cjoint

Publicité


Publicité

Format du document : text/plain

Prévisualisation

Malwarebytes Anti-Malware
www.malwarebytes.org

Date de l'analyse: 18/09/2015
Heure de l'analyse: 11:40
Fichier journal: MBAM.txt
Administrateur: Oui

Version: 2.1.8.1057
Base de données de programmes malveillants: v2015.09.18.03
Base de données de rootkits: v2015.08.16.01
Licence: Gratuit
Protection contre les programmes malveillants: Désactivé
Protection contre les sites Web malveillants: Désactivé
Autoprotection: Désactivé

Système d'exploitation: Windows 10
Processeur: x64
Système de fichiers: NTFS
Utilisateur: Luc

Type d'analyse: Analyse des menaces
Résultat: Terminé
Objets analysés: 387700
Temps écoulé: 5 min, 52 s

Mémoire: Activé
Démarrage: Activé
Système de fichiers: Activé
Archives: Activé
Rootkits: Désactivé
Heuristique: Activé
PUP: Activé
PUM: Activé

Processus: 0
(Aucun élément malveillant détecté)

Modules: 0
(Aucun élément malveillant détecté)

Clés du registre: 6
PUP.Optional.FastSearch, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\cfr3011, Supprimer au redémarrage, [85d61c15444743f3b015860f36cebd43],
PUP.Optional.IQIYIVideo, HKLM\SOFTWARE\MOZILLAPLUGINS\@iqiyi.com/npWebPlayer, En quarantaine, [82d9d55c9feca39344d74956df257e82],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-18\SOFTWARE\{21A42CEF-1C72-43B4-8024-A8DEAE53B446}, En quarantaine, [a0bb131e33587cbaf5606a1505fffa06],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-19\SOFTWARE\{21A42CEF-1C72-43B4-8024-A8DEAE53B446}, En quarantaine, [5efdb081cac1b680d87d49364eb6fc04],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-20\SOFTWARE\{21A42CEF-1C72-43B4-8024-A8DEAE53B446}, En quarantaine, [91cadf52b3d882b4cf869be411f3bb45],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-21-927415853-3766957723-166398350-1001\SOFTWARE\{21A42CEF-1C72-43B4-8024-A8DEAE53B446}, En quarantaine, [5209d859bfcc87af272eff80000450b0],

Valeurs du registre: 4
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-18\SOFTWARE\{21A42CEF-1C72-43B4-8024-A8DEAE53B446}|Name, C:\Program Files\shopperz170920151845\Peklau.exe, En quarantaine, [a0bb131e33587cbaf5606a1505fffa06]
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-19\SOFTWARE\{21A42CEF-1C72-43B4-8024-A8DEAE53B446}|Name, C:\Program Files\shopperz170920151845\Peklau.exe, En quarantaine, [5efdb081cac1b680d87d49364eb6fc04]
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-20\SOFTWARE\{21A42CEF-1C72-43B4-8024-A8DEAE53B446}|Name, C:\Program Files\shopperz170920151845\Peklau.exe, En quarantaine, [91cadf52b3d882b4cf869be411f3bb45]
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-21-927415853-3766957723-166398350-1001\SOFTWARE\{21A42CEF-1C72-43B4-8024-A8DEAE53B446}|Name, C:\Program Files\shopperz170920151845\Peklau.exe, En quarantaine, [5209d859bfcc87af272eff80000450b0]

Données du registre: 1
PUP.Optional.Qone8, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES|DefaultScope, {33BB0A4E-99AF-4226-BDF6-49120163DE86}, Bon : ({0633EE93-D776-472f-A0FF-E1416B8B2E3A}), Mauvais : ({33BB0A4E-99AF-4226-BDF6-49120163DE86}),Remplacé,[f06bc56c5f2c51e546efdc92ed188977]

Dossiers: 0
(Aucun élément malveillant détecté)

Fichiers: 41
PUP.Optional.HideBaid, C:\Program Files (x86)\baidu\Bind.exe, En quarantaine, [cd8e0a275f2c91a51c61bc127e836e92],
Rootkit.Agent.A, C:\Windows\System32\drivers\bsdriver.sys, Supprimer au redémarrage, [203b75bca4e769cd84ef78fb06fbc23e],
PUP.Optional.Shopperz.BrwsrFlsh, C:\Windows\System32\drivers\cherimoya.sys, Supprimer au redémarrage, [382308292d5e0d29740f7d273bcaa957],
PUP.Optional.Bundle, C:\Users\Luc\AppData\Local\Temp\gardinbioEn quarantaineCplantgrandmere.rar__15047_i1656258807_il2100914.exe, [baa136fb16753ef8ed4e62447a8b1fe1], , %5
PUP.Optional.Komodia, C:\Users\Luc\AppData\Local\Temp\oprun6993.exe, En quarantaine, [65f67ab72467181e03f5e7c7827f4db3],
PUP.Optional.Nosibay, C:\Users\Luc\AppData\Local\Temp\1792015203021\Bubble Dock Uninstall.exe, En quarantaine, [3e1da0918efd092d2e653b6a23e29070],
PUP.Optional.Nosibay, C:\Users\Luc\AppData\Local\Temp\1792015203240\Bubble Dock Uninstall.exe, En quarantaine, [6deedb565833082ef2a1f2b339cc2fd1],
PUP.Optional.Nosibay, C:\Users\Luc\AppData\Local\Temp\1792015203914\Bubble Dock Uninstall.exe, En quarantaine, [e576cd6439521f17d2c16243b451b24e],
PUP.Optional.Nosibay, C:\Users\Luc\AppData\Local\Temp\1792015204112\Selection Tools Uninstall.exe, En quarantaine, [3922b0817813e155f89b7530bb4a6b95],
PUP.Optional.Nosibay, C:\Users\Luc\AppData\Local\Temp\1792015204338\WindApp Uninstall.exe, En quarantaine, [e972de538efd7cbaeea580250bfad12f],
PUP.Optional.EoRezo, C:\Users\Luc\AppData\Local\Temp\is-9CKP0.tmp\package_bubbledock_installer_multilang.exe, En quarantaine, [6dee013012793cfadffbbffbab5612ee],
PUP.Optional.EoRezo, C:\Users\Luc\AppData\Local\Temp\is-9CKP0.tmp\380.exe, En quarantaine, [34273ef3305b1e18b723ebcf0df4d927],
PUP.Optional.EoRezo, C:\Users\Luc\AppData\Local\Temp\is-9CKP0.tmp\420.exe, En quarantaine, [de7d46ebdcafb97df6e45e5c3ac7c739],
PUP.Optional.EoRezo, C:\Users\Luc\AppData\Local\Temp\is-9CKP0.tmp\436.exe, En quarantaine, [a5b669c8068594a2ddfda9111fe2fe02],
PUP.Optional.EoRezo, C:\Users\Luc\AppData\Local\Temp\is-9CKP0.tmp\465.exe, En quarantaine, [83d840f1f695a98d805ac7f3a65bb848],
PUP.Optional.EoRezo, C:\Users\Luc\AppData\Local\Temp\is-9CKP0.tmp\473.exe, En quarantaine, [90cb0f2265262313c713823804fd37c9],
PUP.Optional.EoRezo, C:\Users\Luc\AppData\Local\Temp\is-9CKP0.tmp\583.exe, En quarantaine, [075462cf77148caae3f70caec1409f61],
PUP.Optional.EoRezo, C:\Users\Luc\AppData\Local\Temp\is-9CKP0.tmp\596.exe, En quarantaine, [60fbc36e7912ea4cb7232f8b57aa5da3],
PUP.Optional.EoRezo, C:\Users\Luc\AppData\Local\Temp\is-9CKP0.tmp\package_airwebbar_installer_multilang.exe, En quarantaine, [9bc08ba662297abc36a4fdbd709114ec],
PUP.Optional.EoRezo, C:\Users\Luc\AppData\Local\Temp\is-9CKP0.tmp\package_bobrowser_installer_multilang.exe, En quarantaine, [5efdaa87ccbf67cf607a6f4b7a87e818],
PUP.Optional.EoRezo, C:\Users\Luc\AppData\Local\Temp\is-9CKP0.tmp\package_boxore_installer_multilang.exe, En quarantaine, [aab1f140d9b2c2745288487204fd6c94],
PUP.Optional.EoRezo, C:\Users\Luc\AppData\Local\Temp\is-9CKP0.tmp\package_bubblefoot_installer_multilang.exe, En quarantaine, [78e3052c4645092d4a907a40e41d02fe],
PUP.Optional.EoRezo, C:\Users\Luc\AppData\Local\Temp\is-9CKP0.tmp\package_BubbleSound_installer_multilang.exe, En quarantaine, [7eddba7734579b9b9e3c8436da278080],
PUP.Optional.EoRezo, C:\Users\Luc\AppData\Local\Temp\is-9CKP0.tmp\package_iminent_p_installer_multilang.exe, En quarantaine, [c794e1509af14de946949624ff021ae6],
PUP.Optional.EoRezo, C:\Users\Luc\AppData\Local\Temp\is-9CKP0.tmp\package_pcrossbrowser_installer_multilang.exe, En quarantaine, [91cab9786a21b185d406c0fadb26b749],
PUP.Optional.EoRezo, C:\Users\Luc\AppData\Local\Temp\is-9CKP0.tmp\package_pzombie_installer_multilang.exe, En quarantaine, [6af1dd54ee9da492d208f0cae21f926e],
PUP.Optional.EoRezo, C:\Users\Luc\AppData\Local\Temp\is-9CKP0.tmp\package_wajam_installer_multilang.exe, En quarantaine, [a6b555dc2c5f30067664d4e638c9659b],
PUP.Optional.Tuto4PC, C:\Users\Luc\AppData\Local\Temp\is-U7S9P.tmp\gentlemjmp_ieu.exe, En quarantaine, [5b0036fb7714c472a08c297b7f86639d],
Rootkit.Agent.A, C:\Windows\System32\drivers\cherimoya.sys, Supprimer au redémarrage, [a6b5979a0f7cae88a5fd062dff04bf41],
Trojan.Agent, C:\Users\Luc\AppData\Local\Temp\oprun1188.exe, En quarantaine, [3b200130ee9df73f84843a68aa5959a7],
Trojan.Agent, C:\Users\Luc\AppData\Local\Temp\oprun6993.exe, En quarantaine, [3b20ae831f6c88ae7692a101649f837d],
PUP.Optional.ABengine, C:\Users\Luc\AppData\Local\Temp\lengine.ini.log, En quarantaine, [0e4dae835c2f69cd2fd20e73778d649c],
PUP.Optional.ABengine, C:\Windows\Temp\lengine.ini.log, En quarantaine, [1b40e1507e0d79bd1ee3a1e033d1837d],
PUP.Optional.Acengine, C:\Users\Luc\AppData\Local\Temp\acengine.log, En quarantaine, [62f94ce5088325116f9ddba6729258a8],
PUP.Optional.Acengine, C:\Windows\Temp\acengine.log, En quarantaine, [ef6c78b992f9b87e51bba2df46be6b95],
PUP.Optional.BrowseSmart, C:\Users\Luc\AppData\Roaming\Mozilla\Firefox\Profiles\m4xq11ls.default\extensions\firefox@browsesmart.net.xpi, En quarantaine, [60fb3ef3acdf88aef3feceb990746c94],
PUP.Optional.BubbleDock, C:\Users\Luc\AppData\Local\Temp\Bubble Dock.txt, En quarantaine, [5902dd54fb90cb6b9c89bbcd857f817f],
PUP.Optional.BubbleDock, C:\Users\Luc\AppData\Local\Temp\LBubble Dock.txt, En quarantaine, [8dce939e0289033395924741b3516f91],
PUP.Optional.FastSearch, C:\Windows\System32\Tasks\cfr3011, En quarantaine, [5efdc56c553671c516a97c1930d4a65a],
PUP.Optional.QuickSearch, C:\Users\Luc\AppData\Roaming\Mozilla\Firefox\Profiles\m4xq11ls.default\prefs.js, Bon : (), Mauvais : (quick_searchff@gmail.com), Remplacé,[9ebdc17046452f0789439816cb3a7090]
PUP.Optional.HijackHosts.Gen, C:\Windows\System32\eki\fip\ijycs.dat, En quarantaine, [c69577baed9e93a39892baef8283dd23],

Secteurs physiques: 0
(Aucun élément malveillant détecté)


(end)

Publicité


Signaler le contenu de ce document

Publicité