cjoint

Publicité


Publicité

Format du document : text/plain

Prévisualisation

Malwarebytes Anti-Malware
www.malwarebytes.org

Date de l'analyse: 28/08/2016
Heure de l'analyse: 22:13
Fichier journal: Analyse 3.txt
Administrateur: Oui

Version: 2.2.1.1043
Base de données de programmes malveillants: v2016.08.28.07
Base de données de rootkits: v2016.08.15.01
Licence: Essai
Protection contre les programmes malveillants: Activé
Protection contre les sites Web malveillants: Activé
Autoprotection: Désactivé

Système d'exploitation: Windows 10
Processeur: x64
Système de fichiers: NTFS
Utilisateur: Shiro

Type d'analyse: Analyse des menaces
Résultat: Terminé
Objets analysés: 285868
Temps écoulé: 14 min, 49 s

Mémoire: Activé
Démarrage: Activé
Système de fichiers: Activé
Archives: Activé
Rootkits: Désactivé
Heuristique: Activé
PUP: Activé
PUM: Activé

Processus: 0
(Aucun élément malveillant détecté)

Modules: 0
(Aucun élément malveillant détecté)

Clés du Registre: 13
PUP.Optional.HohoSearch, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\HpughtdrerceingndfGhimele.exe, En quarantaine, [f285a5ab0892171fd95f30b65da454ac],
PUP.Optional.Wajam, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\ac1457037391680218ca57df64c23f4b, En quarantaine, [492e85cb21796ec8b56304ca8480d22e],
PUP.Optional.Tuto4PC, HKLM\SOFTWARE\MICROSOFT\TRACING\otutnetwork_RASAPI32, En quarantaine, [2c4b0f415f3b4de98609a259a55eef11],
PUP.Optional.Tuto4PC, HKLM\SOFTWARE\MICROSOFT\TRACING\otutnetwork_RASMANCS, En quarantaine, [11663a16267476c0721d19e2e41fff01],
PUP.Optional.WizzCaster, HKLM\SOFTWARE\MICROSOFT\TRACING\wizzcaster_RASAPI32, En quarantaine, [5126143c9208003683a317e706fd956b],
PUP.Optional.WizzCaster, HKLM\SOFTWARE\MICROSOFT\TRACING\wizzcaster_RASMANCS, En quarantaine, [e1967dd3a9f1d165d254de20ee15916f],
PUP.Optional.Goobzo, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{3F2F3C50-D4A9-4011-9A0F-86619171DD23}, Supprimer au redémarrage, [eb8c9cb44d4d39fdc931826d10f38a76],
PUP.Optional.YesSearches, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{7E9CB34A-C741-40F9-BCFA-5CEF5056759F}, Supprimer au redémarrage, [e196d67a138764d2d6c63f8ad62c7e82],
PUP.Optional.YesSearches, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Hpughtdrerceing Nodifier, Supprimer au redémarrage, [8dea0947940663d3fe9f458413ef4db3],
PUP.Optional.Goobzo, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\SMW_UpdateTask_Time_333539353335393430362d7855236c575a4a5741415034, Supprimer au redémarrage, [92e5034da9f1f93daf74c1183fc30000],
PUP.Optional.Trotux, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}, En quarantaine, [95e22c247e1c072f10bdcefbf40e936d],
PUP.Optional.Trotux, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{C0BF5C7C-3798-4BCE-B1FC-03EF3CB57C03}, En quarantaine, [b0c77cd4940641f5389478512fd3c33d],
PUP.Optional.Searching, HKU\S-1-5-21-3965184278-3130407797-1671085443-1001\SOFTWARE\GOOGLE\CHROME\EXTENSIONS\jlcgehabolcakkjhgmgpkagpolbjlhfa, En quarantaine, [8fe887c9bedcb482e1231dbb33cf7b85],

Valeurs du Registre: 11
PUP.Optional.Goobzo, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{3F2F3C50-D4A9-4011-9A0F-86619171DD23}|Path, \SMW_UpdateTask_Time_333539353335393430362d7855236c575a4a5741415034, Supprimer au redémarrage, [eb8c9cb44d4d39fdc931826d10f38a76]
PUP.Optional.YesSearches, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{7E9CB34A-C741-40F9-BCFA-5CEF5056759F}|Path, \Hpughtdrerceing Nodifier, Supprimer au redémarrage, [e196d67a138764d2d6c63f8ad62c7e82]
PUP.Optional.Trotux, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|hp, http://www.trotux.com/?z=e9beda27b3e835afb8b3fa5g8z9m7odzcgce3m0m0c&from=epf1&uid=WDCXWD10SPCX-24HWST1_WD-WXJ1AC5CP1Z2CP1Z2&type=hp&mode=ffsengext, En quarantaine, [95e22c247e1c072f10bdcefbf40e936d]
PUP.Optional.Trotux, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|tab, http://www.trotux.com/?z=e9beda27b3e835afb8b3fa5g8z9m7odzcgce3m0m0c&from=epf1&uid=WDCXWD10SPCX-24HWST1_WD-WXJ1AC5CP1Z2CP1Z2&type=hp&mode=ffsengext, En quarantaine, [4f2807490d8dbd796469a4259b670ff1]
PUP.Optional.Trotux, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|sp, http://www.trotux.com/search/?q={searchTerms}&z=e9beda27b3e835afb8b3fa5g8z9m7odzcgce3m0m0c&from=epf1&uid=WDCXWD10SPCX-24HWST1_WD-WXJ1AC5CP1Z2CP1Z2&type=sp, En quarantaine, [f681c28e584296a084496267d42e649c]
PUP.Optional.Trotux, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|surl, http://www.trotux.com/search/?&z=e9beda27b3e835afb8b3fa5g8z9m7odzcgce3m0m0c&from=epf1&uid=WDCXWD10SPCX-24HWST1_WD-WXJ1AC5CP1Z2CP1Z2&type=sp&q=, En quarantaine, [195e08480c8e79bdb7168f3a05fd669a]
PUP.Optional.Social2Search.Gen, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\ac1457037391680218ca57df64c23f4b|DisplayName, Social2Search, En quarantaine, [9fd8292794068da93baba95309fab64a]
PUP.Optional.Trotux, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{C0BF5C7C-3798-4BCE-B1FC-03EF3CB57C03}|DisplayName, trotux - Uninstall, En quarantaine, [b0c77cd4940641f5389478512fd3c33d]
PUP.Optional.LuckyBrowse, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{DCF3662A-3EAA-44C9-84E3-0B4477FA7456}, v2.24|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\Program Files (x86)\LuckyBrowse\app\LuckyBrowse.exe|Name=LuckyBrowse|, En quarantaine, [1c5b74dcafeb3501d18e519c907301ff]
PUP.Optional.LuckyBrowse, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{2653D82A-D622-44E0-B31C-F670F7D75919}, v2.24|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\Program Files (x86)\LuckyBrowse\app\LuckyBrowse.exe|Name=LuckyBrowse|, En quarantaine, [a7d08cc4c9d12115005f529bbc477789]
PUP.Optional.Linkury.ACMB1, HKU\S-1-5-18\ENVIRONMENT|SNP, http://%66%65%65%64.%68%65%6C%70%65%72%62%61%72.%63%6F%6D?publisher=APSFClickMeIn&co=FR&userid=4764345a-53d4-4b3e-003c-05e371a2e548&searchtype=sc&installDate=28/08/2016&barcodeid=51107003&channelid=3&av=avast, En quarantaine, [294e5af68f0b5adc11ee2bc991728b75]

Données du Registre: 0
(Aucun élément malveillant détecté)

Dossiers: 4
PUP.Optional.Linkury, C:\Windows\Temp\Smartbar, En quarantaine, [d0a7d17fc7d30135d95844b0fb085ea2],
PUP.Optional.Wajam.Gen, C:\Program Files\ac1457037391680218ca57df64c23f4b\96a03592cf016a19961ab86f7a906c82, En quarantaine, [1d5a84ccb7e3c27410b7ac4813f027d9],
PUP.Optional.Wajam.Gen, C:\Program Files\ac1457037391680218ca57df64c23f4b, En quarantaine, [1d5a84ccb7e3c27410b7ac4813f027d9],
PUP.Optional.Wajam.Gen, C:\Program Files\ac1457037391680218ca57df64c23f4b\cdb037ade68a3eef5dbd32529caf38ae, En quarantaine, [1d5a84ccb7e3c27410b7ac4813f027d9],

Fichiers: 48
PUP.Optional.HohoSearch, C:\Program Files (x86)\Arudaenttibiward\HpughtdrerceingndfGhimele.exe, En quarantaine, [f285a5ab0892171fd95f30b65da454ac],
PUP.Optional.Linkury.ACMB1, C:\Users\Shiro\AppData\Roaming\Dentotam.exe, En quarantaine, [4334123e702ad165b85b796112f2d12f],
PUP.Optional.LogicHandler, C:\Users\Shiro\AppData\Roaming\KonkKayzap.bin, En quarantaine, [3641a4ac5c3ea591b43980ded42ce719],
PUP.Optional.Linkury.ACMB1, C:\Users\Shiro\AppData\Roaming\Ontozap.exe, En quarantaine, [89ee80d0efab02340b0854868a7a08f8],
PUP.Optional.Linkury, C:\Users\Shiro\AppData\Roaming\Xxx-Tip.bin, En quarantaine, [492e57f9e1b9e84ed01f72e563a1619f],
PUP.Optional.HohoSearch, C:\Program Files (x86)\Arudaenttibiward\HpughtdrerceingndfMqiphchipaght.exe, En quarantaine, [d1a6d977b4e67abce652cc1a936e54ac],
PUP.Optional.CSDI, C:\Users\Shiro\AppData\Local\Temp\0U8G9LSBM9.exe, En quarantaine, [6c0b262ad1c996a004f5f99e41c3d22e],
PUP.Optional.BundleInstaller, C:\Users\Shiro\AppData\Local\Temp\A446.tmp.exe, En quarantaine, [a4d387c9cdcd0b2b4e1721a1dc2856aa],
PUP.Optional.ConvertAd, C:\Users\Shiro\AppData\Local\Temp\nse5CED.tmp, En quarantaine, [ff783e122674221498ef016e10f445bb],
PUP.Optional.NetworkProtector, C:\Users\Shiro\AppData\Local\Temp\nsrE883.tmp, En quarantaine, [bcbb93bd2d6db38301f24291699bf907],
PUP.Optional.PCSpeedUp, C:\Users\Shiro\AppData\Local\Temp\rX3RyjqI4V.exe, En quarantaine, [bdbaf65a58422b0b0adb9b91857cf40c],
PUP.Optional.IDSCProduct, C:\Users\Shiro\AppData\Local\Temp\EX8MU3IBUF.exe, En quarantaine, [7bfc1739d5c5171f17123032877d639d],
Trojan.Agent, C:\Users\Shiro\AppData\Local\Temp\ftPdHrTGaf.exe, En quarantaine, [89ee56fa93078ea8cd44b9ec80810af6],
Trojan.Agent, C:\Users\Shiro\AppData\Local\Temp\GKNxWGotna.exe, En quarantaine, [3f3881cf683269cdab5d24a914f031cf],
Adware.ProxyAgent, C:\Users\Shiro\AppData\Local\Temp\x1sw6MUNW3.exe, En quarantaine, [a4d3f060d9c13105def8932306fe12ee],
PUP.Optional.Amonetize, C:\Users\Shiro\AppData\Local\Temp\sdf2977.exe, En quarantaine, [4f28dc74b7e33cfa26cd7b51ad54d828],
PUP.Optional.Amonetize, C:\Users\Shiro\AppData\Local\Temp\sdf910B.exe, En quarantaine, [680fbc947e1c68cecb28547845bcfe02],
PUP.Optional.StartPage, C:\Users\Shiro\AppData\Local\Temp\SetFA6.tmp, En quarantaine, [a4d33b15cdcd48ee496748927490916f],
PUP.Optional.Tuto4PC, C:\Users\Shiro\AppData\Local\Temp\LQ2R2QZR2D.exe, En quarantaine, [fb7caca4297138fe38a816cfc63b52ae],
PUP.Optional.Tuto4PC, C:\Users\Shiro\AppData\Local\Temp\DLN2VC096U\win.exe, En quarantaine, [79fe5ff1debc81b55a29ed54e020de22],
PUP.Optional.Offerware, C:\Users\Shiro\AppData\Local\Temp\f9626892-7a78-3199-abd2-97bbce96297b\Extracted\adv_109.exe, En quarantaine, [522554fc207ae254743a3b4d15ecdf21],
PUP.Optional.Wajam, C:\Windows\5d58ca7f5ad055e438459f59bb1bda23.exe, En quarantaine, [492e85cb21796ec8b56304ca8480d22e],
PUP.Optional.YesSearches, C:\Windows\System32\Tasks\Hpughtdrerceing Nodifier, En quarantaine, [aec9b898c2d8d5610793626758aad030],
PUP.Optional.Goobzo, C:\Windows\System32\Tasks\SMW_UpdateTask_Time_333539353335393430362d7855236c575a4a5741415034, En quarantaine, [4136b49cd3c787af8bc01bca24de7a86],
PUP.Optional.Linkury, C:\Users\Shiro\AppData\Roaming\ApplicationHosting.dat, En quarantaine, [c5b25000900a280e0c6433bc4ab939c7],
PUP.Optional.Linkury, C:\Users\Shiro\AppData\Roaming\md.xml, En quarantaine, [324565eb9efc0333a2cff1fe93704eb2],
PUP.Optional.Linkury, C:\Users\Shiro\AppData\Roaming\noah.dat, En quarantaine, [3344401015859d993e349659db2850b0],
PUP.Optional.Linkury, C:\Users\Shiro\AppData\Roaming\lobby.dat, En quarantaine, [fd7ad37d6d2d1c1ab24a9d52d42f38c8],
PUP.Optional.Linkury, C:\Windows\Temp\Smartbar\Strongstring.ico, En quarantaine, [d0a7d17fc7d30135d95844b0fb085ea2],
PUP.Optional.Wajam.Gen, C:\Program Files\ac1457037391680218ca57df64c23f4b\96a03592cf016a19961ab86f7a906c82\3e1fa0374dd34f1196b6817d9126616e.ico, En quarantaine, [1d5a84ccb7e3c27410b7ac4813f027d9],
PUP.Optional.Wajam.Gen, C:\Program Files\ac1457037391680218ca57df64c23f4b\96a03592cf016a19961ab86f7a906c82\805230f0a4fc4ff140ab3ee05aa57613.ico, En quarantaine, [1d5a84ccb7e3c27410b7ac4813f027d9],
PUP.Optional.Wajam.Gen, C:\Program Files\ac1457037391680218ca57df64c23f4b\96a03592cf016a19961ab86f7a906c82\ec2dcced274c66b42af6a47be98c5ce3.ico, En quarantaine, [1d5a84ccb7e3c27410b7ac4813f027d9],
PUP.Optional.Wajam.Gen, C:\Program Files\ac1457037391680218ca57df64c23f4b\184c59cdc7bdc189a42955fe8b9a6071.exe, En quarantaine, [1d5a84ccb7e3c27410b7ac4813f027d9],
PUP.Optional.Wajam.Gen, C:\Program Files\ac1457037391680218ca57df64c23f4b\392127b4424ad44c1622ab4ce9be840f.exe, En quarantaine, [1d5a84ccb7e3c27410b7ac4813f027d9],
PUP.Optional.Wajam.Gen, C:\Program Files\ac1457037391680218ca57df64c23f4b\5d58ca7f5ad055e438459f59bb1bda23.exe, En quarantaine, [1d5a84ccb7e3c27410b7ac4813f027d9],
PUP.Optional.Wajam.Gen, C:\Program Files\ac1457037391680218ca57df64c23f4b\70cfd62ad1f29386ca6f200b40889069.exe, En quarantaine, [1d5a84ccb7e3c27410b7ac4813f027d9],
PUP.Optional.Wajam.Gen, C:\Program Files\ac1457037391680218ca57df64c23f4b\71b2c1928174794c5701991fd4a42c8d, En quarantaine, [1d5a84ccb7e3c27410b7ac4813f027d9],
PUP.Optional.Wajam.Gen, C:\Program Files\ac1457037391680218ca57df64c23f4b\73c0912de6568b62df1d2144b74d5b78.exe, En quarantaine, [1d5a84ccb7e3c27410b7ac4813f027d9],
PUP.Optional.Wajam.Gen, C:\Program Files\ac1457037391680218ca57df64c23f4b\abe13b01aea318a646ed5599e09c8e52.exe, En quarantaine, [1d5a84ccb7e3c27410b7ac4813f027d9],
PUP.Optional.Wajam.Gen, C:\Program Files\ac1457037391680218ca57df64c23f4b\cc96a083f3213acc42ff8aeabb32c56f.exe, En quarantaine, [1d5a84ccb7e3c27410b7ac4813f027d9],
PUP.Optional.Wajam.Gen, C:\Program Files\ac1457037391680218ca57df64c23f4b\eae032b7bdd74d3c986d4845b71af9b0, En quarantaine, [1d5a84ccb7e3c27410b7ac4813f027d9],
PUP.Optional.Wajam.Gen, C:\Program Files\ac1457037391680218ca57df64c23f4b\ec2dcced274c66b42af6a47be98c5ce3.ico, En quarantaine, [1d5a84ccb7e3c27410b7ac4813f027d9],
PUP.Optional.Wajam.Gen, C:\Program Files\ac1457037391680218ca57df64c23f4b\cdb037ade68a3eef5dbd32529caf38ae\onadvo.dll, En quarantaine, [1d5a84ccb7e3c27410b7ac4813f027d9],
PUP.Optional.Wajam.Gen, C:\Program Files\ac1457037391680218ca57df64c23f4b\cdb037ade68a3eef5dbd32529caf38ae\pswbfv.dll, En quarantaine, [1d5a84ccb7e3c27410b7ac4813f027d9],
PUP.Optional.Linkury.Gen, C:\Users\Shiro\AppData\Roaming\Dentotam.tst, En quarantaine, [d2a562ee5644152150d97588ba49ed13],
PUP.Optional.Linkury.Gen, C:\Users\Shiro\AppData\Roaming\Ontozap.tst, En quarantaine, [5126a1af5347ae88a9804ab3cf34857b],
PUP.Optional.Linkury.ACMB1, C:\Users\Shiro\AppData\Roaming\Config.xml, En quarantaine, [f2856fe10199e84e2db15349a4600ff1],
PUP.Optional.Linkury.ACMB1, C:\Users\Shiro\AppData\Roaming\InstallationConfiguration.xml, En quarantaine, [4433024e732769cdca15d8c4e61ebd43],

Secteurs physiques: 0
(Aucun élément malveillant détecté)


(end)

Publicité


Signaler le contenu de ce document

Publicité