Malwarebytes www.malwarebytes.com -Détails du journal- Date de l'analyse: 04/04/2019 Heure de l'analyse: 15:20 Fichier journal: 649b21d4-56dc-11e9-a6a4-00ffc54747c8.json -Informations du logiciel- Version: 3.7.1.2839 Version de composants: 1.0.563 Version de pack de mise à jour: 1.0.10002 Licence: Gratuit -Informations système- Système d'exploitation: Windows 7 Service Pack 1 Processeur: x64 Système de fichiers: NTFS Utilisateur: pol-PC\pol -Résumé de l'analyse- Type d'analyse: Analyse des menaces Analyse lancée par: Manuel Résultat: Terminé Objets analysés: 303166 Menaces détectées: 59 Menaces mises en quarantaine: 59 Temps écoulé: 14 min, 14 s -Options d'analyse- Mémoire: Activé Démarrage: Activé Système de fichiers: Activé Archives: Activé Rootkits: Activé Heuristique: Activé PUP: Détection PUM: Détection -Détails de l'analyse- Processus: 0 (Aucun élément malveillant détecté) Module: 0 (Aucun élément malveillant détecté) Clé du registre: 5 PUP.Optional.WinYahoo.TskLnk, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{DDE53525-8D65-E4A5-3CE5-9425EC6547A5}, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{3BAFD36F-6B2F-02EF-DAAF-726F0A2FA1EF}, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\{3DC2E85B-AEFB-B94D-4C0F-1FEE34E9D47E}\ProductUpdt, En quarantaine, [223], [518233],1.0.10002 PUP.Optional.WinYahoo.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{EBAD97A7-07E2-4980-A581-873CE971473E}, En quarantaine, [223], [518233],1.0.10002 PUP.Optional.WinYahoo.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\PLAIN\{EBAD97A7-07E2-4980-A581-873CE971473E}, En quarantaine, [223], [518233],1.0.10002 Valeur du registre: 1 Adware.SearchEngineHijack, HKU\S-1-5-21-340761944-3365309594-107435806-1000\SOFTWARE\GOOGLE\CHROME\PREFERENCEMACS\Default\extensions.settings|pdpcpceofkopegffcdnffeenbfdldock, En quarantaine, [357], [462944],1.0.10002 Données du registre: 0 (Aucun élément malveillant détecté) Flux de données: 0 (Aucun élément malveillant détecté) Dossier: 4 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\USERS\POL\APPDATA\LOCAL\{69705F2C-4DD8-3394-2040-167C0428EAE4}, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\USERS\POL\APPDATA\LOCAL\{DACBEC97-FE63-802F-93FB-A5C7B793595F}, En quarantaine, [771], [542290],1.0.10002 Fichier: 49 PUP.Optional.WinYahoo.TskLnk, C:\USERS\POL\APPDATA\LOCAL\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HOWTOREMOVE\HOWTOREMOVE.HTML, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove\chromium-min.jpg, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove\control panel-min-min.JPG, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove\down.png, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove\ff menu.JPG, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove\ff search engine-min.png, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove\hp-min ff.png, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove\hp-min ie.png, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove\search engine.gif, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove\setup pages.gif, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove\sp-min.png, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove\start-min.jpg, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\HowToRemove\up.png, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\ladedaf, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\tilare, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\uninst.exe, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{69705F2C-4DD8-3394-2040-167C0428EAE4}\uninstp.dat, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\USERS\POL\APPDATA\LOCAL\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HOWTOREMOVE\HOWTOREMOVE.HTML, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove\chromium-min.jpg, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove\control panel-min-min.JPG, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove\down.png, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove\ff menu.JPG, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove\ff search engine-min.png, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove\hp-min ff.png, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove\hp-min ie.png, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove\search engine.gif, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove\setup pages.gif, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove\sp-min.png, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove\start-min.jpg, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\HowToRemove\up.png, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\seconodit, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.TskLnk, C:\Users\pol\AppData\Local\{DACBEC97-FE63-802F-93FB-A5C7B793595F}\uninst.exe, En quarantaine, [771], [542290],1.0.10002 PUP.Optional.WinYahoo.Generic, C:\WINDOWS\SYSTEM32\TASKS\{3DC2E85B-AEFB-B94D-4C0F-1FEE34E9D47E}\ProductUpdt, En quarantaine, [223], [518233],1.0.10002 RiskWare.GameHack, C:\PROGRAM FILES\THE LONG DARK\STEAM_API.DLL, En quarantaine, [7621], [305544],1.0.10002 PUP.Optional.ASK, D:\DOWNLOAD\2.6.1_MANYCAM_2.6.1.EXE, En quarantaine, [2], [383618],1.0.10002 PUP.Optional.DriverToolkit, D:\DOWNLOAD\DRIVERTOOLKITINSTALLER.EXE, En quarantaine, [998], [512879],1.0.10002 Generic.Malware/Suspicious, D:\DOWNLOAD\2.6.1_MANYCAM_2.6.1.EXE, En quarantaine, [0], [392686],1.0.10002 PUP.Optional.Reimage, D:\DOWNLOAD\REIMAGEREPAIR.EXE, En quarantaine, [340], [331559],1.0.10002 PUP.Optional.InstallCore, D:\DOWNLOAD\LA-LA-LAND-FRE-6949543.EXE, En quarantaine, [427], [389991],1.0.10002 PUP.Optional.InstallCore, D:\DOWNLOAD\CAMSTUDIO_2204425476.EXE, En quarantaine, [427], [390222],1.0.10002 PUP.Optional.Solvusoft, D:\DOWNLOAD\SETUP_DRIVERDOC_2018.EXE, En quarantaine, [2937], [331663],1.0.10002 PUP.Optional.ASK, D:\DOWNLOAD\3.0.80_MANYCAMSETUP-3.0.80.EXE, En quarantaine, [2], [577725],1.0.10002 Generic.Malware/Suspicious, D:\DOWNLOAD\3.0.80_MANYCAMSETUP-3.0.80.EXE, En quarantaine, [0], [392686],1.0.10002 PUP.Optional.DLLSuite, D:\DOWNLOAD\DLLSUITE_SETUP.EXE, En quarantaine, [4505], [396352],1.0.10002 Adware.SearchEngineHijack, C:\USERS\POL\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Remplacé, [357], [462944],1.0.10002 Adware.SearchEngineHijack, C:\USERS\POL\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Remplacé, [357], [462944],1.0.10002 PUP.Optional.InstallCore, D:\DOWNLOAD\YOUR FILE IS READY TO DOWNLOAD_3623780085.EXE, En quarantaine, [427], [571710],1.0.10002 Generic.Malware/Suspicious, D:\DOWNLOAD\CDBXP_SETUP_4.5.8.6795_X64.EXE, En quarantaine, [0], [392686],1.0.10002 PUP.Optional.SecuredSearch, C:\USERS\POL\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Remplacé, [234], [551753],1.0.10002 Secteur physique: 0 (Aucun élément malveillant détecté) WMI: 0 (Aucun élément malveillant détecté) (end)