cjoint

Publicité


Publicité

Format du document : text/plain

Prévisualisation

Malwarebytes Anti-Malware
www.malwarebytes.org

Date de l'analyse: 22/10/2015
Heure de l'analyse: 02:48
Fichier journal: mbam.txt
Administrateur: Oui

Version: 2.2.0.1024
Base de données de programmes malveillants: v2015.10.21.07
Base de données de rootkits: v2015.10.16.01
Licence: Gratuit
Protection contre les programmes malveillants: Désactivé
Protection contre les sites Web malveillants: Désactivé
Autoprotection: Désactivé

Système d'exploitation: Windows 7 Service Pack 1
Processeur: x64
Système de fichiers: NTFS
Utilisateur: Nelson

Type d'analyse: Analyse des menaces
Résultat: Terminé
Objets analysés: 423227
Temps écoulé: 39 min, 15 s

Mémoire: Activé
Démarrage: Activé
Système de fichiers: Activé
Archives: Activé
Rootkits: Désactivé
Heuristique: Activé
PUP: Activé
PUM: Activé

Processus: 0
(Aucun élément malveillant détecté)

Modules: 0
(Aucun élément malveillant détecté)

Clés du Registre: 40
PUP.Optional.DataMngr, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{CC1AC828-BB47-4361-AFB5-96EEE259DD87}, En quarantaine, [cccfda7fb7d479bd7bf75dc0917105fb],
PUP.Optional.DataMngr, HKLM\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{CC1AC828-BB47-4361-AFB5-96EEE259DD87}, En quarantaine, [cccfda7fb7d479bd7bf75dc0917105fb],
PUP.Optional.Babylon, HKU\S-1-5-18\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9}, En quarantaine, [13882b2e533840f657e46eae7b874fb1],
PUP.Optional.HomePageProtector, HKU\S-1-5-21-664123846-2673450582-2520729510-501\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{336D0C35-8A85-403A-B9D2-65C292C39087}, En quarantaine, [3b605405b4d7ec4a306ef22cfe043ec2],
PUP.Optional.01NetCom, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{8e5025c2-8ea3-430d-80b8-a14151068a6d}, En quarantaine, [5c3fec6db6d5ee4819ae54c722e06b95],
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BITGUARD.EXE, En quarantaine, [0a912138bfcc5bdb3f80a8bc27dc758b],
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BPROTECT.EXE, En quarantaine, [0f8ccd8c8308a492d6eadc8859aafd03],
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BPSVC.EXE, En quarantaine, [9704ec6d008b6cca5968065e7093e41c],
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BROWSERDEFENDER.EXE, En quarantaine, [89125ffa1972ae88358eeb798083fa06],
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\DPROTECTSVC.EXE, En quarantaine, [108b5009ddae58def2e2fe66fe0513ed],
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\JUMPFLIP, En quarantaine, [5348e178fc8fe2548a6703612cd736ca],
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SEARCHINSTALLER.EXE, En quarantaine, [e3b87adfafdcb48255a6154f946f8e72],
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\STINST32.EXE, En quarantaine, [693270e9810a3600d5315114d231649c],
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\STINST64.EXE, En quarantaine, [6734cf8ae8a34cea887f6104b84b47b9],
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\UTILJUMPFLIP.EXE, En quarantaine, [5b40f267bad193a34ec52b3a4bb8c13f],
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WEBSTEROIDS.EXE, En quarantaine, [d8c30851f19a73c370a64b1a8b7833cd],
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WEBSTEROIDSSERVICE.EXE, En quarantaine, [8417481115769e98fd1af2736d96857b],
PUP.Optional.SuperOptimizer, HKLM\SOFTWARE\WOW6432NODE\{1146AC44-2F03-4431-B4FD-889BC837521F}, En quarantaine, [9209b1a8741771c571c5bdc5b64d36ca],
PUP.Optional.SuperOptimizer, HKLM\SOFTWARE\WOW6432NODE\{6791A2F3-FC80-475C-A002-C014AF797E9C}, En quarantaine, [980390c96a2189adf443077b12f15fa1],
PUP.Optional.RelevantKnowledge, HKLM\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\mkndcbhcgphcfkkddanakjiepeknbgle, En quarantaine, [5f3cca8f414a57df72f7ea8e8f74a45c],
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BITGUARD.EXE, En quarantaine, [a3f84118b9d279bd803f3b29c93a6d93],
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BPROTECT.EXE, En quarantaine, [adee4514216ad95d7f418cd84bb8f30d],
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BPSVC.EXE, En quarantaine, [5744b5a4800b999df9c84b194db66997],
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BROWSERDEFENDER.EXE, En quarantaine, [0c8f39209deee551972c81e363a0d927],
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\DPROTECTSVC.EXE, En quarantaine, [0e8dc792f8936acc0aca95cfe61d23dd],
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\JUMPFLIP, En quarantaine, [792283d6ccbf5ed8dd143c28d62d22de],
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SEARCHINSTALLER.EXE, En quarantaine, [3566a7b2d5b692a451aae97bbb4819e7],
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\STINST32.EXE, En quarantaine, [1685ea6fbfccfb3b1beb5b0adf2455ab],
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\STINST64.EXE, En quarantaine, [46553821c3c847ef8087b0b5ea19f50b],
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\UTILJUMPFLIP.EXE, En quarantaine, [d7c472e78902bc7ae62dbda846bd33cd],
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WEBSTEROIDS.EXE, En quarantaine, [ddbe50094942a0968d897de8ee1559a7],
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WEBSTEROIDSSERVICE.EXE, En quarantaine, [a0fbcf8a5734ae889b7cadb8bd46fc04],
PUP.Optional.RelevantKnowledge, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{d08d9f98-1c78-4704-87e6-368b0023d831}, En quarantaine, [7229bc9ddfac41f5de34f9e5de241ce4],
PUP.Optional.SweetIM, HKU\S-1-5-18\SOFTWARE\SweetIM, En quarantaine, [8b10a1b823682b0b8b3493efc73c49b7],
PUP.Optional.InstallBrain, HKU\S-1-5-18\SOFTWARE\WNLT, En quarantaine, [584334259cef54e27ac3a7bfb74c6799],
PUP.Optional.SuperOptimizer, HKU\S-1-5-21-664123846-2673450582-2520729510-1001\SOFTWARE\APPDATALOW\{1146AC44-2F03-4431-B4FD-889BC837521F}, En quarantaine, [eab18fcaf09bf04670c29ce66a9903fd],
PUP.Optional.ConduitTB.Gen, HKU\S-1-5-21-664123846-2673450582-2520729510-1001\SOFTWARE\GOOGLE\CHROME\EXTENSIONS\EHDMAEHKIIAMPOLOKAJDCELLADMNOPGP, En quarantaine, [0c8fe079028962d4b9353637818136ca],
PUP.Optional.BProtector, HKU\S-1-5-21-664123846-2673450582-2520729510-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\bProtectSettings, En quarantaine, [5d3e045573189b9b8567d974ea192fd1],
PUP.Optional.SweetIM, HKU\S-1-5-21-664123846-2673450582-2520729510-501\SOFTWARE\SweetIM, En quarantaine, [33682f2a7b1095a16e518bf727dc0af6],
PUP.Optional.Incredibar, HKU\S-1-5-21-664123846-2673450582-2520729510-501\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{CFF4DB9B-135F-47C0-9269-B4C6572FD61A}, En quarantaine, [d0cb85d4a4e7a1953671580d679cf60a],

Valeurs du Registre: 42
PUP.Optional.01NetCom, HKU\S-1-5-21-664123846-2673450582-2520729510-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\TOOLBAR\WEBBROWSER|{8E5025C2-8EA3-430D-80B8-A14151068A6D}, Â%PŽ£Ž
C€¸¡AQ Šm, En quarantaine, [5c3fec6db6d5ee4819ae54c722e06b95]
PUP.Optional.01NetCom, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\TOOLBAR|{8E5025C2-8EA3-430D-80B8-A14151068A6D}, 01NET.com Toolbar, En quarantaine, [5c3fec6db6d5ee4819ae54c722e06b95]
PUP.Optional.01NetCom, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\URLSEARCHHOOKS|{8E5025C2-8EA3-430D-80B8-A14151068A6D}, En quarantaine, [5c3fec6db6d5ee4819ae54c722e06b95],
PUP.Optional.01NetCom, HKU\S-1-5-21-664123846-2673450582-2520729510-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\TOOLBAR\WEBBROWSER\{8E5025C2-8EA3-430D-80B8-A14151068A6D}, En quarantaine, [f5a698c1f3985dd904c38d8ef30fa759],
PUP.Optional.uTorrentBar, HKU\S-1-5-21-664123846-2673450582-2520729510-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\TOOLBAR\WEBBROWSER\{05EEB91A-AEF7-4F8A-978F-FB83E7B03F8E}, En quarantaine, [811a60f998f3c274bf43a87c32d034cc],
PUP.Optional.uTorrentBar, HKU\S-1-5-21-664123846-2673450582-2520729510-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\TOOLBAR\WEBBROWSER|{05EEB91A-AEF7-4F8A-978F-FB83E7B03F8E}, ¹î ÷®ŠO—ûƒç°?Ž, En quarantaine, [811a60f998f3c274bf43a87c32d034cc]
PUP.Optional.uTorrentBar, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\URLSEARCHHOOKS|{05EEB91A-AEF7-4F8A-978F-FB83E7B03F8E}, En quarantaine, [811a60f998f3c274bf43a87c32d034cc],
PUP.Optional.01NetCom, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\TOOLBAR\{8e5025c2-8ea3-430d-80b8-a14151068a6d}, En quarantaine, [b3e8a4b54645e155d9eec358e121a55b],
PUP.Optional.01NetCom, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\URLSEARCHHOOKS\{8e5025c2-8ea3-430d-80b8-a14151068a6d}, En quarantaine, [d4c7f1683655fd39e0e755c6dc265da3],
PUP.Optional.uTorrentBar, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\URLSEARCHHOOKS\{05eeb91a-aef7-4f8a-978f-fb83e7b03f8e}, En quarantaine, [66352039ef9ce84e946e67bd847e59a7],
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BITGUARD.EXE|debugger, tasklist.exe, En quarantaine, [0a912138bfcc5bdb3f80a8bc27dc758b]
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BPROTECT.EXE|debugger, tasklist.exe, En quarantaine, [0f8ccd8c8308a492d6eadc8859aafd03]
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BPSVC.EXE|debugger, tasklist.exe, En quarantaine, [9704ec6d008b6cca5968065e7093e41c]
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BROWSERDEFENDER.EXE|debugger, tasklist.exe, En quarantaine, [89125ffa1972ae88358eeb798083fa06]
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\DPROTECTSVC.EXE|debugger, tasklist.exe, En quarantaine, [108b5009ddae58def2e2fe66fe0513ed]
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\JUMPFLIP|debugger, tasklist.exe, En quarantaine, [5348e178fc8fe2548a6703612cd736ca]
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SEARCHINSTALLER.EXE|debugger, tasklist.exe, En quarantaine, [e3b87adfafdcb48255a6154f946f8e72]
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\STINST32.EXE|debugger, tasklist.exe, En quarantaine, [693270e9810a3600d5315114d231649c]
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\STINST64.EXE|debugger, tasklist.exe, En quarantaine, [6734cf8ae8a34cea887f6104b84b47b9]
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\UTILJUMPFLIP.EXE|debugger, tasklist.exe, En quarantaine, [5b40f267bad193a34ec52b3a4bb8c13f]
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WEBSTEROIDS.EXE|debugger, tasklist.exe, En quarantaine, [d8c30851f19a73c370a64b1a8b7833cd]
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WEBSTEROIDSSERVICE.EXE|debugger, tasklist.exe, En quarantaine, [8417481115769e98fd1af2736d96857b]
PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|daugava64, C:\Program Files\daugava\Ejemidvlf64.exe, En quarantaine, [fe9dee6b5338c670e9a80d3a7a89d729]
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BITGUARD.EXE|debugger, tasklist.exe, En quarantaine, [a3f84118b9d279bd803f3b29c93a6d93]
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BPROTECT.EXE|debugger, tasklist.exe, En quarantaine, [adee4514216ad95d7f418cd84bb8f30d]
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BPSVC.EXE|debugger, tasklist.exe, En quarantaine, [5744b5a4800b999df9c84b194db66997]
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BROWSERDEFENDER.EXE|debugger, tasklist.exe, En quarantaine, [0c8f39209deee551972c81e363a0d927]
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\DPROTECTSVC.EXE|debugger, tasklist.exe, En quarantaine, [0e8dc792f8936acc0aca95cfe61d23dd]
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\JUMPFLIP|debugger, tasklist.exe, En quarantaine, [792283d6ccbf5ed8dd143c28d62d22de]
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SEARCHINSTALLER.EXE|debugger, tasklist.exe, En quarantaine, [3566a7b2d5b692a451aae97bbb4819e7]
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\STINST32.EXE|debugger, tasklist.exe, En quarantaine, [1685ea6fbfccfb3b1beb5b0adf2455ab]
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\STINST64.EXE|debugger, tasklist.exe, En quarantaine, [46553821c3c847ef8087b0b5ea19f50b]
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\UTILJUMPFLIP.EXE|debugger, tasklist.exe, En quarantaine, [d7c472e78902bc7ae62dbda846bd33cd]
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WEBSTEROIDS.EXE|debugger, tasklist.exe, En quarantaine, [ddbe50094942a0968d897de8ee1559a7]
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WEBSTEROIDSSERVICE.EXE|debugger, tasklist.exe, En quarantaine, [a0fbcf8a5734ae889b7cadb8bd46fc04]
PUP.Optional.InstallBrain, HKU\S-1-5-18\SOFTWARE\WNLT|URL, MYSTART, En quarantaine, [584334259cef54e27ac3a7bfb74c6799]
PUP.Optional.ConduitTB.Gen, HKU\S-1-5-21-664123846-2673450582-2520729510-1001\SOFTWARE\GOOGLE\CHROME\EXTENSIONS\ehdmaehkiiampolokajdcelladmnopgp|path, C:\Users\Nelson\AppData\Local\CRE\ehdmaehkiiampolokajdcelladmnopgp.crx, En quarantaine, [0c8fe079028962d4b9353637818136ca]
PUP.Optional.Incredibar, HKU\S-1-5-21-664123846-2673450582-2520729510-501\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{CFF4DB9B-135F-47c0-9269-B4C6572FD61A}|FaviconURL, http://mystart.incredibar.com/favicon.ico, En quarantaine, [d0cb85d4a4e7a1953671580d679cf60a]
PUP.Optional.Incredibar, HKU\S-1-5-21-664123846-2673450582-2520729510-501\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{CFF4DB9B-135F-47c0-9269-B4C6572FD61A}|FaviconURLFallback, http://mystart.incredibar.com/favicon.ico, En quarantaine, [5c3f1c3d9fecc076495e194ce71ce41c]
PUP.Optional.Incredibar, HKU\S-1-5-21-664123846-2673450582-2520729510-501\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{CFF4DB9B-135F-47c0-9269-B4C6572FD61A}|TopResultURL, http://mystart.incredibar.com/?a=&loc=skw&search={searchTerms}&i=26, En quarantaine, [0398bf9aa2e97abc9512e87d0ef56b95]
PUP.Optional.Incredibar, HKU\S-1-5-21-664123846-2673450582-2520729510-501\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{CFF4DB9B-135F-47c0-9269-B4C6572FD61A}|TopResultURLFallback, http://mystart.incredibar.com/?a=&loc=skw&search={searchTerms}&i=26, En quarantaine, [fc9f2a2f5d2e999d20879acb709337c9]
PUP.Optional.Incredibar, HKU\S-1-5-21-664123846-2673450582-2520729510-501\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{CFF4DB9B-135F-47c0-9269-B4C6572FD61A}|URL, http://mystart.incredibar.com/?a=&loc=skw&search={searchTerms}&i=26, En quarantaine, [980363f6cfbc32046344aabbd82b45bb]

Données du Registre: 0
(Aucun élément malveillant détecté)

Dossiers: 11
PUP.Optional.SweetIM, C:\Windows\SysWOW64\jmdp, En quarantaine, [8e0d5cfd8ffc79bd9f1c83ff8e75b34d],
PUP.Optional.VBates, C:\Windows\System32\config\systemprofile\AppData\LocalLow\Company\Product\1.0, En quarantaine, [d6c5a1b8dbb0fc3a02402d6b5ea57c84],
PUP.Optional.VBates, C:\Windows\System32\config\systemprofile\AppData\LocalLow\Company\Product, En quarantaine, [d6c5a1b8dbb0fc3a02402d6b5ea57c84],
PUP.Optional.WhiteSmoke, C:\Users\Invité\AppData\Local\Google\Chrome\User Data\Default\Extensions\ogccgbmabaphcakpiclgcnmcnimhokcj, En quarantaine, [5546db7edfac41f5b705174ef60c926e],
PUP.Optional.WhiteSmoke, C:\Users\Invité\AppData\Local\Google\Chrome\User Data\Default\Extensions\ogccgbmabaphcakpiclgcnmcnimhokcj\1.4.0.4_0, En quarantaine, [5546db7edfac41f5b705174ef60c926e],
PUP.Optional.VBates, C:\Users\Nelson\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}, En quarantaine, [5348e079c0cbc1753f544227867cf20e],
PUP.Optional.VBates, C:\Users\Nelson\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}, En quarantaine, [5348e079c0cbc1753f544227867cf20e],
PUP.Optional.VBates, C:\Users\Nelson\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}\1.5, En quarantaine, [5348e079c0cbc1753f544227867cf20e],
PUP.Optional.VBates, C:\Windows\System32\config\systemprofile\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}, En quarantaine, [6a31e178662566d0a2f1274206fc857b],
PUP.Optional.VBates, C:\Windows\System32\config\systemprofile\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}, En quarantaine, [6a31e178662566d0a2f1274206fc857b],
PUP.Optional.VBates, C:\Windows\System32\config\systemprofile\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}\1.5, En quarantaine, [6a31e178662566d0a2f1274206fc857b],

Fichiers: 46
PUP.Optional.Cherimoya, C:\Users\Nelson\AppData\Roaming\ZHP\Quarantine\cherimoya.sys, En quarantaine, [03982138444731058474aba4d43047b9],
PUP.Optional.SweetPacks, C:\Users\Nelson\AppData\Roaming\ZHP\Quarantine\ExtensionUpdaterService.exe, En quarantaine, [f4a769f0296295a1c7fcb29cee1317e9],
PUP.Optional.RelevantKnowledge, C:\Users\Nelson\AppData\Roaming\ZHP\Quarantine\rlnx.dll, En quarantaine, [3467e772deadd75f5c4271cd857f817f],
PUP.Optional.RelevantKnowledge, C:\Users\Nelson\AppData\Roaming\ZHP\Quarantine\RelevantKnowledge\components\rlxg.dll, En quarantaine, [712a6eeb33585adc801e38062bd950b0],
PUP.Optional.ConduitTB.Gen, C:\Users\Nelson\AppData\Roaming\ZHP\Quarantine\uTorrentBar_FR\hk64tbuTor.dll, En quarantaine, [cccf86d3c9c266d0ec3176d77a8a6898],
PUP.Optional.ConduitTB.Gen, C:\Users\Nelson\AppData\Roaming\ZHP\Quarantine\uTorrentBar_FR\hktbuTor.dll, En quarantaine, [02993821fd8e0a2cd4490b4293712cd4],
PUP.Optional.ConduitTB.Gen, C:\Users\Nelson\AppData\Roaming\ZHP\Quarantine\uTorrentBar_FR\ldrtbuTor.dll, En quarantaine, [62393b1e6e1dc076c15cfa53dd27ae52],
PUP.Optional.ConduitTB.Gen, C:\Users\Nelson\AppData\Roaming\ZHP\Quarantine\uTorrentBar_FR\prxtbuTor.dll, En quarantaine, [e5b64712c1ca33034ad375d89a6a827e],
PUP.Optional.ConduitTB.Gen, C:\Users\Nelson\AppData\Roaming\ZHP\Quarantine\uTorrentBar_FR\tbuTor.dll, En quarantaine, [3962a2b7f794a98ddc41460760a459a7],
PUP.Optional.ConduitTB.Gen, C:\Users\Nelson\AppData\Roaming\ZHP\Quarantine\uTorrentBar_FR\uTorrentBar_FR\hk64tbuTor.dll, En quarantaine, [4e4db6a3117a54e2061770ddce366a96],
PUP.Optional.ConduitTB.Gen, C:\Users\Nelson\AppData\Roaming\ZHP\Quarantine\uTorrentBar_FR\uTorrentBar_FR\hktbuTor.dll, En quarantaine, [28730752a7e47eb824f9c38a56ae03fd],
PUP.Optional.ConduitTB.Gen, C:\Users\Nelson\AppData\Roaming\ZHP\Quarantine\uTorrentBar_FR\uTorrentBar_FR\ldrtbuTor.dll, En quarantaine, [f2a980d9f09b55e16bb2034aff054bb5],
PUP.Optional.ConduitTB.Gen, C:\Users\Nelson\AppData\Roaming\ZHP\Quarantine\uTorrentBar_FR\uTorrentBar_FR\tbuTor.dll, En quarantaine, [6e2d461368231b1bc25b490447bd2ad6],
PUP.Optional.Jabuticaba, C:\Users\Nelson\AppData\Roaming\ZHP\Quarantine\ortmp\uninstaller.exe, En quarantaine, [811a0653513a2a0c92e5b39d60a4e020],
PUP.Optional.ConduitTB.Gen, C:\Program Files (x86)\Harmony_Hollow_Software\ldrtbHarm.dll, En quarantaine, [3a612039e3a8cd690f0e96b7ad576898],
PUP.Optional.ConduitTB.Gen, C:\Program Files (x86)\Harmony_Hollow_Software\prxtbHarm.dll, En quarantaine, [4754e277fd8e2d09f12c7dd0ec18bf41],
PUP.Optional.ConduitTB.Gen, C:\Program Files (x86)\Harmony_Hollow_Software\tbHarm.dll, En quarantaine, [7d1e82d7e4a77bbb8895a0adb94bf808],
PUP.Optional.Conduit, C:\Program Files (x86)\The Hat\Harmony_Hollow_Software.exe, En quarantaine, [217ab5a4513ae35391ea0f0307f9fb05],
PUP.Optional.RelevantKnowledge, C:\Windows\System32\rlls64.dll, En quarantaine, [6239df7a7714b2848b132a1452b27b85],
PUP.Optional.RelevantKnowledge, C:\Windows\SysWOW64\rlls.dll, En quarantaine, [960510494645bf77eab43b037490e21e],
PUP.Optional.Perion, C:\Windows\Temp\is-2COSD.tmp\Eqxlolnp.dll, En quarantaine, [d6c577e2d5b685b17c63a69d6c95a858],
PUP.Optional.Perion, C:\Windows\Temp\is-GH85U.tmp\Eqxlolnp.dll, En quarantaine, [5447e5742863f54106d98fb430d140c0],
PUP.Optional.SafetyNut, C:\Windows\Temp\9116057b\patch_ff.exe, En quarantaine, [e2b9e57490fbf046a32965eb4aba847c],
Trojan.Agent, C:\Windows\SysWOW64\rlls.dll, En quarantaine, [930850097e0d1b1b488cb80348ba36ca],
PUP.Optional.Perion, C:\Windows\SysWOW64\ARFC\wrtc.exe, En quarantaine, [b1ead1886e1d71c5cb4a344058ab2cd4],
PUP.Optional.SweetIM, C:\Windows\SysWOW64\jmdp\SweetNT.crx, En quarantaine, [8e0d5cfd8ffc79bd9f1c83ff8e75b34d],
PUP.Optional.SweetIM, C:\Windows\SysWOW64\jmdp\ImHttpComm.dll, En quarantaine, [8e0d5cfd8ffc79bd9f1c83ff8e75b34d],
PUP.Optional.SweetIM, C:\Windows\SysWOW64\jmdp\lmrn.dll, En quarantaine, [8e0d5cfd8ffc79bd9f1c83ff8e75b34d],
PUP.Optional.SweetIM, C:\Windows\SysWOW64\jmdp\msvcp100.dll, En quarantaine, [8e0d5cfd8ffc79bd9f1c83ff8e75b34d],
PUP.Optional.SweetIM, C:\Windows\SysWOW64\jmdp\msvcr100.dll, En quarantaine, [8e0d5cfd8ffc79bd9f1c83ff8e75b34d],
PUP.Optional.SweetIM, C:\Windows\SysWOW64\jmdp\stij.exe, En quarantaine, [8e0d5cfd8ffc79bd9f1c83ff8e75b34d],
PUP.Optional.VBates, C:\Windows\System32\config\systemprofile\AppData\LocalLow\Company\Product\1.0\localStorageIE.txt, En quarantaine, [d6c5a1b8dbb0fc3a02402d6b5ea57c84],
PUP.Optional.VBates, C:\Windows\System32\config\systemprofile\AppData\LocalLow\Company\Product\1.0\localStorageIE_backup.txt, En quarantaine, [d6c5a1b8dbb0fc3a02402d6b5ea57c84],
PUP.Optional.WhiteSmoke, C:\Users\Invité\AppData\Local\Google\Chrome\User Data\Default\Extensions\ogccgbmabaphcakpiclgcnmcnimhokcj\1.4.0.4_0\flavour.js, En quarantaine, [5546db7edfac41f5b705174ef60c926e],
PUP.Optional.WhiteSmoke, C:\Users\Invité\AppData\Local\Google\Chrome\User Data\Default\Extensions\ogccgbmabaphcakpiclgcnmcnimhokcj\1.4.0.4_0\logger.js, En quarantaine, [5546db7edfac41f5b705174ef60c926e],
PUP.Optional.WhiteSmoke, C:\Users\Invité\AppData\Local\Google\Chrome\User Data\Default\Extensions\ogccgbmabaphcakpiclgcnmcnimhokcj\1.4.0.4_0\main.js, En quarantaine, [5546db7edfac41f5b705174ef60c926e],
PUP.Optional.WhiteSmoke, C:\Users\Invité\AppData\Local\Google\Chrome\User Data\Default\Extensions\ogccgbmabaphcakpiclgcnmcnimhokcj\1.4.0.4_0\newtab.js, En quarantaine, [5546db7edfac41f5b705174ef60c926e],
PUP.Optional.WhiteSmoke, C:\Users\Invité\AppData\Local\Google\Chrome\User Data\Default\Extensions\ogccgbmabaphcakpiclgcnmcnimhokcj\1.4.0.4_0\popup.js, En quarantaine, [5546db7edfac41f5b705174ef60c926e],
PUP.Optional.WhiteSmoke, C:\Users\Invité\AppData\Local\Google\Chrome\User Data\Default\Extensions\ogccgbmabaphcakpiclgcnmcnimhokcj\1.4.0.4_0\simapp.js, En quarantaine, [5546db7edfac41f5b705174ef60c926e],
PUP.Optional.WhiteSmoke, C:\Users\Invité\AppData\Local\Google\Chrome\User Data\Default\Extensions\ogccgbmabaphcakpiclgcnmcnimhokcj\1.4.0.4_0\toolbar.js, En quarantaine, [5546db7edfac41f5b705174ef60c926e],
PUP.Optional.VBates, C:\Users\Nelson\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}\1.5\tree.js, En quarantaine, [5348e079c0cbc1753f544227867cf20e],
PUP.Optional.VBates, C:\Users\Nelson\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}\1.5\wlist.js, En quarantaine, [5348e079c0cbc1753f544227867cf20e],
PUP.Optional.VBates, C:\Windows\System32\config\systemprofile\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}\1.5\config.js, En quarantaine, [6a31e178662566d0a2f1274206fc857b],
PUP.Optional.VBates, C:\Windows\System32\config\systemprofile\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}\1.5\tree.js, En quarantaine, [6a31e178662566d0a2f1274206fc857b],
PUP.Optional.VBates, C:\Windows\System32\config\systemprofile\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}\1.5\wlist.js, En quarantaine, [6a31e178662566d0a2f1274206fc857b],
PUP.Optional.HijackHosts.Gen, C:\Windows\System32\debv\piv\afau.dat, En quarantaine, [3b60e27755364beb2aee173df50f6a96],

Secteurs physiques: 0
(Aucun élément malveillant détecté)


(end)

Publicité


Signaler le contenu de ce document

Publicité