Malwarebytes Anti-Malware
www.malwarebytes.org
Date de l'analyse: 19/12/2015
Heure de l'analyse: 22:30
Fichier journal: Gab.txt
Administrateur: Oui
Version: 2.2.0.1024
Base de données de programmes malveillants: v2015.12.19.05
Base de données de rootkits: v2015.12.18.01
Licence: Essai
Protection contre les programmes malveillants: Activé
Protection contre les sites Web malveillants: Activé
Autoprotection: Désactivé
Système d'exploitation: Windows 10
Processeur: x64
Système de fichiers: NTFS
Utilisateur: Ludivine
Type d'analyse: Analyse des menaces
Résultat: Terminé
Objets analysés: 346520
Temps écoulé: 7 min, 40 s
Mémoire: Activé
Démarrage: Activé
Système de fichiers: Activé
Archives: Activé
Rootkits: Désactivé
Heuristique: Activé
PUP: Activé
PUM: Activé
Processus: 0
(Aucun élément malveillant détecté)
Modules: 0
(Aucun élément malveillant détecté)
Clés du Registre: 20
PUP.Optional.Cassiopessa, HKLM\SOFTWARE\CLASSES\APPID\{ef494946-9425-4a5c-b373-74ccd38e8c48}, En quarantaine, [e50c0e9815768fa777f42c34a85a27d9],
PUP.Optional.Cassiopessa, HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\{EF494946-9425-4A5C-B373-74CCD38E8C48}, En quarantaine, [e50c0e9815768fa777f42c34a85a27d9],
PUP.Optional.Cassiopessa, HKLM\SOFTWARE\CLASSES\WOW6432NODE\APPID\{EF494946-9425-4A5C-B373-74CCD38E8C48}, En quarantaine, [e50c0e9815768fa777f42c34a85a27d9],
PUP.Optional.CouponMarvel.AppFlsh, HKLM\SOFTWARE\{9E6892AE-EDB8-490A-9FDD-5A9770E7909E}, En quarantaine, [8869238378134bebaf4b25ddfc089a66],
PUP.Optional.Cassiopesa, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{9143e921-7c9a-4d27-ac43-eaccc78cc55a}, En quarantaine, [8f624363c3c8142229505ca9f50f41bf],
PUP.Optional.CouponMarvel.AppFlsh, HKLM\SOFTWARE\WOW6432NODE\{9E6892AE-EDB8-490A-9FDD-5A9770E7909E}, En quarantaine, [c62b80260883b97d1bdfa062f113c739],
PUP.Optional.Iminent, HKLM\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\nociobghckdhokecfeajdpimjeapnopn, En quarantaine, [23ce6244abe053e38b9aa7fb7b8834cc],
PUP.Optional.Sanbreel, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\{41ea8de0-bca4-439c-b5d4-b2beeacc692d}Gw64, En quarantaine, [ce2393139af17abc8b83d7dfd82b25db],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\.DEFAULT\SOFTWARE\MICROSOFT\INTERNET EXPLORER\INTERNETREGISTRY\REGISTRY\USER\S-1-5-18\SOFTWARE\shopperz121020152145, En quarantaine, [21d09a0c107b4fe7a5ba4dbe61a360a0],
PUP.Optional.MyBrowser, HKU\S-1-5-18\SOFTWARE\MyBrowser 1.0.2V12.09-nv-ie, En quarantaine, [975aa204dead88ae452b8428a55e2bd5],
PUP.Optional.MyBrowser, HKU\S-1-5-18\SOFTWARE\MyBrowser 1.0.2V12.10-nv, En quarantaine, [4ba63d696b203cfa422e0ca0af547789],
PUP.Optional.MyBrowser, HKU\S-1-5-18\SOFTWARE\MyBrowser 1.0.2V12.10-nv-ie, En quarantaine, [0ee3871f0487ec4ad19f2c8006fd738d],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-18\SOFTWARE\{26EAC7F8-E6D7-4F1C-8C2A-0FED71345448}, En quarantaine, [ac4506a08209a690bb4a681dbd4641bf],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-19\SOFTWARE\{26EAC7F8-E6D7-4F1C-8C2A-0FED71345448}, En quarantaine, [31c0693d39525dd9ef16bbca7e8554ac],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-20\SOFTWARE\{26EAC7F8-E6D7-4F1C-8C2A-0FED71345448}, En quarantaine, [d0215b4b5437e94d3acb275e1ee535cb],
PUP.Optional.WinYahoo, HKU\S-1-5-21-2650803905-1694018647-422597154-1001\SOFTWARE\wincy, En quarantaine, [9c55d0d64447b28469667f337f8313ed],
PUP.Optional.Iminent, HKU\S-1-5-21-2650803905-1694018647-422597154-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOWREGISTRY\Iminent, En quarantaine, [8d64fcaab0dbec4a1ffc148ecc378c74],
PUP.Optional.Cassiopesa, HKU\S-1-5-21-2650803905-1694018647-422597154-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{9143e921-7c9a-4d27-ac43-eaccc78cc55a}, En quarantaine, [7b762e783259e551bb2d32d32fd520e0],
PUP.Optional.WinYahoo, HKU\S-1-5-21-2650803905-1694018647-422597154-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0633EE93-D776-472F-A0FF-E1416B8B2E3A}, En quarantaine, [4ea37135c5c673c327eb79920bf958a8],
PUP.Optional.CrossRider, HKU\S-1-5-21-2650803905-1694018647-422597154-1001_Classes\LOCAL SETTINGS\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APPCONTAINER\STORAGE\WINDOWS_IE_AC_001\SOFTWARE\_CrossriderRegNamePlaceHolder_, En quarantaine, [9b56f8ae3259b18575bc85299c6612ee],
Valeurs du Registre: 14
PUP.Optional.CrossBrowse, HKLM\SOFTWARE\CLASSES\.XHTML\OPENWITHPROGIDS|CRSBRWSHTML, En quarantaine, [f0012383d8b361d5ade68d6d8083b24e],
PUP.Optional.CrossBrowse, HKLM\SOFTWARE\CLASSES\WOW6432NODE\.XHTML\OPENWITHPROGIDS|CRSBRWSHTML, En quarantaine, [a1500e9815763501b6dd3fbbee1554ac],
PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\MOZILLA\FIREFOX\EXTENSIONS|{F8AAA60C-8752-4BE9-8A65-447C1F308F5A}, C:\Program Files\shopperz121020152145\Firefox, En quarantaine, [37baa600a7e486b041df384deb1858a8]
PUP.Optional.CrossBrowse, HKLM\SOFTWARE\WOW6432NODE\CLASSES\.XHTML\OPENWITHPROGIDS|CRSBRWSHTML, En quarantaine, [b43d30765a313ef8c4cf39c1af5437c9],
PUP.Optional.CrossBrowse, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS, Crossbrowse, En quarantaine, [7a771591008bc86e1e9aa2f08182867a]
PUP.Optional.CrossBrowse, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS|StubPath, "C:\Program Files (x86)\Crossbrowse\Crossbrowse\Application\39.6.2171.95\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level, En quarantaine, [5c95e9bdb2d962d4ad0bd0c261a21ee2]
PUP.Optional.CrossBrowse, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS|Localized Name, Crossbrowse, En quarantaine, [3fb231754744e452bdfb7e14f40f629e]
PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\MOZILLA\FIREFOX\EXTENSIONS|{F8AAA60C-8752-4BE9-8A65-447C1F308F5A}, C:\Program Files\shopperz121020152145\Firefox, En quarantaine, [29c85650bfcc72c4e739186d38cb7c84]
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-18\SOFTWARE\{26EAC7F8-E6D7-4F1C-8C2A-0FED71345448}|Name, C:\Program Files\shopperz121020152145\Zaheri.exe, En quarantaine, [ac4506a08209a690bb4a681dbd4641bf]
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-19\SOFTWARE\{26EAC7F8-E6D7-4F1C-8C2A-0FED71345448}|Name, C:\Program Files\shopperz121020152145\Zaheri.exe, En quarantaine, [31c0693d39525dd9ef16bbca7e8554ac]
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-20\SOFTWARE\{26EAC7F8-E6D7-4F1C-8C2A-0FED71345448}|Name, C:\Program Files\shopperz121020152145\Zaheri.exe, En quarantaine, [d0215b4b5437e94d3acb275e1ee535cb]
PUP.Optional.WebBar, HKU\S-1-5-21-2650803905-1694018647-422597154-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION|wb.exe, 11000, En quarantaine, [876aa105e6a52b0bd8541af01ee602fe]
PUP.Optional.WinYahoo, HKU\S-1-5-21-2650803905-1694018647-422597154-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}|URL,
https://fr.search.yahoo.com/yhs/search? ... DWindowsEn quarantaineB10En quarantaineBHome&p={searchTerms}, %4, %5
PUP.Optional.WinYahoo, HKU\S-1-5-21-2650803905-1694018647-422597154-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}|TopResultURLFallback,
https://fr.search.yahoo.com/yhs/search? ... DWindowsEn quarantaineB10En quarantaineBHome&p={searchTerms}, %4, %5
Données du Registre: 0
(Aucun élément malveillant détecté)
Dossiers: 7
PUP.Optional.WebBar, C:\Windows\System32\config\systemprofile\AppData\Local\WebBar, En quarantaine, [e0115650464592a439bae0e40af9c63a],
PUP.Optional.VBates, C:\Users\Ludivine\AppData\LocalLow\Company\Product\1.0, En quarantaine, [d0215e484f3cce6816f0e8ebd92a7090],
PUP.Optional.VBates, C:\Users\Ludivine\AppData\LocalLow\Company\Product, En quarantaine, [d0215e484f3cce6816f0e8ebd92a7090],
PUP.Optional.Revizer.PrxySvrRST, C:\Users\Ludivine\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\inmpieponfdjfekdfdfgmhamccfddpfb, En quarantaine, [8b66ffa7b1dad95dc30bbbed936f36ca],
PUP.Optional.VBates.WnskRST, C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}, En quarantaine, [df126e384d3ecd69a2a706a4738f9e62],
PUP.Optional.VBates.WnskRST, C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}, En quarantaine, [df126e384d3ecd69a2a706a4738f9e62],
PUP.Optional.VBates.WnskRST, C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}\1.5, En quarantaine, [df126e384d3ecd69a2a706a4738f9e62],
Fichiers: 27
Adware.PullUpdate, C:\ProgramData\Vawaeiicoou\1.0.5.1\rucrauco.exe, En quarantaine, [d31e4264c2c9ae88d092e346847dd32d],
PUP.Optional.Shopperz.BrwsrFlsh, C:\Users\Ludivine\AppData\Roaming\ZHP\Quarantine\bsdriver.sys.VIR, En quarantaine, [c130abfb86052016f00982295ea60ef2],
PUP.Optional.InstallCore, C:\Users\Ludivine\AppData\Roaming\ZHP\Quarantine\0U1E1Q1T2Z1P0S2Z1T1C.DIR\Iminent Packages\uninstaller.exe, En quarantaine, [b938eabcb6d53303eee06ac511f01fe1],
PUP.Optional.EoRezo, C:\Users\Ludivine\AppData\Roaming\ZHP\Quarantine\dply_en_004040083.DIR\updply_en_004040083.exe, En quarantaine, [da172086c6c5ff379b6253587b89b947],
PUP.Optional.Winsock.WnskRST, C:\Windows\System32\Uynamfeehk64.dll, En quarantaine, [19d8188e26653afc63469ac4f20f43bd],
PUP.Optional.Winsock.WnskRST, C:\Windows\SysWOW64\Uynamfeehk.dll, En quarantaine, [b43db2f46b2096a03474d08ebf4236ca],
Rootkit.Komodia.PUA, C:\Windows\System32\drivers\bsdriver.sys, Supprimer au redémarrage, [37ba8e189fecfa3c20e012a0c73a7a86],
PUP.Optional.Shopperz.BrwsrFlsh, C:\Windows\System32\drivers\cherimoya.sys, Supprimer au redémarrage, [767b287e414a7eb80bee8b20ba4afe02],
PUP.Optional.SoftPulse, C:\Users\Ludivine\Downloads\google chrome (1).exe, En quarantaine, [48a901a542495ed8da73e7692bd64cb4],
PUP.Optional.Iminent, C:\Users\Ludivine\Downloads\IminentSetup%7B1.Ecill76.10%7D.exe, En quarantaine, [c32e2284860573c3e4a6c86746bb48b8],
PUP.Optional.AnyProtect, C:\Users\Ludivine\AppData\Local\nsc4E97.tmp, En quarantaine, [dc156b3b91fa1e187a5a2bd82ed4639d],
Rootkit.Agent.A, C:\Windows\System32\drivers\cherimoya.sys, Supprimer au redémarrage, [00f13f67a6e5b97d1b47fbbc020036ca],
PUP.Optional.WebBar, C:\Windows\System32\config\systemprofile\AppData\Local\WebBar\wb.log, En quarantaine, [e0115650464592a439bae0e40af9c63a],
PUP.Optional.Cassiopesa, C:\Users\Ludivine\AppData\LocalLow\Microsoft\Internet Explorer\Services\Tny_Cassiopesa.ico, En quarantaine, [d8192a7c22698aac3bbc725e91728c74],
PUP.Optional.WinYahoo, C:\Users\Ludivine\AppData\LocalLow\Microsoft\Internet Explorer\Services\Wincy.ico, En quarantaine, [965b3d694744de5872df854d38cba15f],
PUP.Optional.VBates, C:\Users\Ludivine\AppData\LocalLow\Company\Product\1.0\localStorageIE.txt, En quarantaine, [d0215e484f3cce6816f0e8ebd92a7090],
PUP.Optional.VBates, C:\Users\Ludivine\AppData\LocalLow\Company\Product\1.0\localStorageIE_backup.txt, En quarantaine, [d0215e484f3cce6816f0e8ebd92a7090],
PUP.Optional.Iminent, C:\Users\Ludivine\AppData\Local\Chrome .lnk, En quarantaine, [07ead6d0652637ffffc228d6b44f59a7],
PUP.Optional.Iminent, C:\Users\Ludivine\AppData\Local\Firefox .lnk, En quarantaine, [d41defb7dfac2f07635f1ce28182dc24],
PUP.Optional.Iminent, C:\Users\Ludivine\AppData\Local\Iexplore .lnk, En quarantaine, [fef3dbcb6b20de583e850bf391724eb2],
PUP.Optional.Revizer.PrxySvrRST, C:\Users\Ludivine\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\inmpieponfdjfekdfdfgmhamccfddpfb\000003.log, En quarantaine, [8b66ffa7b1dad95dc30bbbed936f36ca],
PUP.Optional.Revizer.PrxySvrRST, C:\Users\Ludivine\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\inmpieponfdjfekdfdfgmhamccfddpfb\CURRENT, En quarantaine, [8b66ffa7b1dad95dc30bbbed936f36ca],
PUP.Optional.Revizer.PrxySvrRST, C:\Users\Ludivine\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\inmpieponfdjfekdfdfgmhamccfddpfb\LOCK, En quarantaine, [8b66ffa7b1dad95dc30bbbed936f36ca],
PUP.Optional.Revizer.PrxySvrRST, C:\Users\Ludivine\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\inmpieponfdjfekdfdfgmhamccfddpfb\LOG, En quarantaine, [8b66ffa7b1dad95dc30bbbed936f36ca],
PUP.Optional.Revizer.PrxySvrRST, C:\Users\Ludivine\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\inmpieponfdjfekdfdfgmhamccfddpfb\MANIFEST-000001, En quarantaine, [8b66ffa7b1dad95dc30bbbed936f36ca],
PUP.Optional.VBates.WnskRST, C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}\1.5\config.js, En quarantaine, [df126e384d3ecd69a2a706a4738f9e62],
PUP.Optional.StartWeb, C:\Users\Ludivine\AppData\Roaming\Mozilla\Firefox\Profiles\20ppjfd5.default\prefs.js, Bon : (), Mauvais : (user_pref("browser.search.selectedEngine", "StartWeb");), Remplacé,[ed0405a16328e4523bf4515fd331758b]
Secteurs physiques: 0
(Aucun élément malveillant détecté)
(end)