cjoint

Publicité


Publicité

Format du document : text/plain

Prévisualisation

Malwarebytes
www.malwarebytes.com

-Détails du journal-
Date de l'analyse: 12/08/2017
Heure de l'analyse: 19:09
Fichier journal: Mbam Rapport.txt
Administrateur: Oui

-Informations du logiciel-
Version: 3.1.2.1733
Version de composants: 1.0.139
Version de pack de mise à jour: 1.0.2569
Licence: Gratuit

-Informations système-
Système d'exploitation: Windows 10
Processeur: x64
Système de fichiers: NTFS
Utilisateur: DESKTOP-U9OTJ6O\unury

-Résumé de l'analyse-
Type d'analyse: Analyse des menaces
Résultat: Terminé
Objets analysés: 353014
Menaces détectées: 40
Menaces mises en quarantaine: 40
Temps écoulé: 3 min, 19 s

-Options d'analyse-
Mémoire: Activé
Démarrage: Activé
Système de fichiers: Activé
Archives: Activé
Rootkits: Désactivé
Heuristique: Activé
PUP: Activé
PUM: Activé

-Détails de l'analyse-
Processus: 0
(Aucun élément malveillant détecté)

Module: 0
(Aucun élément malveillant détecté)

Clé du registre: 4
PUP.Optional.SearchManager, HKU\S-1-5-21-3012107341-3821666964-1722861879-1001\SOFTWARE\GOOGLE\CHROME\EXTENSIONS\pilplloabdedfmialnfchjomjmpjcoej, En quarantaine, [511], [183362],1.0.2569
PUP.Optional.WinYahoo, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{AD424582-FDC2-9402-4C42-E4829CC23702}, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.SearchManager, HKLM\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\pilplloabdedfmialnfchjomjmpjcoej, En quarantaine, [511], [260991],1.0.2569
PUP.Optional.SearchManager, HKLM\SOFTWARE\GOOGLE\CHROME\EXTENSIONS\pilplloabdedfmialnfchjomjmpjcoej, En quarantaine, [511], [260991],1.0.2569

Valeur du registre: 1
Adware.DealPly.Generic, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE|TOLIN, En quarantaine, [2554], [367966],1.0.2569

Données du registre: 0
(Aucun élément malveillant détecté)

Flux de données: 0
(Aucun élément malveillant détecté)

Dossier: 2
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\HowToRemove, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\USERS\UNURY\APPDATA\LOCAL\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}, En quarantaine, [71], [302717],1.0.2569

Fichier: 33
Adware.InstallMonster, C:\$RECYCLE.BIN\S-1-5-21-3012107341-3821666964-1722861879-1001\$RVX07GC.ZIP, En quarantaine, [120], [417100],1.0.2569
Adware.InstallMonster, C:\$RECYCLE.BIN\S-1-5-21-3012107341-3821666964-1722861879-1001\$RU2XC6L.ZIP, En quarantaine, [120], [420515],1.0.2569
Adware.InstallMonster, C:\$RECYCLE.BIN\S-1-5-21-3012107341-3821666964-1722861879-1001\$RP5VP6M\SETUP.EXE, En quarantaine, [120], [420515],1.0.2569
PUP.Optional.ByteFence, C:\USERS\UNURY\APPDATA\LOCAL\TEMP\TMPSEC9208179\BYTEFENCE-INSTALLER_3.12.0.EXE, En quarantaine, [613], [389016],1.0.2569
Adware.InstallMonster, C:\USERS\UNURY\APPDATA\LOCAL\TEMP\TEMP1_SAVE-O-GRAM-INSTAGRAM-DOWNLOADER-26[ARB]CRACKED.ZIP\SETUP.EXE, En quarantaine, [120], [420515],1.0.2569
PUP.Optional.WinYahoo, C:\USERS\UNURY\APPDATA\LOCAL\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\HOWTOREMOVE\HOWTOREMOVE.HTML, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\HowToRemove\chromium-min.jpg, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\HowToRemove\control panel-min-min.JPG, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\HowToRemove\down.png, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\HowToRemove\ff menu.JPG, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\HowToRemove\ff search engine-min.png, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\HowToRemove\hp-min ff.png, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\HowToRemove\hp-min ie.png, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\HowToRemove\search engine.gif, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\HowToRemove\setup pages.gif, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\HowToRemove\sp-min.png, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\HowToRemove\start-min.jpg, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\HowToRemove\up.png, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\cosirenot, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\dirodo.dat, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\install.log, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\manosanet, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\narodate, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\nidetalo.dat, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\nisores.dat, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\sidisode, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\sinoladet.dat, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\Sqlite3.dll, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\tifinir.cfg, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\uninst.dat, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\uninst.exe, En quarantaine, [71], [302717],1.0.2569
PUP.Optional.WinYahoo, C:\Users\unury\AppData\Local\{19D72F8B-3D7F-4333-50E7-66DB748F9A43}\uninstp.dat, En quarantaine, [71], [302717],1.0.2569
Adware.DealPly.Generic, C:\USERS\UNURY\APPDATA\ROAMING\BORECEGOKO, En quarantaine, [2554], [367966],1.0.2569

Secteur physique: 0
(Aucun élément malveillant détecté)


(end)

Publicité


Signaler le contenu de ce document

Publicité