cjoint

Publicité


Publicité

Format du document : text/plain

Prévisualisation

Malwarebytes Anti-Malware
www.malwarebytes.org

Date de l'analyse: 14/11/2015
Heure de l'analyse: 07:29:49
Fichier journal: Rapport malware.txt
Administrateur: Oui

Version: 2.2.0.1024
Base de données de programmes malveillants: v2015.11.14.01
Base de données de rootkits: v2015.11.13.01
Licence: Gratuit
Protection contre les programmes malveillants: Désactivé
Protection contre les sites Web malveillants: Désactivé
Autoprotection: Désactivé

Système d'exploitation: Windows Vista
Processeur: x86
Système de fichiers: NTFS
Utilisateur: Rose

Type d'analyse: Analyse des menaces
Résultat: Terminé
Objets analysés: 315416
Temps écoulé: 44 min, 57 s

Mémoire: Activé
Démarrage: Activé
Système de fichiers: Activé
Archives: Activé
Rootkits: Désactivé
Heuristique: Activé
PUP: Activé
PUM: Activé

Processus: 0
(Aucun élément malveillant détecté)

Modules: 0
(Aucun élément malveillant détecté)

Clés du Registre: 11
PUP.Optional.Delta.ShrtCln, HKLM\SOFTWARE\CLASSES\APPID\{C26644C4-2A12-4CA6-8F2E-0EDE6CF018F3}, En quarantaine, [ebfef28b2467c76f108768c57092f808],
PUP.Optional.Babylon, HKU\S-1-5-21-649854328-3608318660-768104295-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9}, En quarantaine, [e0098cf12467b87e968f7cb4ac5618e8],
PUP.Optional.Delta.ShrtCln, HKU\S-1-5-21-649854328-3608318660-768104295-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{82E1477C-B154-48D3-9891-33D83C26BCD3}, En quarantaine, [b63390edd6b5bd79014059d441c1fe02],
PUP.Optional.Delta.ShrtCln, HKU\S-1-5-21-649854328-3608318660-768104295-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{C1AF5FA5-852C-4C90-812E-A7F75E011D87}, En quarantaine, [7178d7a67e0d7abc45fb73baf70bb749],
PUP.Optional.DataMngr, HKLM\SOFTWARE\DataMngr, En quarantaine, [34b5bebfd1ba56e020682280d33028d8],
PUP.Optional.BTClient, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\btclient Updater, Supprimer au redémarrage, [8465f28bc6c5290d6f49acb7f013be42],
PUP.Optional.DataMngr, HKU\S-1-5-21-649854328-3608318660-768104295-1000\SOFTWARE\DataMngr, En quarantaine, [bf2a314cf19a20160164fd6f7c8708f8],
PUP.Optional.DataMngr, HKU\S-1-5-21-649854328-3608318660-768104295-1000\SOFTWARE\DataMngr_Toolbar, En quarantaine, [13d69de0c5c6f73fa1c5105c9e6560a0],
PUP.Optional.InstallCore, HKU\S-1-5-21-649854328-3608318660-768104295-1000\SOFTWARE\InstallCore, En quarantaine, [15d4cab3880382b47cf82554ec17d927],
PUP.Optional.Babylon, HKU\S-1-5-21-649854328-3608318660-768104295-1000\SOFTWARE\BABSOLUTION\Updater, En quarantaine, [b7328df02c5fdf579ab808574eb507f9],
PUP.Optional.KeepMySearch, HKU\S-1-5-21-649854328-3608318660-768104295-1000_Classes\keepmysearch, En quarantaine, [0edb7eff1378ec4a92fe6f0bcb388977],

Valeurs du Registre: 1
PUP.Optional.BrowserProtect, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\ABOUTURLS|bProtectTabs, http://www.yd.delta-search.com/?babsrc=NT_ss&mntrId=BADC0013E8DD2811&affID=119357&tt=040713_rdrctful&tsp=4937, En quarantaine, [08e1c6b7cbc08caa41fbbca7b54e46ba]

Données du Registre: 0
(Aucun élément malveillant détecté)

Dossiers: 16
PUP.Optional.Delta.ShrtCln, C:\Users\Rose\AppData\Local\Temp\mt_ffx\Delta, En quarantaine, [6b7e700db9d288ae2be51638d0329f61],
PUP.Optional.Delta.ShrtCln, C:\Users\Rose\AppData\Local\Temp\mt_ffx\Delta\delta, En quarantaine, [6b7e700db9d288ae2be51638d0329f61],
PUP.Optional.Delta.ShrtCln, C:\Users\Rose\AppData\Local\Temp\mt_ffx\Delta\delta\1.8.21.5, En quarantaine, [6b7e700db9d288ae2be51638d0329f61],
PUP.Optional.OnlySearch, C:\Users\Rose\AppData\Local\onlysearch, En quarantaine, [65845924c0cbb77fcef5b89ac83a7f81],
PUP.Optional.OnlySearch, C:\Users\Rose\AppData\Local\onlysearch\onlysearch, En quarantaine, [65845924c0cbb77fcef5b89ac83a7f81],
PUP.Optional.OnlySearch, C:\Users\Rose\AppData\Local\onlysearch\onlysearch\1.3.12.9, En quarantaine, [65845924c0cbb77fcef5b89ac83a7f81],
PUP.Optional.Delta.ShrtCln, C:\Users\Rose\AppData\Local\Google\Chrome\User Data\Default\Extensions\onpejdpfebeopffobknkodakfphdelnh, En quarantaine, [0fdae9941873270f27d3f062f70ba060],
PUP.Optional.Delta.ShrtCln, C:\Users\Rose\AppData\Local\Google\Chrome\User Data\Default\Extensions\onpejdpfebeopffobknkodakfphdelnh\1.4_0, En quarantaine, [0fdae9941873270f27d3f062f70ba060],
PUP.Optional.Delta.ShrtCln, C:\Users\Rose\AppData\LocalLow\Delta\delta, En quarantaine, [25c4a7d693f8f442e3ab70e5c83acf31],
PUP.Optional.Betcat, C:\Users\Rose\AppData\Roaming\Betcat, En quarantaine, [6c7d512c503b1e1864c585d453af13ed],
PUP.Optional.Betcat, C:\Users\Rose\AppData\Roaming\Betcat\dat, En quarantaine, [6c7d512c503b1e1864c585d453af13ed],
PUP.Optional.Betcat, C:\Users\Rose\AppData\Roaming\Betcat\dat\update, En quarantaine, [6c7d512c503b1e1864c585d453af13ed],
PUP.Optional.Betcat, C:\Program Files\Betcat, En quarantaine, [ba2f4934f19a979fb476045540c2639d],
PUP.Optional.BTClient, C:\Users\Rose\AppData\Local\btclient\btclient, En quarantaine, [effa89f40e7dbb7bc85f5308ef133ac6],
PUP.Optional.BTClient, C:\Users\Rose\AppData\Local\btclient\btclient\1.4.2.8, En quarantaine, [effa89f40e7dbb7bc85f5308ef133ac6],
PUP.Optional.AdvancedSystemProtector, C:\Users\Rose\AppData\Roaming\Advanced System Protector, En quarantaine, [f5f4f28b751696a054c8542da55d9a66],

Fichiers: 73
PUP.Optional.WebCake, C:\Users\Rose\AppData\Roaming\Web Cake\WebCakeDesktop.exe, En quarantaine, [e30609744843fa3c1fdaf33b1ae6da26],
PUP.Optional.WebCake, C:\Program Files\WADesktop.Updater.exe, En quarantaine, [15d4f786f09b6cca8c9d2ffe8e7358a8],
PUP.Optional.RegCleanPro, C:\Windows\System32\roboot.exe, En quarantaine, [30b9b8c51b7046f0dee1214ef41040c0],
PUP.Optional.AirInstaller, C:\Users\Rose\AppData\Local\Temp\setup.exe, En quarantaine, [1ccd18654d3e14222fc1741af10f9967],
Trojan.RotBrowse, C:\Users\Rose\AppData\Local\Temp\1F4.tmp, En quarantaine, [b93092eb9bf01e18bb3a37d12adaf709],
PUP.Optional.BDJoin, C:\Users\Rose\AppData\Local\Temp\bus1296\join.exe, En quarantaine, [5f8a4c31e2a9b185d80aca61d030cd33],
PUP.Optional.CRX, C:\Users\Rose\AppData\Local\Temp\bus193A\CrxUpdater_d.exe, En quarantaine, [7c6ded90f19a2a0cb6b5d54f1ee65ba5],
PUP.Optional.CRX, C:\Users\Rose\AppData\Local\Temp\bus19B7\CrxUpdater_d.exe, En quarantaine, [1acfceaf494256e0b6b5f72d1aea60a0],
PUP.Optional.CRX, C:\Users\Rose\AppData\Local\Temp\bus1CB3\CrxUpdater_d.exe, En quarantaine, [e405621b652637ffb1baae76cd37936d],
PUP.Optional.CRX, C:\Users\Rose\AppData\Local\Temp\bus1CF2\CrxUpdater_d.exe, En quarantaine, [83667b02adde0f277dee75af798bc739],
PUP.Optional.CRX, C:\Users\Rose\AppData\Local\Temp\bus2C2E\CrxUpdater_d.exe, En quarantaine, [a841e29b24674de91259c3614bb9b54b],
PUP.Optional.CRX, C:\Users\Rose\AppData\Local\Temp\bus61DD\CrxUpdater_d.exe, En quarantaine, [7574b6c7b8d34fe76704978d907442be],
PUP.Optional.CRX, C:\Users\Rose\AppData\Local\Temp\bus62C7\CrxUpdater_d.exe, En quarantaine, [df0a7409f09b1b1b4823c0640df7b050],
PUP.Optional.CRX, C:\Users\Rose\AppData\Local\Temp\bus6B30\CrxUpdater_d.exe, En quarantaine, [bf2ab6c76f1c2a0c204b7da757adf50b],
PUP.Optional.Delta.ShrtCln, C:\Users\Rose\AppData\Local\Temp\is42483369\DeltaTB.exe, En quarantaine, [c4259edfb4d79c9aed140e819769ca36],
PUP.Optional.WebCake, C:\Users\Rose\AppData\Local\Temp\is42483369\Setup-D502DD2B71B5.exe, En quarantaine, [78716b12fe8db5810f1cc16cd72af40c],
PUP.Optional.CRX, C:\Users\Rose\AppData\Local\Temp\busDB22\CrxUpdater_d.exe, En quarantaine, [3dac8cf1cebd2610f07b9f85d92b42be],
PUP.Optional.CRX, C:\Users\Rose\AppData\Local\Temp\busDFE2\CrxUpdater_d.exe, En quarantaine, [7079a7d69bf079bdd2995ec6dd27f010],
PUP.Optional.CRX, C:\Users\Rose\AppData\Local\Temp\busE3B4\CrxUpdater_d.exe, En quarantaine, [9257661705861f17d79480a44eb643bd],
PUP.Optional.CRX, C:\Users\Rose\AppData\Local\Temp\busEA3F\CrxUpdater_d.exe, En quarantaine, [94557c0126654aec8edd051fef15f40c],
PUP.Optional.OnlySearch.ShrtCln, C:\Users\Rose\AppData\Local\Temp\busF0D3\update.exe, En quarantaine, [46a395e89bf032048453f02759a7a35d],
PUP.Optional.CRX, C:\Users\Rose\AppData\Local\Temp\busF334\CrxUpdater_d.exe, En quarantaine, [aa3f433a9cef81b5bab15acaa65e14ec],
PUP.Optional.CRX, C:\Users\Rose\AppData\Local\Temp\busF871\CrxUpdater_d.exe, En quarantaine, [dd0c7d00e0ab84b2c1aad252996b837d],
PUP.Optional.CRX, C:\Users\Rose\AppData\Local\Temp\bus721\CrxUpdater_d.exe, En quarantaine, [2fba700d0b8094a21f4c42e239cba65a],
PUP.Optional.CRX, C:\Users\Rose\AppData\Local\Temp\bus848A\CrxUpdater_d.exe, En quarantaine, [5e8b97e68cffec4aaebddc4862a20ff1],
PUP.Optional.CRX, C:\Users\Rose\AppData\Local\Temp\bus85F1\CrxUpdater_d.exe, En quarantaine, [04e5f6871873f1453e2da48053b127d9],
PUP.Optional.CRX, C:\Users\Rose\AppData\Local\Temp\bus88CE\CrxUpdater_d.exe, En quarantaine, [6386b6c72d5eff375b103ee6b35160a0],
PUP.Optional.CRX, C:\Users\Rose\AppData\Local\Temp\busB03B\CrxUpdater_d.exe, En quarantaine, [5990fd80ed9e86b06ffc43e19f65af51],
PUP.Optional.CRX, C:\Users\Rose\AppData\Local\Temp\busB692\CrxUpdater_d.exe, En quarantaine, [02e7acd117744bebf77433f1c34129d7],
PUP.Optional.CRX, C:\Users\Rose\AppData\Local\Temp\busCB0B\CrxUpdater_d.exe, En quarantaine, [ad3c225bed9e072fbdae160ef410649c],
PUP.Optional.CRX, C:\Users\Rose\AppData\Local\Temp\busCB4A\CrxUpdater_d.exe, En quarantaine, [4c9db2cbe4a7a2940a61061ec143be42],
PUP.Optional.CRX, C:\Users\Rose\AppData\Local\Temp\busCF6E\CrxUpdater_d.exe, En quarantaine, [eefb6b121972c0765516ea3a7e8633cd],
PUP.Optional.BabSolution, C:\Users\Rose\AppData\Local\Temp\busD1BF\BUSolution.dll, En quarantaine, [9d4cc9b42c5f7eb80d534ed83ac725db],
Trojan.RotBrowse, C:\Users\Rose\AppData\Local\Temp\F73486FC-BAB0-7891-A882-8A447EDEE63D\Latest\ccp.exe, En quarantaine, [b03907765932c96d38bd8880b54f9c64],
PUP.Optional.Babylon, C:\Users\Rose\AppData\Local\Temp\F73486FC-BAB0-7891-A882-8A447EDEE63D\Latest\CrxInstaller.dll, En quarantaine, [5198fc812a61a492055e86a06d94ed13],
PUP.Optional.Delta, C:\Users\Rose\AppData\Local\Temp\F73486FC-BAB0-7891-A882-8A447EDEE63D\Latest\MyDeltaTB.exe, En quarantaine, [fced7d00a5e6bf779200ddb27e82c838],
PUP.Optional.Babylon, C:\Users\Rose\AppData\Local\Temp\F73486FC-BAB0-7891-A882-8A447EDEE63D\Latest\Setup.exe, En quarantaine, [c128dca1adde51e5f7ddf338d22e8a76],
PUP.Optional.CRX, C:\Users\Rose\AppData\Local\Temp\bus6C49\CrxUpdater_d.exe, En quarantaine, [feeb4f2ec8c326100a6124009272b848],
PUP.Optional.InstallCore, C:\Users\Rose\Downloads\MediaPlayerSetup.exe, En quarantaine, [e3065c2166259d990cadb183768a659b],
PUP.Optional.Net01, C:\Users\Rose\Downloads\SkypeSetupFull(1).exe, En quarantaine, [6782790409821026e61fb234de25649c],
PUP.Optional.RegCleanerPro, C:\Users\Rose\Downloads\sysrc_trial_25044.exe, En quarantaine, [01e8720bfd8e6dc97aabd9b7f20e59a7],
PUP.Optional.Soft32, C:\Users\Rose\Downloads\google earth setup(1).exe, En quarantaine, [7f6a344989023402a1be919bb94808f8],
PUP.Optional.IsFreemium, C:\Users\Rose\Downloads\google earth setup(2).exe, En quarantaine, [3faa3e3ff695082ef0d95ecd52b227d9],
PUP.Optional.Soft32, C:\Users\Rose\Downloads\google earth setup(3).exe, En quarantaine, [9851037acbc09e98a1be6bc1eb16936d],
PUP.Optional.IsFreemium, C:\Users\Rose\Downloads\google earth setup.exe, En quarantaine, [6386611c810a84b26762f03b6c98da26],
PUP.Optional.Firser, C:\Users\Rose\Downloads\Google%20Earth.exe, En quarantaine, [5c8d403dd4b7bc7a2111db5223dd1ee2],
PUP.Optional.OptimumInstaller, C:\Users\Rose\Downloads\Groovestream.exe, En quarantaine, [35b4f786e7a4d660c747d556f908837d],
PUP.Optional.InstallCore, C:\Users\Rose\Downloads\QuickTimeInstaller.exe, En quarantaine, [b3363f3e7c0f82b405fefa1341bfef11],
PUP.Optional.Iminent, C:\Users\Rose\Downloads\IminentSetup{1.cW7r3GaP.13}(1).exe, En quarantaine, [b3368eefff8c36004ec568c14db4d729],
PUP.Optional.Iminent, C:\Users\Rose\Downloads\IminentSetup{1.cW7r3GaP.13}.exe, En quarantaine, [5e8bfd8064278caa50c3e346b54c837d],
PUP.Optional.RegistryReviver, C:\Users\Rose\Downloads\RegistryReviverSetup(1).exe, En quarantaine, [7c6df984d2b90333cad1f8331fe2ec14],
PUP.Optional.RegistryReviver, C:\Users\Rose\Downloads\RegistryReviverSetup.exe, En quarantaine, [b5345627bad1af87e0bba685e51c6f91],
PUP.Optional.Delta.ShrtCln, C:\Users\Rose\AppData\Roaming\Mozilla\Firefox\Profiles\mevfdiqs.default\searchplugins\delta.xml, En quarantaine, [49a0f28bb6d556e068216c32fa088080],
PUP.Optional.BTClient, C:\Windows\System32\Tasks\btclient Updater, En quarantaine, [26c3b5c82c5fdd59d5dd2a3917ec4cb4],
PUP.Optional.Delta.ShrtCln, C:\Users\Rose\AppData\Local\Google\Chrome\User Data\Default\Extensions\onpejdpfebeopffobknkodakfphdelnh\1.4_0\Delta128.png, En quarantaine, [0fdae9941873270f27d3f062f70ba060],
PUP.Optional.Delta.ShrtCln, C:\Users\Rose\AppData\Local\Google\Chrome\User Data\Default\Extensions\onpejdpfebeopffobknkodakfphdelnh\1.4_0\Delta48.png, En quarantaine, [0fdae9941873270f27d3f062f70ba060],
PUP.Optional.Delta.ShrtCln, C:\Users\Rose\AppData\Local\Google\Chrome\User Data\Default\Extensions\onpejdpfebeopffobknkodakfphdelnh\1.4_0\manifest.json, En quarantaine, [0fdae9941873270f27d3f062f70ba060],
PUP.Optional.Delta.ShrtCln, C:\Users\Rose\AppData\Local\Google\Chrome\User Data\Default\Extensions\onpejdpfebeopffobknkodakfphdelnh\1.4_0\redirect.html, En quarantaine, [0fdae9941873270f27d3f062f70ba060],
PUP.Optional.Delta.ShrtCln, C:\Users\Rose\AppData\Local\Google\Chrome\User Data\Default\Extensions\onpejdpfebeopffobknkodakfphdelnh\1.4_0\redirect.js, En quarantaine, [0fdae9941873270f27d3f062f70ba060],
PUP.Optional.Betcat, C:\Users\Rose\AppData\Roaming\Betcat\PlugIns.cache, En quarantaine, [6c7d512c503b1e1864c585d453af13ed],
PUP.Optional.Betcat, C:\Users\Rose\AppData\Roaming\Betcat\dat\Desktop.OS.dll, En quarantaine, [6c7d512c503b1e1864c585d453af13ed],
PUP.Optional.Betcat, C:\Users\Rose\AppData\Roaming\Betcat\dat\Dora.dat, En quarantaine, [6c7d512c503b1e1864c585d453af13ed],
PUP.Optional.Betcat, C:\Users\Rose\AppData\Roaming\Betcat\dat\Maintain.dat, En quarantaine, [6c7d512c503b1e1864c585d453af13ed],
PUP.Optional.Betcat, C:\Users\Rose\AppData\Roaming\Betcat\dat\Paladin.dat, En quarantaine, [6c7d512c503b1e1864c585d453af13ed],
PUP.Optional.Betcat, C:\Users\Rose\AppData\Roaming\Betcat\dat\Phoenix.dat, En quarantaine, [6c7d512c503b1e1864c585d453af13ed],
PUP.Optional.Betcat, C:\Users\Rose\AppData\Roaming\Betcat\dat\update\Dora.dat, En quarantaine, [6c7d512c503b1e1864c585d453af13ed],
PUP.Optional.Betcat, C:\Users\Rose\AppData\Roaming\Betcat\dat\update\Maintain.dat, En quarantaine, [6c7d512c503b1e1864c585d453af13ed],
PUP.Optional.Betcat, C:\Users\Rose\AppData\Roaming\Betcat\dat\update\Paladin.dat, En quarantaine, [6c7d512c503b1e1864c585d453af13ed],
PUP.Optional.Betcat, C:\Users\Rose\AppData\Roaming\Betcat\dat\update\Phoenix.dat, En quarantaine, [6c7d512c503b1e1864c585d453af13ed],
PUP.Optional.BTClient, C:\Users\Rose\AppData\Local\btclient\btclient\updt.js, En quarantaine, [effa89f40e7dbb7bc85f5308ef133ac6],
PUP.Optional.BTClient, C:\Users\Rose\AppData\Local\btclient\btclient\1.4.2.8\app.ini, En quarantaine, [effa89f40e7dbb7bc85f5308ef133ac6],
PUP.Optional.BTClient, C:\Users\Rose\AppData\Local\btclient\btclient\1.4.2.8\btclient.exe, En quarantaine, [effa89f40e7dbb7bc85f5308ef133ac6],
PUP.Optional.BTClient, C:\Users\Rose\AppData\Local\btclient\btclient\1.4.2.8\res.dll, En quarantaine, [effa89f40e7dbb7bc85f5308ef133ac6],

Secteurs physiques: 0
(Aucun élément malveillant détecté)


(end)

Publicité


Signaler le contenu de ce document

Publicité