Temp\F5E3123B-BAB0-7891-B4B6-92F69159805E\Latest\ccp.exe, Mis en quarantaine, [ce82b9984d2ea393505c95a73fc55fa1],
PUP.Optional.Babylon.A, C:\Users\JeanMichel\AppData\Local\Temp\F5E3123B-BAB0-7891-B4B6-92F69159805E\Latest\CrxInstaller.dll, Mis en quarantaine, [57f94b067704db5b1c3f0414d13026da],
PUP.Optional.Babylon.A, C:\Users\JeanMichel\AppData\Local\Temp\F5E3123B-BAB0-7891-B4B6-92F69159805E\Latest\MntrDLLInstall.dll, Mis en quarantaine, [85cb97bac8b3be78411bc8504cb5be42],
PUP.Optional.Delta.A, C:\Users\JeanMichel\AppData\Local\Temp\F5E3123B-BAB0-7891-B4B6-92F69159805E\Latest\MyDeltaTB.exe, Mis en quarantaine, [0e4291c0bdbea98d23ef1b546e93e21e],
PUP.Optional.Babylon.A, C:\Users\JeanMichel\AppData\Local\Temp\F5E3123B-BAB0-7891-B4B6-92F69159805E\Latest\Setup.exe, Mis en quarantaine, [0e42bc95fa8160d630f8db436a96a15f],
PUP.Optional.BabSolution.A, C:\Users\JeanMichel\AppData\Local\Temp\busB0B8\BUSolution.dll, Mis en quarantaine, [c28e7dd4e19a92a4aafd8388ee1317e9],
PUP.Optional.Iminent.A, C:\Users\JeanMichel\AppData\Local\Temp\__TEMPWEBPLAYER__\iminent.exe, Mis en quarantaine, [064a3f12493257df0d6c17f23dc4c13f],
PUP.Optional.Bundlore, C:\Users\JeanMichel\Downloads\setup(1).exe, Mis en quarantaine, [163a232e6e0d2d092d1f55ccfb05bf41],
PUP.Optional.Bundlore, C:\Users\JeanMichel\Downloads\setup.exe, Mis en quarantaine, [0c44cf8288f3ac8a9eaeb1703ec2619f],
PUP.Optional.Simplytech, C:\Windows\Launcher.exe, Mis en quarantaine, [311fb0a1215a79bd9f4f35a6649f669a],
Trojan.Agent, C:\Users\JeanMichel\WinRAR.exe, Mis en quarantaine, [3e12dc7592e9c96d6cca3b56b25017e9],
PUP.Optional.Conduit.A, C:\Users\JeanMichel\AppData\Local\Temp\CT3300844\ddt.csf, Mis en quarantaine, [81cfb79a5427b086b30c6708a1615ba5],
PUP.Optional.ASK.A, C:\Users\JeanMichel\AppData\Local\Google\Chrome\User Data\Default\Preferences, Bon: (), Mauvais: ( "startup_urls": [ "http://start.iminent.com/?appId=EB8432B9-1AB4-4BDB-8975-C33470C37104", "http://www.dalesearch.com/?babsrc=HP_ss&mntrId=ACE9002354810931&affID=122974&tsp=5033", "http://search.iminent.com/?appId=EB8432B9-1AB4-4BDB-8975-C33470C37104", "http://feed.snapdo.com/?publisher=AirInstaller&dpid=AirInstaller&co=FR&userid=57687cea-d15d-224a-a3ed-61e69bbc5b0c&searchtype=hp&installDate=16/12/2013", "http://www.search.ask.com/?o=APN10645A&gct=hp&d=406-197&v=n10666-204&t=4" ],), Remplac�,[c888ce83b4c7e84e6fad6b0a9371fa06]

Secteurs physiques: 0
(No malicious items detected)


(end)

Publicité


Signaler le contenu de ce document

Publicité