cjoint

Publicité


Publicité

Format du document : text/plain

Prévisualisation

Malwarebytes
www.malwarebytes.com

-Détails du journal-
Date de l'analyse: 02/07/2017
Heure de l'analyse: 22:37
Fichier journal: resultat.txt
Administrateur: Oui

-Informations du logiciel-
Version: 3.1.2.1733
Version de composants: 1.0.139
Version de pack de mise à jour: 1.0.2279
Licence: Gratuit

-Informations système-
Système d'exploitation: Windows 7 Service Pack 1
Processeur: x64
Système de fichiers: NTFS
Utilisateur: Utilisateur-PC\Utilisateur

-Résumé de l'analyse-
Type d'analyse: Analyse des menaces
Résultat: Terminé
Objets analysés: 349701
Menaces détectées: 70
Menaces mises en quarantaine: 67
Temps écoulé: 6 min, 6 s

-Options d'analyse-
Mémoire: Activé
Démarrage: Activé
Système de fichiers: Activé
Archives: Activé
Rootkits: Désactivé
Heuristique: Activé
PUP: Activé
PUM: Activé

-Détails de l'analyse-
Processus: 0
(Aucun élément malveillant détecté)

Module: 0
(Aucun élément malveillant détecté)

Clé du registre: 8
Adware.Tuto4PC, HKU\S-1-5-21-3451141943-1203661378-2960360498-1000\SOFTWARE\MICROSOFT\2UPS, En quarantaine, [934], [411131],1.0.2279
PUP.Optional.PSScriptLoad.SHHKRST, HKU\S-1-5-21-3451141943-1203661378-2960360498-1000\CONSOLE\%SYSTEMROOT%_SYSTEM32_SVCHOST.EXE, En quarantaine, [9520], [410614],1.0.2279
PUP.Optional.InterStat, HKU\S-1-5-21-3451141943-1203661378-2960360498-1000_Classes\APPLICATIONS\interstat.exe, En quarantaine, [1448], [261503],1.0.2279
PUP.Optional.Linkury.ACMB1, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\psv_Hotdox, En quarantaine, [103], [259770],1.0.2279
PUP.Optional.Linkury.ACMB1, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\psv_Truequaddom, En quarantaine, [103], [259770],1.0.2279
PUP.Optional.PSScriptLoad.EncJob, HKU\S-1-5-21-3451141943-1203661378-2960360498-1000\CONSOLE\TASKENG.EXE, En quarantaine, [9475], [408199],1.0.2279
PUP.Optional.Linkury.ACMB1, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{3EE8F526-C816-46BF-B310-C45739CADC5A}, En quarantaine, [103], [259767],1.0.2279
PUP.Optional.Linkury.ACMB1, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{7692F956-F9FD-4BCB-922E-D84D92F8527F}, En quarantaine, [103], [259767],1.0.2279

Valeur du registre: 9
Adware.Tuto4PC, HKU\S-1-5-21-3451141943-1203661378-2960360498-1000\SOFTWARE\MICROSOFT\2UPS|PARTNER, En quarantaine, [934], [411131],1.0.2279
PUP.Optional.PSScriptLoad.SHHKRST, HKU\S-1-5-21-3451141943-1203661378-2960360498-1000\CONSOLE\%SYSTEMROOT%_SYSTEM32_SVCHOST.EXE|WINDOWPOSITION, En quarantaine, [9520], [410614],1.0.2279
PUP.Optional.PSScriptLoad.EncJob, HKU\S-1-5-21-3451141943-1203661378-2960360498-1000\CONSOLE\%SYSTEMROOT%_SYSTEM32_WINDOWSPOWERSHELL_V1.0_POWERSHELL.EXE|WINDOWPOSITION, En quarantaine, [9475], [408201],1.0.2279
Adware.Wajam, HKU\S-1-5-18\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYENABLE, Échec de la suppression, [1208], [-1],0.0.0
Adware.Wajam, HKU\S-1-5-21-3451141943-1203661378-2960360498-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYENABLE, En quarantaine, [1208], [-1],0.0.0
Adware.Wajam, HKU\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYENABLE, Échec de la suppression, [1208], [-1],0.0.0
PUP.Optional.PSScriptLoad.EncJob, HKU\S-1-5-21-3451141943-1203661378-2960360498-1000\CONSOLE\TASKENG.EXE|WINDOWPOSITION, En quarantaine, [9475], [408199],1.0.2279
PUP.Optional.Linkury.ACMB1, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{3EE8F526-C816-46BF-B310-C45739CADC5A}|PATH, En quarantaine, [103], [259767],1.0.2279
PUP.Optional.Linkury.ACMB1, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{7692F956-F9FD-4BCB-922E-D84D92F8527F}|PATH, En quarantaine, [103], [259767],1.0.2279

Données du registre: 3
PUP.Optional.Linkury.ACMB1, HKU\S-1-5-21-3451141943-1203661378-2960360498-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|START PAGE, Remplacé, [103], [293485],1.0.2279
PUP.Optional.Linkury.ACMB1, HKU\S-1-5-21-3451141943-1203661378-2960360498-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|SEARCH BAR, Remplacé, [103], [293485],1.0.2279
PUP.Optional.Linkury.ACMB1, HKU\S-1-5-21-3451141943-1203661378-2960360498-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|SEARCH PAGE, Remplacé, [103], [293485],1.0.2279

Flux de données: 0
(Aucun élément malveillant détecté)

Dossier: 5
Adware.Tuto4PC.Generic, C:\USERS\UTILISATEUR\APPDATA\LOCAL\TEMP\RPAAGISRQX, En quarantaine, [1343], [409262],1.0.2279
Adware.OtherSearch.TSKRST, C:\Program Files (x86)\PQeB5ZsjGf\nss, En quarantaine, [2846], [371199],1.0.2279
Adware.OtherSearch.TSKRST, C:\Program Files (x86)\PQeB5ZsjGf\SSL, En quarantaine, [2846], [371199],1.0.2279
Adware.OtherSearch.TSKRST, C:\PROGRAM FILES (X86)\PQeB5ZsjGf, En quarantaine, [2846], [371199],1.0.2279
PUP.Optional.Linkury.ACMB1, C:\PROGRAM FILES (X86)\COMMON FILES\NIMIT, En quarantaine, [103], [302586],1.0.2279

Fichier: 45
Adware.Agent.E, C:\WINDOWS\SYSTEM32\R6LSTMP4.DAT, Échec de la suppression, [4261], [412507],1.0.2279
PUP.Optional.OtherSearch, C:\USERS\UTILISATEUR\APPDATA\LOCAL\TEMP\3R2RDVK2L\3R2RDVK2L.EXE, En quarantaine, [589], [412567],1.0.2279
Adware.FileTour, C:\USERS\UTILISATEUR\APPDATA\LOCAL\TEMP\KEYGEN_DES_JEUX_BIG_FISH.RAR, En quarantaine, [252], [412467],1.0.2279
Heuristics.Shuriken, C:\USERS\UTILISATEUR\APPDATA\LOCAL\TEMP\IS-E11GQ.TMP\BOOSTER.EXE, En quarantaine, [1830], [167],1.0.2279
PUP.Optional.OtherSearch, C:\USERS\UTILISATEUR\APPDATA\LOCAL\TEMP\LOZQH1Y7V\LOZQH1Y7V.EXE, En quarantaine, [589], [412567],1.0.2279
Heuristics.Shuriken, C:\USERS\UTILISATEUR\APPDATA\LOCAL\TEMP\T9CW24CX4\T9CW24CX4.EXE, En quarantaine, [1830], [167],1.0.2279
Adware.Tuto4PC.Generic, C:\USERS\UTILISATEUR\APPDATA\LOCAL\TEMP\RPAAGISRQX\AFFICHEONE.EXE.CONFIG, En quarantaine, [1343], [409262],1.0.2279
Adware.Tuto4PC.Generic, C:\Users\Utilisateur\AppData\Local\Temp\RPAAGISRQX\Era5Le.exe, En quarantaine, [1343], [409262],1.0.2279
Adware.Tuto4PC.Generic, C:\Users\Utilisateur\AppData\Local\Temp\RPAAGISRQX\Era5Le.exe.config, En quarantaine, [1343], [409262],1.0.2279
Adware.Tuto4PC.Generic, C:\Users\Utilisateur\AppData\Local\Temp\RPAAGISRQX\Like.exe.config, En quarantaine, [1343], [409262],1.0.2279
Heuristics.Shuriken, C:\USERS\UTILISATEUR\APPDATA\LOCAL\TEMP\W7IWWQLNI\JLH1XNIVR.EXE, En quarantaine, [1830], [167],1.0.2279
Adware.Linkury.Generic, C:\USERS\UTILISATEUR\APPDATA\LOCAL\CONFIG.XML, En quarantaine, [2012], [404859],1.0.2279
Adware.Linkury.Generic, C:\USERS\UTILISATEUR\APPDATA\LOCAL\NOAH.DAT, En quarantaine, [2012], [404865],1.0.2279
Adware.Linkury.Generic, C:\USERS\UTILISATEUR\APPDATA\LOCAL\AGENT.DAT, En quarantaine, [2012], [404872],1.0.2279
Adware.Linkury.Generic, C:\USERS\UTILISATEUR\APPDATA\LOCAL\MD.XML, En quarantaine, [2012], [404866],1.0.2279
Adware.Linkury.Generic, C:\USERS\UTILISATEUR\APPDATA\LOCAL\SALTLA.TST, En quarantaine, [2012], [404871],1.0.2279
Adware.Linkury.Generic, C:\USERS\UTILISATEUR\APPDATA\LOCAL\UNINSTALL_TEMP.ICO, En quarantaine, [2012], [404862],1.0.2279
Adware.Linkury.Generic, C:\USERS\UTILISATEUR\APPDATA\LOCAL\PO.DB, En quarantaine, [2012], [412180],1.0.2279
PUP.Optional.Downloader.ZYL, C:\USERS\UTILISATEUR\APPDATA\LOCAL\ZYLOM GAMES\BOOKWORM ADVENTURES DELUXE\BOOKWORMADVENTURES.EXE, En quarantaine, [7919], [86017],1.0.2279
PUP.Optional.WeatherBuddy, C:\WINDOWS\INSTALLER\54EA9011.MSI, En quarantaine, [1586], [383207],1.0.2279
Adware.OtherSearch.TSKRST, C:\PROGRAM FILES (X86)\PQeB5ZsjGf\SSL\OtherSearch Inc CA 2.cer, En quarantaine, [2846], [371199],1.0.2279
Adware.OtherSearch.TSKRST, C:\Program Files (x86)\PQeB5ZsjGf\nss\certutil.exe, En quarantaine, [2846], [371199],1.0.2279
Adware.OtherSearch.TSKRST, C:\Program Files (x86)\PQeB5ZsjGf\nss\mozcrt19.dll, En quarantaine, [2846], [371199],1.0.2279
Adware.OtherSearch.TSKRST, C:\Program Files (x86)\PQeB5ZsjGf\nss\nspr4.dll, En quarantaine, [2846], [371199],1.0.2279
Adware.OtherSearch.TSKRST, C:\Program Files (x86)\PQeB5ZsjGf\nss\nss3.dll, En quarantaine, [2846], [371199],1.0.2279
Adware.OtherSearch.TSKRST, C:\Program Files (x86)\PQeB5ZsjGf\nss\plc4.dll, En quarantaine, [2846], [371199],1.0.2279
Adware.OtherSearch.TSKRST, C:\Program Files (x86)\PQeB5ZsjGf\nss\plds4.dll, En quarantaine, [2846], [371199],1.0.2279
Adware.OtherSearch.TSKRST, C:\Program Files (x86)\PQeB5ZsjGf\nss\smime3.dll, En quarantaine, [2846], [371199],1.0.2279
Adware.OtherSearch.TSKRST, C:\Program Files (x86)\PQeB5ZsjGf\nss\softokn3.dll, En quarantaine, [2846], [371199],1.0.2279
Adware.OtherSearch.TSKRST, C:\Program Files (x86)\PQeB5ZsjGf\SSL\cert.db, En quarantaine, [2846], [371199],1.0.2279
Adware.OtherSearch.TSKRST, C:\Program Files (x86)\PQeB5ZsjGf\SSL\xtls.db, En quarantaine, [2846], [371199],1.0.2279
Adware.OtherSearch.TSKRST, C:\Program Files (x86)\PQeB5ZsjGf\data.dt, En quarantaine, [2846], [371199],1.0.2279
Adware.OtherSearch.TSKRST, C:\Program Files (x86)\PQeB5ZsjGf\dlog.txt, En quarantaine, [2846], [371199],1.0.2279
Adware.OtherSearch.TSKRST, C:\Program Files (x86)\PQeB5ZsjGf\kl.ecf, En quarantaine, [2846], [371199],1.0.2279
Adware.OtherSearch.TSKRST, C:\Program Files (x86)\PQeB5ZsjGf\s.xml, En quarantaine, [2846], [371199],1.0.2279
Adware.OtherSearch.TSKRST, C:\Program Files (x86)\PQeB5ZsjGf\slite.exe, En quarantaine, [2846], [371199],1.0.2279
PUP.Optional.Linkury.ACMB1, C:\WINDOWS\SYSTEM32\TASKS\psv_Hotdox, En quarantaine, [103], [259513],1.0.2279
PUP.Optional.Linkury.ACMB1, C:\WINDOWS\SYSTEM32\TASKS\psv_Truequaddom, En quarantaine, [103], [259513],1.0.2279
PUP.Optional.REOptimizer, C:\USERS\UTILISATEUR\APPDATA\LOCAL\UNINSTALLCE.EXE, En quarantaine, [8482], [412227],1.0.2279
PUP.Optional.Linkury.ACMB1, C:\PROGRAM FILES (X86)\COMMON FILES\NIMIT\INSTALLATIONCONFIGURATION.XML, En quarantaine, [103], [302586],1.0.2279
PUP.Optional.Linkury.ACMB1, C:\Program Files (x86)\Common Files\Nimit\uninstall.dat, En quarantaine, [103], [302586],1.0.2279
PUP.Optional.Linkury.ACMB1, C:\Program Files (x86)\Common Files\Nimit\uninstall.ico, En quarantaine, [103], [302586],1.0.2279
Adware.Downloader.CN, C:\USERS\UTILISATEUR\APPDATA\LOCAL\TEMP\APPHELPERV2.EXE, En quarantaine, [263], [412508],1.0.2279
Adware.Linkury.Generic, C:\WINDOWS\SYSWOW64\CONFIG\SYSTEMPROFILE\APPDATA\LOCAL\PO.DB, En quarantaine, [2012], [412180],1.0.2279
Adware.Wajam, C:\WINDOWS\2C55A6F75943016D595D4F6A4CBE1AFA.EXE, En quarantaine, [1208], [411826],1.0.2279

Secteur physique: 0
(Aucun élément malveillant détecté)


(end)

Publicité


Signaler le contenu de ce document

Publicité