cjoint

Publicité


Publicité

Format du document : text/plain

Prévisualisation

Malwarebytes Anti-Malware
www.malwarebytes.org

Date de l'analyse: 19/04/2016
Heure de l'analyse: 11:41
Fichier journal: mbam 1.txt
Administrateur: Oui

Version: 2.2.1.1043
Base de données de programmes malveillants: v2016.04.19.03
Base de données de rootkits: v2016.04.17.01
Licence: Essai
Protection contre les programmes malveillants: Activé
Protection contre les sites Web malveillants: Activé
Autoprotection: Désactivé

Système d'exploitation: Windows 8.1
Processeur: x64
Système de fichiers: NTFS
Utilisateur: Propriétaire

Type d'analyse: Analyse des menaces
Résultat: Terminé
Objets analysés: 335384
Temps écoulé: 21 min, 35 s

Mémoire: Activé
Démarrage: Activé
Système de fichiers: Activé
Archives: Activé
Rootkits: Désactivé
Heuristique: Activé
PUP: Activé
PUM: Activé

Processus: 0
(Aucun élément malveillant détecté)

Modules: 0
(Aucun élément malveillant détecté)

Clés du Registre: 3
PUP.Optional.Palikan, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Palikan dita, En quarantaine, [e5ca8b25e9b0f0469b92e754758f8c74],
PUP.Optional.TermCoach, HKLM\SOFTWARE\WOW6432NODE\TermCoach_1.10.0.24, En quarantaine, [0ba4268ae2b7072f2583ec5f60a4867a],
PUP.Optional.Wajam, HKLM\SOFTWARE\WOW6432NODE\WaIntEnhancer, En quarantaine, [06a9d5db9aff94a2e3e9acaf3dc703fd],

Valeurs du Registre: 2
Hijack.AutoConfigURL.PrxySvrRST, HKLM\SYSTEM\CONTROLSET001\SERVICES\NLASVC\PARAMETERS\INTERNET\MANUALPROXIES, 0http://un-stop.biz/wpad.dat?c961cbb14efbd1ddeacfa14d7ea4a0048898261, En quarantaine, [fab52c84732612242b937f24d52f39c7]
Hijack.AutoConfigURL.PrxySvrRST, HKU\S-1-5-21-830040687-2053257849-4174522111-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|AutoConfigUrl, http://un-stop.biz/wpad.dat?c961cbb14efbd1ddeacfa14d7ea4a0048898261, En quarantaine, [cbe46b456138f2445c617330cb3958a8]

Données du Registre: 0
(Aucun élément malveillant détecté)

Dossiers: 7
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Explore Social Search, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Explore Social Shopping, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Uninstall Wajam, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.WebBar, C:\Windows\System32\config\systemprofile\AppData\Local\WebBar, En quarantaine, [f7b867497b1ea096c39f58f87b8915eb],
PUP.Optional.Goobzo.Gen, C:\Program Files\Common Files\Soobzo, En quarantaine, [1798dcd4366341f5a76673c0c73ceb15],
PUP.Optional.Goobzo.Gen, C:\Program Files\Common Files\Soobzo\GDUpdate, En quarantaine, [1798dcd4366341f5a76673c0c73ceb15],

Fichiers: 60
Trojan.ExpressDownloader, C:\Users\Propriétaire\AppData\Local\Temp\0LRsuNfw1C.tmp, En quarantaine, [a609416fdcbd1620023530300afba15f],
PUP.Optional.ConvertAd, C:\Users\Propriétaire\AppData\Local\Temp\nshBF11.tmp, En quarantaine, [515e7937e3b694a200feec3bd52d54ac],
Adware.ConvertAd, C:\Users\Propriétaire\AppData\Local\Temp\nskD4E0.tmp, En quarantaine, [2887ac043d5ce1558b6cd93344be8977],
PUP.Optional.ConvertAd, C:\Users\Propriétaire\AppData\Local\Temp\nst65E1.tmp, En quarantaine, [bef1753b82174cea526ce14724de22de],
PUP.Optional.ConvertAd, C:\Users\Propriétaire\AppData\Local\Temp\nsv2987.tmp, En quarantaine, [535c377913860333708e6bbcba48b34d],
PUP.Optional.Nosibay, C:\Users\Propriétaire\AppData\Local\Temp\nnFulBrM8Y.exe, En quarantaine, [d0df59577920f83e58d860fe7590a15f],
PUP.Optional.ConvertAd, C:\Users\Propriétaire\AppData\Local\Temp\nse27BA.tmp, En quarantaine, [614e9a169009f640318d6abe0bf77f81],
PUP.Optional.ConvertAd, C:\Users\Propriétaire\AppData\Local\Temp\nsy65BC.tmp, En quarantaine, [8d226f41f1a80f270ef0180f3fc37987],
PUP.Optional.BundleInstaller, C:\Users\Propriétaire\AppData\Local\Temp\9334.tmp.exe, En quarantaine, [456a0fa19ffacc6af99f531870907789],
PUP.Optional.MyPCBackup, C:\Users\Propriétaire\AppData\Local\Temp\BackupSetup.exe, En quarantaine, [77387d336e2b59dd109f708354ad7888],
PUP.Optional.ConvertAd, C:\Users\Propriétaire\AppData\Local\Temp\nsz93B8.tmp, En quarantaine, [307fe5cbd8c1bc7a8e7080a71ee430d0],
PUP.Optional.OptiAds, C:\Users\Propriétaire\AppData\Local\Temp\onlysetup.exe, En quarantaine, [01aedcd4653493a3e8d0e18061a43dc3],
PUP.Optional.Nosibay, C:\Users\Propriétaire\AppData\Local\Temp\1542016170215\Bubble Dock Uninstall.exe, En quarantaine, [7e31f4bc792052e482ae1d4118ed2ed2],
PUP.Optional.Nosibay, C:\Users\Propriétaire\AppData\Local\Temp\1542016170356\Bubble Dock Uninstall.exe, En quarantaine, [0da204acb2e774c254dc322c19eccb35],
PUP.Optional.Nosibay, C:\Users\Propriétaire\AppData\Local\Temp\1542016194453\Bubble Dock Uninstall.exe, En quarantaine, [08a7e8c8712865d146eace909c6908f8],
PUP.Optional.Nosibay, C:\Users\Propriétaire\AppData\Local\Temp\184201693140\Selection Tools Uninstall.exe, En quarantaine, [d3dc9b157227bc7a3cf4a3bbfd08b34d],
PUP.Optional.MyPCBackup, C:\Users\Propriétaire\AppData\Local\Temp\nsl9CF4.tmp\Cloud_Backup_Setup.exe, En quarantaine, [9b141799eaaf8caaf2e0fc646b9ad42c],
PUP.Optional.EoRezo.Generic, C:\Users\Propriétaire\AppData\Local\Temp\nsl9CF4.tmp\setup_mpck_fr.exe, En quarantaine, [2887bef2b3e60e2827b763c5ec16a060],
PUP.Optional.ConvertAd, C:\Windows\Temp\3E2F.tmp, En quarantaine, [347b199734651125b2209b5013ee9f61],
PUP.Optional.ConvertAd, C:\Windows\Temp\75DE.tmp, En quarantaine, [fcb3ddd373261d19dff3a2498f7237c9],
PUP.Optional.EoRezo.Generic, C:\Windows\Temp\AB3B.tmp, En quarantaine, [7837b2fe9306cb6b1cc2e444ac56c23e],
PUP.Optional.EoRezo.Generic, C:\Windows\Temp\AB63.tmp, En quarantaine, [b9f68828a5f4d85ef9e5d850f50d6799],
PUP.Optional.BubbleDock, C:\Users\Propriétaire\AppData\Local\Temp\Bubble Dock.txt, En quarantaine, [2788169a7920a09625ea2befb25227d9],
PUP.Optional.BubbleDock, C:\Users\Propriétaire\AppData\Local\Temp\LBubble Dock.txt, En quarantaine, [2689d7d94950f44227ea1efc996bc838],
PUP.Optional.SearchModule, C:\Windows\Temp\SM_cache_chrome.exe.cache, En quarantaine, [b2fd99171a7f4cea270c8bb829dbd62a],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Wajam Website.lnk, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Settings.lnk, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\SignIn with Facebook.lnk, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\SignIn with Twitter.lnk, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Explore Social Search\Ask.lnk, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Explore Social Search\Google.lnk, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Explore Social Search\IMDb.lnk, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Explore Social Search\Shopping.com.lnk, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Explore Social Search\TripAdvisor.lnk, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Explore Social Search\Wikipedia.lnk, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Explore Social Search\Yahoo!.lnk, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Explore Social Shopping\Amazon.lnk, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Explore Social Shopping\Argos.lnk, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Explore Social Shopping\Ebay.lnk, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Explore Social Shopping\Etsy.lnk, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Explore Social Shopping\HomeDepot.lnk, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Explore Social Shopping\Ikea.lnk, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Explore Social Shopping\Lowe's.lnk, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Explore Social Shopping\Mercadolivre.lnk, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Explore Social Shopping\MyShopping.lnk, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Explore Social Shopping\Sears.lnk, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Explore Social Shopping\Target.lnk, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Explore Social Shopping\Tesco.lnk, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Explore Social Shopping\Walmart.lnk, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaIntEnhancer\Explore Social Shopping\Zalando.lnk, En quarantaine, [f3bc8c2445540c2a625f77d837cd47b9],
PUP.Optional.WebBar, C:\Windows\System32\config\systemprofile\AppData\Local\WebBar\wb.log, En quarantaine, [f7b867497b1ea096c39f58f87b8915eb],
PUP.Optional.Pakilan, C:\Users\Propriétaire\AppData\LocalLow\Microsoft\Internet Explorer\Services\Go_Palikan.ico, En quarantaine, [e2cd8a26b8e1f442d0a4bf9c82826997],
PUP.Optional.FakeIELaunch, C:\Users\Propriétaire\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Launch Internet-Explorer Browser.lnk, En quarantaine, [c2ed6e422376310584445209c63e23dd],
PUP.Optional.Goobzo.Gen, C:\Program Files\Common Files\Soobzo\GDUpdate\rlz_id.dll, En quarantaine, [1798dcd4366341f5a76673c0c73ceb15],
PUP.Optional.Goobzo.Gen, C:\Program Files\Common Files\Soobzo\GDUpdate\sma.exe, En quarantaine, [1798dcd4366341f5a76673c0c73ceb15],
PUP.Optional.Goobzo.Gen, C:\Program Files\Common Files\Soobzo\GDUpdate\smci32.dll, En quarantaine, [1798dcd4366341f5a76673c0c73ceb15],
PUP.Optional.Goobzo.Gen, C:\Program Files\Common Files\Soobzo\GDUpdate\smci64.dll, En quarantaine, [1798dcd4366341f5a76673c0c73ceb15],
PUP.Optional.Goobzo.Gen, C:\Program Files\Common Files\Soobzo\GDUpdate\smi32.exe, En quarantaine, [1798dcd4366341f5a76673c0c73ceb15],
PUP.Optional.Goobzo.Gen, C:\Program Files\Common Files\Soobzo\GDUpdate\smi64.exe, En quarantaine, [1798dcd4366341f5a76673c0c73ceb15],
PUP.Optional.Goobzo.Gen, C:\Program Files\Common Files\Soobzo\GDUpdate\smw.sys, En quarantaine, [1798dcd4366341f5a76673c0c73ceb15],

Secteurs physiques: 0
(Aucun élément malveillant détecté)


(end)

Publicité


Signaler le contenu de ce document

Publicité