Format du document : text/plain
Prévisualisation
Malwarebytes
www.malwarebytes.com
-Détails du journal-
Date de l'analyse: 04/04/2019
Heure de l'analyse: 15:20
Fichier journal: 649b21d4-56dc-11e9-a6a4-00ffc54747c8.json
-Informations du logiciel-
Version: 3.7.1.2839
Version de composants: 1.0.563
Version de pack de mise à jour: 1.0.10002
Licence: Gratuit
-Informations système-
Système d'exploitation: Windows 7 Service Pack 1
Processeur: x64
Système de fichiers: NTFS
Utilisateur: pol-PC\pol
-Résumé de l'analyse-
Type d'analyse: Analyse des menaces
Analyse lancée par: Manuel
Résultat: Terminé
Objets analysés: 303166
Menaces détectées: 59
Menaces mises en quarantaine: 59
Temps écoulé: 14 min, 14 s
-Options d'analyse-
Mémoire: Activé
Démarrage: Activé
Système de fichiers: Activé
Archives: Activé
Rootkits: Activé
Heuristique: Activé
PUP: Détection
PUM: Détection
-Détails de l'analyse-
Processus: 0
(Aucun élément malveillant détecté)
Module: 0
(Aucun élément malveillant détecté)
Clé du registre: 5
PUP.Optional.WinYahoo.TskLnk, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{DDE53525-8D65-E4A5-3CE5-9425EC6547A5}, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{3BAFD36F-6B2F-02EF-DAAF-726F0A2FA1EF}, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\{3DC2E85B-AEFB-B94D-4C0F-1FEE34E9D47E}\ProductUpdt, En quarantaine, [223], [518233],1.0.10002
PUP.Optional.WinYahoo.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{EBAD97A7-07E2-4980-A581-873CE971473E}, En quarantaine, [223], [518233],1.0.10002
PUP.Optional.WinYahoo.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\PLAIN\{EBAD97A7-07E2-4980-A581-873CE971473E}, En quarantaine, [223], [518233],1.0.10002
Valeur du registre: 1
Adware.SearchEngineHijack, HKU\S-1-5-21-340761944-3365309594-107435806-1000\SOFTWARE\GOOGLE\CHROME\PREFERENCEMACS\Default\extensions.settings|pdpcpceofkopegffcdnffeenbfdldock, En quarantaine, [357], [462944],1.0.10002
Données du registre: 0
(Aucun élément malveillant détecté)
Flux de données: 0
(Aucun élément malveillant détecté)
Dossier: 4
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\USERS\POL\APPDATA\LOCAL\{69705F2C-4DD8-3394-2040-167C0428EAE4}, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\USERS\POL\APPDATA\LOCAL\{DACBEC97-FE63-802F-93FB-A5C7B793595F}, En quarantaine, [771], [542290],1.0.10002
Fichier: 49
PUP.Optional.WinYahoo.TskLnk, C:\USERS\POL\APPDATA\LOCAL\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HOWTOREMOVE\HOWTOREMOVE.HTML, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove\chromium-min.jpg, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove\control panel-min-min.JPG, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove\down.png, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove\ff menu.JPG, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove\ff search engine-min.png, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove\hp-min ff.png, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove\hp-min ie.png, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove\search engine.gif, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove\setup pages.gif, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove\sp-min.png, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove\start-min.jpg, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove\up.png, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\ladedaf, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\tilare, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\uninst.exe, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\uninstp.dat, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\USERS\POL\APPDATA\LOCAL\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HOWTOREMOVE\HOWTOREMOVE.HTML, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove\chromium-min.jpg, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove\control panel-min-min.JPG, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove\down.png, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove\ff menu.JPG, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove\ff search engine-min.png, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove\hp-min ff.png, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove\hp-min ie.png, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove\search engine.gif, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove\setup pages.gif, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove\sp-min.png, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove\start-min.jpg, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove\up.png, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\seconodit, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\uninst.exe, En quarantaine, [771], [542290],1.0.10002
PUP.Optional.WinYahoo.Generic, C:\WINDOWS\SYSTEM32\TASKS\{3DC2E85B-AEFB-B94D-4C0F-1FEE34E9D47E}\ProductUpdt, En quarantaine, [223], [518233],1.0.10002
RiskWare.GameHack, C:\PROGRAM FILES\THE LONG DARK\STEAM_API.DLL, En quarantaine, [7621], [305544],1.0.10002
PUP.Optional.ASK, D:\DOWNLOAD\2.6.1_MANYCAM_2.6.1.EXE, En quarantaine, [2], [383618],1.0.10002
PUP.Optional.DriverToolkit, D:\DOWNLOAD\DRIVERTOOLKITINSTALLER.EXE, En quarantaine, [998], [512879],1.0.10002
Generic.Malware/Suspicious, D:\DOWNLOAD\2.6.1_MANYCAM_2.6.1.EXE, En quarantaine, [0], [392686],1.0.10002
PUP.Optional.Reimage, D:\DOWNLOAD\REIMAGEREPAIR.EXE, En quarantaine, [340], [331559],1.0.10002
PUP.Optional.InstallCore, D:\DOWNLOAD\LA-LA-LAND-FRE-6949543.EXE, En quarantaine, [427], [389991],1.0.10002
PUP.Optional.InstallCore, D:\DOWNLOAD\CAMSTUDIO_2204425476.EXE, En quarantaine, [427], [390222],1.0.10002
PUP.Optional.Solvusoft, D:\DOWNLOAD\SETUP_DRIVERDOC_2018.EXE, En quarantaine, [2937], [331663],1.0.10002
PUP.Optional.ASK, D:\DOWNLOAD\3.0.80_MANYCAMSETUP-3.0.80.EXE, En quarantaine, [2], [577725],1.0.10002
Generic.Malware/Suspicious, D:\DOWNLOAD\3.0.80_MANYCAMSETUP-3.0.80.EXE, En quarantaine, [0], [392686],1.0.10002
PUP.Optional.DLLSuite, D:\DOWNLOAD\DLLSUITE_SETUP.EXE, En quarantaine, [4505], [396352],1.0.10002
Adware.SearchEngineHijack, C:\USERS\POL\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Remplacé, [357], [462944],1.0.10002
Adware.SearchEngineHijack, C:\USERS\POL\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Remplacé, [357], [462944],1.0.10002
PUP.Optional.InstallCore, D:\DOWNLOAD\YOUR FILE IS READY TO DOWNLOAD_3623780085.EXE, En quarantaine, [427], [571710],1.0.10002
Generic.Malware/Suspicious, D:\DOWNLOAD\CDBXP_SETUP_4.5.8.6795_X64.EXE, En quarantaine, [0], [392686],1.0.10002
PUP.Optional.SecuredSearch, C:\USERS\POL\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Remplacé, [234], [551753],1.0.10002
Secteur physique: 0
(Aucun élément malveillant détecté)
WMI: 0
(Aucun élément malveillant détecté)
(end)