Malwarebytes Anti-Malware www.malwarebytes.org Date de l'examen: 28/06/2014 Heure de l'examen: 16:50:44 Fichier journal: malware.txt Administrateur: Oui Version: 2.00.2.1012 Base de données Malveillants: v2014.06.28.02 Base de données Rootkits: v2014.06.23.02 Licence: Essai Protection contre les malveillants: Désactivé(e) Protection contre les sites Web malveillants: Désactivé(e) Self-protection: Désactivé(e) Système d'exploitation: Windows 7 Service Pack 1 Processeur: x64 Système de fichiers: NTFS Utilisateur: Toton Type d'examen: Examen "Personnalisé" Résultat: Terminé Objets analysés: 1217421 Temps écoulé: 3 h, 11 min, 3 sec Mémoire: Activé(e) Démarrage: Activé(e) Système de fichiers: Activé(e) Archives: Activé(e) Rootkits: Activé(e) Heuristics: Activé(e) PUP: Activé(e) PUM: Activé(e) Processus: 0 (No malicious items detected) Modules: 0 (No malicious items detected) Clés du Registre: 0 (No malicious items detected) Valeurs du Registre: 0 (No malicious items detected) Données du Registre: 0 (No malicious items detected) Dossiers: 0 (No malicious items detected) Fichiers: 40 Trojan.Agent.W, C:\Users\Public\Desktop\Extra\Activateurs Supplémentaires\Windows 7 Loader (Daz 1.7.2)\Windows 7 Loader.exe, Mis en quarantaine, [72786b10dd9e2f0768fefe5672923bc5], PUP.Optional.Somoto, C:\Users\Toton\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1IS35NKI\setup[1].exe, Mis en quarantaine, [7f6bf388304b64d2d59714006a9acc34], PUP.Optional.Somoto, C:\Users\Toton\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9V4KC2PY\setup[1].exe, Mis en quarantaine, [cf1b0d6e28538aac93d931e38c78728e], PUP.Optional.BProtector, C:\Users\Toton\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D975A4SL\19[1].7z, Mis en quarantaine, [ecfe93e8e59616207281fe3954add030], PUP.Optional.Somoto.A, C:\Users\Toton\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D975A4SL\bi_downloader[1].exe, Mis en quarantaine, [a545e8935a21a29462c33edf47baa957], PUP.Optional.Somoto, C:\Users\Toton\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JN6VCKEF\BiTool[1].dll, Mis en quarantaine, [707a9be04d2ecb6b30c9ab7955ade31d], PUP.Optional.InstallBrain.A, C:\Users\Toton\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UILRR1KR\pack[1].7z, Mis en quarantaine, [608a06751962cd69af07d4ab43be5ba5], PUP.Optional.Skytech.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\SupTab\DpInterface32.dll.vir, Mis en quarantaine, [d515e09b4833a591a02b2e5ca55c53ad], PUP.Optional.Skytech.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\SupTab\DpInterface64.dll.vir, Mis en quarantaine, [e208b6c5a2d96ec819b2e7a36f9218e8], PUP.Optional.Skytech.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\SupTab\DpInterfacef32.dll.vir, Mis en quarantaine, [f2f848331f5c87afdfecaedc19e856aa], PUP.Optional.IEPluginService.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\SupTab\RSHP.exe.vir, Mis en quarantaine, [de0c3c3ff883a88ee2380767b051b54b], PUP.Optional.Skytech.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\SupTab\SearchProtect32.dll.vir, Mis en quarantaine, [6c7e205bc5b606306f5c3e4c42bf7b85], PUP.Optional.Skytech.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\SupTab\SearchProtect64.dll.vir, Mis en quarantaine, [06e4fc7ff388a78f5b70bcce08f917e9], PUP.Optional.Skytech.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\SupTab\SpAPPSv32.dll.vir, Mis en quarantaine, [fcee0a71f98239fdbc0f810960a1e020], PUP.Optional.Skytech.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\SupTab\SpAPPSv64.dll.vir, Mis en quarantaine, [99516c0f0c6fbb7b2c9f06843ec3a15f], PUP.Optional.SupTab.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\SupTab\SupTab.dll.vir, Mis en quarantaine, [de0c304b384364d2f968aa8b38c8c23e], PUP.Optional.Wajam.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\Wajam\uninstall.exe.vir, Mis en quarantaine, [737788f3ed8eb086747ab98dae527c84], PUP.Optional.Wajam.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\Wajam\IE\priam_bho.dll.vir, Mis en quarantaine, [1ecc205b9cdfa88e9658dc6a1fe1fe02], PUP.Optional.Wajam.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\Wajam\Updater\update.exe.vir, Mis en quarantaine, [fbef205bd8a3b680d915e066f01021df], PUP.Optional.Wajam.A, C:\AdwCleaner\Quarantine\C\Program Files (x86)\Wajam\Updater\WajamUpdater.exe.vir, Mis en quarantaine, [e406dba080fbbc7a315368b66898ad53], PUP.Optional.IePluginService.A, C:\AdwCleaner\Quarantine\C\ProgramData\IePluginServices\PluginService.exe.vir, Mis en quarantaine, [2ac0f7840e6d0c2a02a3332890710000], PUP.Optional.WPM.A, C:\AdwCleaner\Quarantine\C\ProgramData\WindowsProtectManger\wprotectmanager.exe.vir, Mis en quarantaine, [539788f32b5071c5bcbcf896ec150ef2], PUP.Optional.Skytech.A, C:\AdwCleaner\Quarantine\C\Users\Toton\AppData\Roaming\sweet-page\UninstallManager.exe.vir, Mis en quarantaine, [d3172655740712246d5ecac0d82943bd], PUP.Optional.Wajam.A, C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3RUXGK2R\wajam_update[1].exe, Mis en quarantaine, [806a0b701368ac8a28c6ba8c3fc160a0], Trojan.Agent, E:\Ancien PC !\Program Files\Gpotato.eu\Flyff\Neuz.exe, Mis en quarantaine, [7d6d83f804777abc90c8ae739a667789], PUP.FunMoods, E:\Ancien PC !\Users\maison\AppData\Local\Temp\is-116CO.tmp\funmoods.exe, Mis en quarantaine, [97539cdfee8d0630f11f71a7f80901ff], PUP.Optional.Conduit, E:\Ancien PC !\Users\maison\Downloads\01net_Hamachi.exe, Mis en quarantaine, [a644453679023ff77fa7f5bf52b27d83], PUP.Optional.Conduit, E:\Ancien PC !\Users\maison\Downloads\01net_Messenger_Plus!.exe, Mis en quarantaine, [658597e4e49773c342e4bbf99272718f], Adware.Vomba, E:\Ancien PC !\Users\maison\Downloads\daemon4120-lite.exe, Mis en quarantaine, [d41617645c1ffb3bf8e83c54e71dba46], PUP.Optional.OpenCandy, E:\Ancien PC !\Users\maison\Downloads\DTLite4413-0173.exe, Mis en quarantaine, [83673e3dbfbceb4b8aef6d41eb19ad53], PUP.Optional.OpenCandy, E:\Ancien PC !\Users\maison\Downloads\winamp563_full_emusic-7plus_fr-fr.exe, Mis en quarantaine, [a743f586f784d264d2a7a90532d2a65a], PUP.Optional.Conduit.A, E:\Ancien PC !\Windows\Temp\hss_update.exe, Mis en quarantaine, [d3177605a6d53afca25f1f2dcb368c74], PUP.Optional.OpenCandy, E:\DD\Toton\DTLite4413-0173.exe, Mis en quarantaine, [11d986f594e756e099e0d8d629dbb050], PUP.Optional.Conduit.A, E:\Ordinateur\Downloads\Bordel\HSS-1.30-install-anchorfree-76-conduit.zip, Mis en quarantaine, [69812a51c4b7d3631ce5d8749170e818], PUP.Optional.OpenCandy, E:\Ordinateur\Downloads\Bordel\daemon-tools-lite_4-48-1-0347_fr_10729.exe, Mis en quarantaine, [6c7e1b604e2d3cfac7b21c923aca5da3], PUP.Optional.OpenCandy, E:\Ordinateur\Downloads\Logiciels\daemon-tools-lite_daemon_tools_lite_4.45.4_francais_10729.exe, Mis en quarantaine, [ca20b5c665160b2ba6d3703e8183d030], PUP.Optional.OpenCandy, E:\Ordinateur\Downloads\Logiciels\winamp5623_full_emusic-7plus_fr-fr.exe, Mis en quarantaine, [f7f3b7c4344726102a4f2589ff05ec14], Hacktool.Agent, E:\Ordinateur\Downloads\Logiciels\Windows_Loader_v2.2.1.zip, Mis en quarantaine, [44a6d2a9b5c641f546dd1f3068996c94], Hacktool.Agent, E:\Ordinateur\Downloads\Logiciels\Windows_Loader_v2.2.1\Windows Loader\Windows Loader.exe, Mis en quarantaine, [9a50463596e5e94d65be4c03e021c53b], PUP.Optional.SweetPage.A, C:\Users\Toton\AppData\Local\Google\Chrome\User Data\Default\Preferences, Bon: (), Mauvais: ( "search_url": "http://www.sweet-page.com/web/?type=ds&ts=1403960591&from=cor&uid=SAMSUNGXSSDX830XSeries_S0XXNEAC500444&q={searchTerms}",), Remplacé,[d31792e91962d0666e155168b25210f0] Secteurs physiques: 0 (No malicious items detected) (end)