cjoint

Publicité


Publicité

Format du document : text/plain

Prévisualisation

Malwarebytes Anti-Malware
www.malwarebytes.org

Date de l'analyse: 11/06/2016
Heure de l'analyse: 14:52
Fichier journal: Malwarebytes rapport.txt
Administrateur: Oui

Version: 2.2.1.1043
Base de données de programmes malveillants: v2016.06.11.03
Base de données de rootkits: v2016.05.27.01
Licence: Gratuit
Protection contre les programmes malveillants: Désactivé
Protection contre les sites Web malveillants: Désactivé
Autoprotection: Désactivé

Système d'exploitation: Windows 10
Processeur: x64
Système de fichiers: NTFS
Utilisateur: Léo

Type d'analyse: Analyse des menaces
Résultat: Terminé
Objets analysés: 596996
Temps écoulé: 37 min, 31 s

Mémoire: Activé
Démarrage: Activé
Système de fichiers: Activé
Archives: Activé
Rootkits: Désactivé
Heuristique: Activé
PUP: Activé
PUM: Activé

Processus: 0
(Aucun élément malveillant détecté)

Modules: 0
(Aucun élément malveillant détecté)

Clés du Registre: 1
PUP.Optional.HohoSearch, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}, En quarantaine, [1f90ee0da4f59e98e0bd328b5ea46898],

Valeurs du Registre: 8
PUP.Optional.HohoSearch, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|hp, http://www.hohosearch.com/?ts=AHEqAnEmAnEpAk..&v=20160516&uid=83DA83BAD81A22C136E48B2D8CD7A8E8&ptid=epf1&mode=ffsengext, En quarantaine, [1f90ee0da4f59e98e0bd328b5ea46898]
PUP.Optional.HohoSearch, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|tab, http://www.hohosearch.com/?ts=AHEqAnEmAnEpAk..&v=20160516&uid=83DA83BAD81A22C136E48B2D8CD7A8E8&ptid=epf1&mode=ffsengext, En quarantaine, [a10e4ab1d9c03204cad3813ce61cc53b]
PUP.Optional.HohoSearch, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|sp, http://www.hohosearch.com/chrome.php?uid=83DA83BAD81A22C136E48B2D8CD7A8E8&ptid=epf1&q={searchTerms}&ts=AHEqAnEmAnEpAk..&v=20160516&mode=ffsengext, En quarantaine, [01aead4e8b0ed95d4a53ab121de5946c]
PUP.Optional.HohoSearch, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|surl, http://www.hohosearch.com/chrome.php?uid=83DA83BAD81A22C136E48B2D8CD7A8E8&ptid=epf1&ts=AHEqAnEmAnEpAk..&v=20160516&mode=ffexttoolbar&q=, En quarantaine, [3877c23946537eb88914b508e220cf31]
Hijack.AutoConfigURL.PrxySvrRST, HKLM\SYSTEM\CONTROLSET001\SERVICES\NLASVC\PARAMETERS\INTERNET\MANUALPROXIES, 0http://unstops.biz/wpad.dat?305450f3ac39bb62b5133c1e815ba4db10200782, En quarantaine, [1b9439c2158463d34d5c26c85ea5fb05]
Hijack.AutoConfigURL.PrxySvrRST, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\IPHLPSVC\PARAMETERS\PROXYMGR\{1070A2FC-B275-416D-989D-DB8F644CABF1}|AutoConfigUrl, http://unstops.biz/wpad.dat?305450f3ac39bb62b5133c1e815ba4db10200782, En quarantaine, [3c73a6556d2cda5cbac9b803fd05a15f]
Hijack.AutoConfigURL.PrxySvrRST, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\NLASVC\PARAMETERS\INTERNET\MANUALPROXIES, 0http://unstops.biz/wpad.dat?305450f3ac39bb62b5133c1e815ba4db10200782, En quarantaine, [c0ef65960693de58afd53e7dfb07e61a]
Hijack.AutoConfigURL.PrxySvrRST, HKU\S-1-5-21-265396060-1606615126-2422298913-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|AutoConfigUrl, http://unstops.biz/wpad.dat?305450f3ac39bb62b5133c1e815ba4db10200782, En quarantaine, [911ec239edac20160c9c3cb2f60d3cc4]

Données du Registre: 0
(Aucun élément malveillant détecté)

Dossiers: 0
(Aucun élément malveillant détecté)

Fichiers: 65
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\ICReinstall_6A20.tmp.exe, En quarantaine, [525db744edac1224343b5efa6f9118e8],
PUP.Optional.ConvertAd, C:\Users\Léo\AppData\Local\Temp\nsa9D63.tmp, En quarantaine, [228d1be0623791a55b6a805d61a01fe1],
PUP.Optional.ConvertAd, C:\Users\Léo\AppData\Local\Temp\nsaE4C3.tmp, En quarantaine, [3f7008f31386c373b312da039d648878],
PUP.Optional.ConvertAd, C:\Users\Léo\AppData\Local\Temp\nsb6CBE.tmp, En quarantaine, [2788906bcacfd3635273ac31cf32eb15],
PUP.Optional.ConvertAd, C:\Users\Léo\AppData\Local\Temp\nscA10D.tmp, En quarantaine, [bbf42ad1168361d57a4b449919e835cb],
PUP.Optional.ConvertAd, C:\Users\Léo\AppData\Local\Temp\nssC3A0.tmp, En quarantaine, [713e03f87d1c79bd81445786867ba55b],
PUP.Optional.ConvertAd, C:\Users\Léo\AppData\Local\Temp\nsu337B.tmp, En quarantaine, [6d4257a4a0f91c1ad0f5588540c1629e],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\D3DB.tmp.exe, En quarantaine, [555ace2de9b0fe38214e5800659b4db3],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\D9B6.tmp.exe, En quarantaine, [753ad625e6b3bf77c5aaa8b0738d16ea],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\EDF9.tmp.exe, En quarantaine, [941b6c8ff0a958de7ff0f95fcb3513ed],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\27B5.tmp.exe, En quarantaine, [585748b3c9d0ef478ee19ebac0407888],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\713.tmp.exe, En quarantaine, [ad0214e74e4bc4721d5250087987d62a],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\DCEC.tmp.exe, En quarantaine, [634ced0e3e5b181e412efe5a58a8ab55],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\F6CA.tmp.exe, En quarantaine, [2788c7348e0b68ce86e96aee619f3ac6],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\AC98.tmp.exe, En quarantaine, [59568279a6f37bbb3d32abad49b7d12f],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\209A.tmp.exe, En quarantaine, [f9b6be3d76231620c1aed88039c75ba5],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\30B.tmp.exe, En quarantaine, [7e315d9edebb62d47cf30c4c1ae66a96],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\3124.tmp.exe, En quarantaine, [6a45be3da3f659dd7df20a4e02fe6a96],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\31E6.tmp.exe, En quarantaine, [7e31f30805941f17a7c8f2661fe1a25e],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\60A0.tmp.exe, En quarantaine, [5d522bd0623792a496d99abe41bf728e],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\E5E3.tmp.exe, En quarantaine, [aa0522d963363afc234cb5a3c13fb54b],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\1589.tmp.exe, En quarantaine, [dfd02ccf2871cd695a1580d8fe02f50b],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\18FE.tmp.exe, En quarantaine, [624d3ebdc9d0ac8aaec1c098be4248b8],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\43E5.tmp.exe, En quarantaine, [c0ef9f5c8c0db48273fc1642c33d45bb],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\5C25.tmp.exe, En quarantaine, [cae5cd2edbbe3303e58a81d725db6898],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\6630.tmp.exe, En quarantaine, [951a9f5c47527fb7016e75e310f0b24e],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\751D.tmp.exe, En quarantaine, [0fa00eed0396b581056a89cf36cac43c],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\C62D.tmp.exe, En quarantaine, [6b44f605f4a5b185df90164208f8e61a],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\C67D.tmp.exe, En quarantaine, [357afcffe3b60630d6994b0d6d938878],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\CE7E.tmp.exe, En quarantaine, [1e9173885c3dcf670b64d484a15f6e92],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\DA5F.tmp.exe, En quarantaine, [f6b99e5da2f743f3c8a7e771ba468779],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\5570.tmp.exe, En quarantaine, [fdb2ea11a7f22610620d7ade758b51af],
PUP.Optional.ConvertAd, C:\Users\Léo\AppData\Local\Temp\nsg841F.tmp, En quarantaine, [bff03ac1c3d62214b114c815da27837d],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\6A20.tmp.exe, En quarantaine, [8629c932f8a195a189e613458b757d83],
PUP.Optional.BundleInstaller, C:\Users\Léo\AppData\Local\Temp\F487.tmp.exe, En quarantaine, [258ae318a0f9a4928ce37eda1de3fe02],
PUP.Optional.ConvertAd, C:\Users\Léo\AppData\Local\Temp\nsm9313.tmp, En quarantaine, [e0cffffc7227f44233925489f50c0ef2],
PUP.Optional.ConvertAd, C:\Windows\Temp\B182.tmp, En quarantaine, [456a41bae9b041f559d36323966bca36],
PUP.Optional.ConvertAd, C:\Windows\Temp\CB55.tmp, En quarantaine, [efc08b7021785ed8be6e3e48ed148080],
PUP.Optional.ConvertAd, C:\Windows\Temp\9CD1.tmp, En quarantaine, [674877841584a0960428a8dece337090],
PUP.Optional.ConvertAd, C:\Windows\Temp\9D0F.tmp, En quarantaine, [baf5ea11b8e110268f9d3353ad543bc5],
PUP.Optional.ConvertAd, C:\Windows\Temp\9D40.tmp, En quarantaine, [783710eb2a6f8ea87cb0147257aa7c84],
PUP.Optional.ConvertAd, C:\Windows\Temp\DDFD.tmp, En quarantaine, [8926728909908caa53d9285e857c837d],
PUP.Optional.ConvertAd, C:\Windows\Temp\E8B9.tmp, En quarantaine, [129de01b732680b654d82561a55c1fe1],
PUP.Optional.ConvertAd, C:\Windows\Temp\E917.tmp, En quarantaine, [802f817aadec34023fed75119170f40c],
PUP.Optional.ConvertAd, C:\Windows\Temp\E91C.tmp, En quarantaine, [1b943bc071285ed8ce5e1f6709f801ff],
PUP.Optional.ConvertAd, C:\Windows\Temp\F5C3.tmp, En quarantaine, [3f7068935f3ad363022ad2b450b17a86],
PUP.Optional.ConvertAd, C:\Windows\Temp\1123.tmp, En quarantaine, [149bde1d30696dc9a983a7dffa07fb05],
PUP.Optional.ConvertAd, C:\Windows\Temp\2D8E.tmp, En quarantaine, [842b807b18812a0cb07c5b2bf50c58a8],
PUP.Optional.ConvertAd, C:\Windows\Temp\4DB4.tmp, En quarantaine, [c6e99e5df3a6be78cf5dafd720e15aa6],
PUP.Optional.ConvertAd, C:\Windows\Temp\5D5A.tmp, En quarantaine, [446b0bf0aaef211542ea6d1931d0ff01],
PUP.Optional.ConvertAd, C:\Windows\Temp\5692.tmp, En quarantaine, [228dfffc5148d462c26a038355ac3fc1],
PUP.Optional.ConvertAd, C:\Windows\Temp\57A9.tmp, En quarantaine, [a40bce2d7f1a93a328048afc07faca36],
PUP.Optional.OpenCandy, C:\Users\Léo\Downloads\CheatEngine63.exe, En quarantaine, [b1fe06f5b3e6e056d1fe91f944bd817f],
PUP.Optional.OpenCandy, C:\Users\Léo\Downloads\CheatEngine64 (1).exe, En quarantaine, [96199c5ff6a3a78fc1e5a7696899ba46],
PUP.Optional.OpenCandy, C:\Users\Léo\Downloads\CheatEngine64.exe, En quarantaine, [d7d838c3d7c2de585c4a868a679a20e0],
PUP.Optional.Amonetize, C:\Users\Léo\Downloads\Echoes+The+Pursuit+(2014).ace, En quarantaine, [1c937586a3f6fc3acc889bcb02ff22de],
Trojan.Agent.E, C:\Users\Léo\AppData\Local\Temp\1.tmp.exe, En quarantaine, [2e8101fac9d000363610a809a85bc13f],
Trojan.Agent.E, C:\Users\Léo\AppData\Local\Temp\2.tmp.exe, En quarantaine, [b4fb92695f3a30060c3ae7ca7e858f71],
Trojan.Agent.E, C:\Users\Léo\AppData\Local\Temp\3.tmp.exe, En quarantaine, [119e09f26e2bb38384c2bcf50003ec14],
Trojan.Agent.E, C:\Users\Léo\AppData\Local\Temp\4.tmp.exe, En quarantaine, [cfe055a6c5d46dc9370f624fd62d58a8],
Trojan.Agent.E, C:\Users\Léo\AppData\Local\Temp\5.tmp.exe, En quarantaine, [4f60d823cdcc1e18ab9be4cdb44f52ae],
Trojan.Agent.E, C:\Users\Léo\AppData\Local\Temp\6.tmp.exe, En quarantaine, [317ecb309bfe2b0bbb8b327f34cf619f],
Trojan.Agent.E, C:\Users\Léo\AppData\Local\Temp\7.tmp.exe, En quarantaine, [b1feb2496a2f979f86c0c1f07192669a],
Trojan.Agent.E, C:\Users\Léo\AppData\Local\Temp\8.tmp.exe, En quarantaine, [a30c6c8f0594eb4bbf87486963a0cc34],
Trojan.Agent.E, C:\Users\Léo\AppData\Local\Temp\9.tmp.exe, En quarantaine, [6c43b8438b0e41f578ce525fd033639d],

Secteurs physiques: 0
(Aucun élément malveillant détecté)


(end)

Publicité


Signaler le contenu de ce document

Publicité