cjoint

Publicité


Publicité

Format du document : text/plain

Prévisualisation

Malwarebytes Anti-Malware
www.malwarebytes.org

Date de l'analyse: 30/07/2016
Heure de l'analyse: 15:55
Fichier journal: problème.txt
Administrateur: Oui

Version: 2.2.1.1043
Base de données de programmes malveillants: v2016.07.30.09
Base de données de rootkits: v2016.05.27.01
Licence: Gratuit
Protection contre les programmes malveillants: Désactivé
Protection contre les sites Web malveillants: Désactivé
Autoprotection: Désactivé

Système d'exploitation: Windows 10
Processeur: x64
Système de fichiers: NTFS
Utilisateur: altea

Type d'analyse: Analyse des menaces
Résultat: Terminé
Objets analysés: 397707
Temps écoulé: 8 min, 20 s

Mémoire: Activé
Démarrage: Activé
Système de fichiers: Activé
Archives: Activé
Rootkits: Désactivé
Heuristique: Activé
PUP: Activé
PUM: Activé

Processus: 0
(Aucun élément malveillant détecté)

Modules: 0
(Aucun élément malveillant détecté)

Clés du Registre: 9
PUP.Optional.BrowseFox, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\{38c95e98-da81-4038-a23a-50d0e098cff8}Gw64, En quarantaine, [fc35c1695347ae889dd97d1452b25ba5],
PUP.Optional.IDSCProduct, HKLM\SOFTWARE\MICROSOFT\TRACING\idscservice_RASAPI32, En quarantaine, [ce6338f282185fd78b8603f9c93a44bc],
PUP.Optional.IDSCProduct, HKLM\SOFTWARE\MICROSOFT\TRACING\idscservice_RASMANCS, En quarantaine, [4ce52efc148667cfc74a02fa05fefd03],
PUP.Optional.WizzCaster, HKLM\SOFTWARE\MICROSOFT\TRACING\wizzcaster_RASAPI32, En quarantaine, [f43d31f91486a98d90dd807ec043c43c],
PUP.Optional.WizzCaster, HKLM\SOFTWARE\MICROSOFT\TRACING\wizzcaster_RASMANCS, En quarantaine, [260bd6542674eb4bff6e5ca2e023cc34],
PUP.Optional.AmiUpdater, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\amiupdaterExd, Supprimer au redémarrage, [e94879b1e8b2989eb27f0b8c3bc808f8],
PUP.Optional.AmiUpdater, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\amiupdaterExi, Supprimer au redémarrage, [b978b674d0ca7db9a38eb3e4f40f4db3],
PUP.Optional.Trotux, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}, En quarantaine, [7eb3ec3e326876c09f52f5d40af87e82],
PUP.Optional.InstallCore, HKU\S-1-5-21-3112181519-2399260780-4012660538-1001\SOFTWARE\ICSW1.14, En quarantaine, [022f1218049681b5094d8e1907fcb34d],

Valeurs du Registre: 7
PUP.Optional.Trotux, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|hp, http://www.trotux.com/?z=9079ad028f1b6a162e29d3eg0zeqet4b7eaofcbo1g&from=opt&uid=ST3750528AS_6VP0WFXK&type=hp&mode=ffsengext, En quarantaine, [7eb3ec3e326876c09f52f5d40af87e82]
PUP.Optional.Trotux, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|tab, http://www.trotux.com/?z=9079ad028f1b6a162e29d3eg0zeqet4b7eaofcbo1g&from=opt&uid=ST3750528AS_6VP0WFXK&type=hp&mode=ffsengext, En quarantaine, [5ed339f1a5f58fa78e63bd0cd230ef11]
PUP.Optional.Trotux, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|sp, http://www.trotux.com/search/?q={searchTerms}&z=9079ad028f1b6a162e29d3eg0zeqet4b7eaofcbo1g&from=opt&uid=ST3750528AS_6VP0WFXK&type=sp, En quarantaine, [9c95c4665e3ce353b23f2b9eeb17f40c]
PUP.Optional.Trotux, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|surl, http://www.trotux.com/search/?&z=9079ad028f1b6a162e29d3eg0zeqet4b7eaofcbo1g&from=opt&uid=ST3750528AS_6VP0WFXK&type=sp&q=, En quarantaine, [032e7caecfcb70c616dbab1e61a129d7]
Hijack.AutoConfigURL.PrxySvrRST, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\IPHLPSVC\PARAMETERS\PROXYMGR\{E6062167-9C69-4931-BB50-54961145583A}|AutoConfigUrl, http://stoppblock.net/wpad.dat?75ffce5bd0ca9f289954e58a1ba46b9813516938, En quarantaine, [3100dd4d1d7d6bcbeb57753fbc48e51b]
Hijack.AutoConfigURL.PrxySvrRST, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\NLASVC\PARAMETERS\INTERNET\MANUALPROXIES, 0http://stoppblock.net/wpad.dat?75ffce5bd0ca9f289954e58a1ba46b9813516938, En quarantaine, [f041cb5f57433df9122d991b768e3dc3]
Hijack.AutoConfigURL.PrxySvrRST, HKU\S-1-5-21-3112181519-2399260780-4012660538-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|AutoConfigUrl, http://stoppblock.net/wpad.dat?75ffce5bd0ca9f289954e58a1ba46b9813516938, En quarantaine, [70c131f9bddd6dc9dc64684c52b2c739]

Données du Registre: 2
Hijack.UserInit, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON|Userinit, wscript C:\WINDOWS\run.vbs,, Bon : (userinit.exe), Mauvais : (wscript C:\WINDOWS\run.vbs,),Remplacé,[08290f1bc2d8ec4af336244cd03457a9]
PUM.Optional.UserInit, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON|Userinit, wscript C:\WINDOWS\run.vbs,, Bon : (userinit.exe), Mauvais : (wscript C:\WINDOWS\run.vbs,),Remplacé,[d75abd6d772377bf56a7caaf34d019e7]

Dossiers: 4
PUP.Optional.Wajam.Gen, C:\Program Files\72c3c80e81cf4c73586c915281ab71c4\65cb4addf9fe959615cabe95301b8d07, En quarantaine, [4ee336f42b6ffc3abd474ea73cc73cc4],
PUP.Optional.Wajam.Gen, C:\Program Files\72c3c80e81cf4c73586c915281ab71c4, En quarantaine, [4ee336f42b6ffc3abd474ea73cc73cc4],
PUP.Optional.Wajam.Gen, C:\Program Files\72c3c80e81cf4c73586c915281ab71c4\f8cabfd85c9ffdc0f8aface588bd74a3, En quarantaine, [4ee336f42b6ffc3abd474ea73cc73cc4],
PUP.Optional.GsearchFinder, C:\Users\altea\AppData\Roaming\Profiles\ckuertyborerghtghupersy\YourGSearchFinder_br, En quarantaine, [6cc58f9b900ae1559900bb0d956d4db3],

Fichiers: 39
PUP.Optional.BrowseFox, C:\Windows\System32\drivers\{38c95e98-da81-4038-a23a-50d0e098cff8}Gw64.sys, Supprimer au redémarrage, [fc35c1695347ae889dd97d1452b25ba5],
PUP.Optional.Komodia, C:\Windows\System32\trz460F.tmp, En quarantaine, [b978969483173afc2d39c6d95ea337c9],
PUP.Optional.ConvertAd, C:\Users\altea\AppData\Local\Temp\nsdC8DA.tmp, En quarantaine, [1b16dd4de1b903338b491857897bed13],
Trojan.Graftor, C:\Users\altea\AppData\Local\Temp\nsgBE40.tmp.exe, En quarantaine, [5ed319119efceb4be30f634dd232d32d],
PUP.Optional.ExpressDownloader, C:\Users\altea\AppData\Local\Temp\rcbpBLCs8Z.tmp, En quarantaine, [de5354d68a10ab8b46deeeb7d92b847c],
PUP.Optional.Bundler, C:\Users\altea\AppData\Local\Temp\fsdDD3C.exe, En quarantaine, [5ed39b8f9ffb50e6666da77b857b19e7],
Adware.ProxyAgent, C:\Users\altea\AppData\Local\Temp\GXECugFYhC.exe, En quarantaine, [48e9a6849208261086ca9c1b3bc96a96],
PUP.Optional.EasyHotSpot, C:\Users\altea\AppData\Local\Temp\I9HN83MZTC.exe, En quarantaine, [230e93973367231390d34c8543be07f9],
PUP.Optional.AnySend, C:\Users\altea\AppData\Local\Temp\nss3E14.tmp, En quarantaine, [c26f2efcc2d8d3636b58285708f99a66],
PUP.Optional.PCSpeedUp, C:\Users\altea\AppData\Local\Temp\j8Y0eKgQtc.exe, En quarantaine, [959c43e7fb9fc07636b4230910f11ce4],
Trojan.Agent, C:\Users\altea\AppData\Local\Temp\Jx00QIkQF5.exe, En quarantaine, [a09166c4e6b42c0a8d8de0c559a8ab55],
PUP.Optional.Amonetize, C:\Users\altea\AppData\Local\Temp\f9626892-7a78-3199-abd2-97bbce96297b\OfferInstaller.exe, En quarantaine, [28091515c9d1b97d33cdba13c041e719],
PUP.Optional.YesSearches, C:\Users\altea\AppData\Local\Temp\is-T5US7.tmp\Trotux.exe, En quarantaine, [38f91614afeb73c3de55d4fe11f0f20e],
PUP.Optional.Komodia, C:\Windows\Temp\_avast_\unp42904035.tmp, En quarantaine, [41f062c8d6c447efadb9eab51fe2758b],
PUP.Optional.Komodia, C:\Windows\Temp\_avast_\unp51646746.tmp, En quarantaine, [250c2208fd9ded49ec7a336c2fd2659b],
PUP.Optional.InstallCore, C:\Users\altea\Downloads\torrent_3-4-2-build-38913_fr_18245(1).exe, En quarantaine, [c46da8826e2cb680c7075fccea17ef11],
PUP.Optional.Binkiland, C:\Users\altea\AppData\LocalLow\Microsoft\Internet Explorer\Services\FavIcon.icoWSE_Binkiland, En quarantaine, [121f5fcb5347ec4ad9da8f09a55e3ac6],
PUP.Optional.Komodia, C:\Windows\Temp\zdengine.log, En quarantaine, [9d94f733d7c3ab8b5c19e905f211e41c],
PUP.Optional.Wajam.Gen, C:\Program Files\72c3c80e81cf4c73586c915281ab71c4\65cb4addf9fe959615cabe95301b8d07\84b718ec11b6696b4859b1fde48b6d27.ico, En quarantaine, [4ee336f42b6ffc3abd474ea73cc73cc4],
PUP.Optional.Wajam.Gen, C:\Program Files\72c3c80e81cf4c73586c915281ab71c4\65cb4addf9fe959615cabe95301b8d07\cde056edd77e9edc9619b875b99467e8.ico, En quarantaine, [4ee336f42b6ffc3abd474ea73cc73cc4],
PUP.Optional.Wajam.Gen, C:\Program Files\72c3c80e81cf4c73586c915281ab71c4\65cb4addf9fe959615cabe95301b8d07\d8df6dfd14f75f49384defc3d9ddf22c.ico, En quarantaine, [4ee336f42b6ffc3abd474ea73cc73cc4],
PUP.Optional.Wajam.Gen, C:\Program Files\72c3c80e81cf4c73586c915281ab71c4\139be5d90421498298b299f2542bc45d, En quarantaine, [4ee336f42b6ffc3abd474ea73cc73cc4],
PUP.Optional.Wajam.Gen, C:\Program Files\72c3c80e81cf4c73586c915281ab71c4\1551a5a4b3b6601707bff620104a4896, En quarantaine, [4ee336f42b6ffc3abd474ea73cc73cc4],
PUP.Optional.Wajam.Gen, C:\Program Files\72c3c80e81cf4c73586c915281ab71c4\2d0a19e5d126a40c6f856795336ee403.cfg, En quarantaine, [4ee336f42b6ffc3abd474ea73cc73cc4],
PUP.Optional.Wajam.Gen, C:\Program Files\72c3c80e81cf4c73586c915281ab71c4\2d0a19e5d126a40c6f856795336ee403.inf, En quarantaine, [4ee336f42b6ffc3abd474ea73cc73cc4],
PUP.Optional.Wajam.Gen, C:\Program Files\72c3c80e81cf4c73586c915281ab71c4\2d0a19e5d126a40c6f856795336ee403.sys, En quarantaine, [4ee336f42b6ffc3abd474ea73cc73cc4],
PUP.Optional.Wajam.Gen, C:\Program Files\72c3c80e81cf4c73586c915281ab71c4\2dffe0b2745b4efde95502075be2df32.exe, En quarantaine, [4ee336f42b6ffc3abd474ea73cc73cc4],
PUP.Optional.Wajam.Gen, C:\Program Files\72c3c80e81cf4c73586c915281ab71c4\9927ded1e03f8aa6777cf22d415b103e.exe, En quarantaine, [4ee336f42b6ffc3abd474ea73cc73cc4],
PUP.Optional.Wajam.Gen, C:\Program Files\72c3c80e81cf4c73586c915281ab71c4\99aa91a1a3ed582903115a13c13aba8a.exe, En quarantaine, [4ee336f42b6ffc3abd474ea73cc73cc4],
PUP.Optional.Wajam.Gen, C:\Program Files\72c3c80e81cf4c73586c915281ab71c4\aaf1ff3d9629036d2696b7ee789a8f4f.exe, En quarantaine, [4ee336f42b6ffc3abd474ea73cc73cc4],
PUP.Optional.Wajam.Gen, C:\Program Files\72c3c80e81cf4c73586c915281ab71c4\ce3599910d6c79716fbcb3d60be499e0.exe, En quarantaine, [4ee336f42b6ffc3abd474ea73cc73cc4],
PUP.Optional.Wajam.Gen, C:\Program Files\72c3c80e81cf4c73586c915281ab71c4\d8df6dfd14f75f49384defc3d9ddf22c.ico, En quarantaine, [4ee336f42b6ffc3abd474ea73cc73cc4],
PUP.Optional.Wajam.Gen, C:\Program Files\72c3c80e81cf4c73586c915281ab71c4\f535f1b02b9277abb43c31561abaf133.exe, En quarantaine, [4ee336f42b6ffc3abd474ea73cc73cc4],
PUP.Optional.Wajam.Gen, C:\Program Files\72c3c80e81cf4c73586c915281ab71c4\f8cabfd85c9ffdc0f8aface588bd74a3\ulcoll.dll, En quarantaine, [4ee336f42b6ffc3abd474ea73cc73cc4],
PUP.Optional.GsearchFinder, C:\Users\altea\AppData\Roaming\Profiles\ckuertyborerghtghupersy\extensions\@90B817C8-8A5C-413B-9DDD-B2C61ED6E79A.xpi, En quarantaine, [aa871911a8f285b1794a57a645bea060],
PUP.Optional.GsearchFinder, C:\Users\altea\AppData\Roaming\Profiles\d4hivpkc.default\extensions\@90B817C8-8A5C-413B-9DDD-B2C61ED6E79A.xpi, En quarantaine, [b27f9e8c633795a10db602fb05fe9f61],
PUP.Optional.Trotux, C:\Users\altea\AppData\Roaming\Mozilla\Firefox\Profiles\myax8x5i.default\searchplugins\3tsdsn32.xml, En quarantaine, [ab86f634cbcf80b6a743b1ec63a152ae],
PUP.Optional.Trotux, C:\Users\altea\AppData\Roaming\Profiles\d4hivpkc.default\searchplugins\9z0exwsn.xml, En quarantaine, [9b96fe2cbfdb0333df3fabff947012ee],
PUP.Optional.Trotux, C:\Users\altea\AppData\Roaming\Profiles\p7oyc52y.default\searchplugins\9z0exwsn.xml, En quarantaine, [7ab78e9c6931da5cb965228807fda55b],

Secteurs physiques: 0
(Aucun élément malveillant détecté)


(end)

Publicité


Signaler le contenu de ce document

Publicité