cjoint

Publicité


Publicité

Format du document : text/plain

Prévisualisation

Malwarebytes Anti-Malware
www.malwarebytes.org

Date de l'examen: 28/06/2014
Heure de l'examen: 16:50:44
Fichier journal: malware.txt
Administrateur: Oui

Version: 2.00.2.1012
Base de donn�es Malveillants: v2014.06.28.02
Base de donn�es Rootkits: v2014.06.23.02
Licence: Essai
Protection contre les malveillants: D�sactiv�(e)
Protection contre les sites Web malveillants: D�sactiv�(e)
Self-protection: D�sactiv�(e)

Syst�me d'exploitation: Windows 7 Service Pack 1
Processeur: x64
Syst�me de fichiers: NTFS
Utilisateur: Toton

Type d'examen: Examen "Personnalis�"
R�sultat: Termin�
Objets analys�s: 1217421
Temps �coul�: 3 h, 11 min, 3 sec

M�moire: Activ�(e)
D�marrage: Activ�(e)
Syst�me de fichiers: Activ�(e)
Archives: Activ�(e)
Rootkits: Activ�(e)
Heuristics: Activ�(e)
PUP: Activ�(e)
PUM: Activ�(e)

Processus: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Cl�s du Registre: 0
(No malicious items detected)

Valeurs du Registre: 0
(No malicious items detected)

Donn�es du Registre: 0
(No malicious items detected)

Dossiers: 0
(No malicious items detected)

Fichiers: 40
Trojan.Agent.W, C:\Users\Public\Desktop\Extra\Activateurs Supplémentaires\Windows 7 Loader (Daz 1.7.2)\Windows 7 Loader.exe, Mis en quarantaine, [72786b10dd9e2f0768fefe5672923bc5],
PUP.Optional.Somoto, C:\Users\Toton\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1IS35NKI\setup[1].exe, Mis en quarantaine, [7f6bf388304b64d2d59714006a9acc34],
PUP.Optional.Somoto, C:\Users\Toton\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9V4KC2PY\setup[1].exe, Mis en quarantaine, [cf1b0d6e28538aac93d931e38c78728e],
PUP.Optional.BProtector, C:\Users\Toton\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D975A4SL\19[1].7z, Mis en quarantaine, [ecfe93e8e59616207281fe3954add030],
PUP.Optional.Somoto.A, C:\Users\Toton\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D975A4SL\bi_downloader[1].exe, Mis en quarantaine, [a545e8935a21a29462c33edf47baa957],
PUP.Optional.Somoto, C:\Users\Toton\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JN6VCKEF\BiTool[1].dll, Mis en quarantaine, [707a9be04d2ecb6b30c9ab7955ade31d],
PUP.Optional.InstallBrain.A, C:\Users\Toton\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UILRR1KR\pack[1].7z, Mis en quarantaine, [608a06751962cd69af07d4ab43be5ba5],
PUP.Optional.Skytech.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\SupTab\DpInterface32.dll.vir, Mis en quarantaine, [d515e09b4833a591a02b2e5ca55c53ad],
PUP.Optional.Skytech.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\SupTab\DpInterface64.dll.vir, Mis en quarantaine, [e208b6c5a2d96ec819b2e7a36f9218e8],
PUP.Optional.Skytech.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\SupTab\DpInterfacef32.dll.vir, Mis en quarantaine, [f2f848331f5c87afdfecaedc19e856aa],
PUP.Optional.IEPluginService.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\SupTab\RSHP.exe.vir, Mis en quarantaine, [de0c3c3ff883a88ee2380767b051b54b],
PUP.Optional.Skytech.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\SupTab\SearchProtect32.dll.vir, Mis en quarantaine, [6c7e205bc5b606306f5c3e4c42bf7b85],
PUP.Optional.Skytech.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\SupTab\SearchProtect64.dll.vir, Mis en quarantaine, [06e4fc7ff388a78f5b70bcce08f917e9],
PUP.Optional.Skytech.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\SupTab\SpAPPSv32.dll.vir, Mis en quarantaine, [fcee0a71f98239fdbc0f810960a1e020],
PUP.Optional.Skytech.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\SupTab\SpAPPSv64.dll.vir, Mis en quarantaine, [99516c0f0c6fbb7b2c9f06843ec3a15f],
PUP.Optional.SupTab.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\SupTab\SupTab.dll.vir, Mis en quarantaine, [de0c304b384364d2f968aa8b38c8c23e],
PUP.Optional.Wajam.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\Wajam\uninstall.exe.vir, Mis en quarantaine, [737788f3ed8eb086747ab98dae527c84],
PUP.Optional.Wajam.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\Wajam\IE\priam_bho.dll.vir, Mis en quarantaine, [1ecc205b9cdfa88e9658dc6a1fe1fe02],
PUP.Optional.Wajam.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\Wajam\Updater\update.exe.vir, Mis en quarantaine, [fbef205bd8a3b680d915e066f01021df],
PUP.Optional.Wajam.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\Wajam\Updater\WajamUpdater.exe.vir, Mis en quarantaine, [e406dba080fbbc7a315368b66898ad53],
PUP.Optional.IePluginService.A, C:\AdwCleaner\Quarantine\C\ProgramData\IePluginServices\PluginService.exe.vir, Mis en quarantaine, [2ac0f7840e6d0c2a02a3332890710000],
PUP.Optional.WPM.A, C:\AdwCleaner\Quarantine\C\ProgramData\WindowsProtectManger\wprotectmanager.exe.vir, Mis en quarantaine, [539788f32b5071c5bcbcf896ec150ef2],
PUP.Optional.Skytech.A, C:\AdwCleaner\Quarantine\C\Users\Toton\AppData\Roaming\sweet-page\UninstallManager.exe.vir, Mis en quarantaine, [d3172655740712246d5ecac0d82943bd],
PUP.Optional.Wajam.A, C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3RUXGK2R\wajam_update[1].exe, Mis en quarantaine, [806a0b701368ac8a28c6ba8c3fc160a0],
Trojan.Agent, E:\Ancien PC !\Program Files\Gpotato.eu\Flyff\Neuz.exe, Mis en quarantaine, [7d6d83f804777abc90c8ae739a667789],
PUP.FunMoods, E:\Ancien PC !\Users\maison\AppData\Local\Temp\is-116CO.tmp\funmoods.exe, Mis en quarantaine, [97539cdfee8d0630f11f71a7f80901ff],
PUP.Optional.Conduit, E:\Ancien PC !\Users\maison\Downloads\01net_Hamachi.exe, Mis en quarantaine, [a644453679023ff77fa7f5bf52b27d83],
PUP.Optional.Conduit, E:\Ancien PC !\Users\maison\Downloads\01net_Messenger_Plus!.exe, Mis en quarantaine, [658597e4e49773c342e4bbf99272718f],
Adware.Vomba, E:\Ancien PC !\Users\maison\Downloads\daemon4120-lite.exe, Mis en quarantaine, [d41617645c1ffb3bf8e83c54e71dba46],
PUP.Optional.OpenCandy, E:\Ancien PC !\Users\maison\Downloads\DTLite4413-0173.exe, Mis en quarantaine, [83673e3dbfbceb4b8aef6d41eb19ad53],
PUP.Optional.OpenCandy, E:\Ancien PC !\Users\maison\Downloads\winamp563_full_emusic-7plus_fr-fr.exe, Mis en quarantaine, [a743f586f784d264d2a7a90532d2a65a],
PUP.Optional.Conduit.A, E:\Ancien PC !\Windows\Temp\hss_update.exe, Mis en quarantaine, [d3177605a6d53afca25f1f2dcb368c74],
PUP.Optional.OpenCandy, E:\DD\Toton\DTLite4413-0173.exe, Mis en quarantaine, [11d986f594e756e099e0d8d629dbb050],
PUP.Optional.Conduit.A, E:\Ordinateur\Downloads\Bordel\HSS-1.30-install-anchorfree-76-conduit.zip, Mis en quarantaine, [69812a51c4b7d3631ce5d8749170e818],
PUP.Optional.OpenCandy, E:\Ordinateur\Downloads\Bordel\daemon-tools-lite_4-48-1-0347_fr_10729.exe, Mis en quarantaine, [6c7e1b604e2d3cfac7b21c923aca5da3],
PUP.Optional.OpenCandy, E:\Ordinateur\Downloads\Logiciels\daemon-tools-lite_daemon_tools_lite_4.45.4_francais_10729.exe, Mis en quarantaine, [ca20b5c665160b2ba6d3703e8183d030],
PUP.Optional.OpenCandy, E:\Ordinateur\Downloads\Logiciels\winamp5623_full_emusic-7plus_fr-fr.exe, Mis en quarantaine, [f7f3b7c4344726102a4f2589ff05ec14],
Hacktool.Agent, E:\Ordinateur\Downloads\Logiciels\Windows_Loader_v2.2.1.zip, Mis en quarantaine, [44a6d2a9b5c641f546dd1f3068996c94],
Hacktool.Agent, E:\Ordinateur\Downloads\Logiciels\Windows_Loader_v2.2.1\Windows Loader\Windows Loader.exe, Mis en quarantaine, [9a50463596e5e94d65be4c03e021c53b],
PUP.Optional.SweetPage.A, C:\Users\Toton\AppData\Local\Google\Chrome\User Data\Default\Preferences, Bon: (), Mauvais: ( "search_url": "http://www.sweet-page.com/web/?type=ds&ts=1403960591&from=cor&uid=SAMSUNGXSSDX830XSeries_S0XXNEAC500444&q={searchTerms}",), Remplac�,[d31792e91962d0666e155168b25210f0]

Secteurs physiques: 0
(No malicious items detected)


(end)

Publicité


Signaler le contenu de ce document

Publicité