Malwarebytes Anti-Malware
www.malwarebytes.org
Date de l'analyse: 20/03/2016
Heure de l'analyse: 18:11
Fichier journal: 123.txt
Administrateur: Oui
Version: 2.2.1.1043
Base de données de programmes malveillants: v2016.03.20.05
Base de données de rootkits: v2016.03.12.01
Licence: Gratuit
Protection contre les programmes malveillants: Désactivé
Protection contre les sites Web malveillants: Désactivé
Autoprotection: Désactivé
Système d'exploitation: Windows 10
Processeur: x64
Système de fichiers: NTFS
Utilisateur: Pikach
Type d'analyse: Analyse des menaces
Résultat: Terminé
Objets analysés: 633944
Temps écoulé: 1 h, 21 min, 17 s
Mémoire: Activé
Démarrage: Activé
Système de fichiers: Activé
Archives: Activé
Rootkits: Activé
Heuristique: Activé
PUP: Activé
PUM: Activé
Processus: 0
(Aucun élément malveillant détecté)
Modules: 0
(Aucun élément malveillant détecté)
Clés du Registre: 3
PUP.Optional.Crossrider.Gen, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{37999B93-5CC3-43D7-BD58-0438DFDA7F98}, En quarantaine, [6c991971009949ed1998b2df0df77a86],
PUP.Optional.Crossrider.Gen, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{7378073E-26DF-4CC2-820E-C8E264502A1F}, En quarantaine, [b0550882c0d953e3d1e0d1c019eb1be5],
PUP.Optional.Crossrider.Gen, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\free ven-codedownloader, En quarantaine, [0df80e7cf5a40d29d2e0a4ed956fda26],
Valeurs du Registre: 2
PUP.Optional.Crossrider.Gen, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{37999B93-5CC3-43D7-BD58-0438DFDA7F98}|Path, \free ven-codedownloader, En quarantaine, [6c991971009949ed1998b2df0df77a86]
PUP.Optional.Crossrider.Gen, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{7378073E-26DF-4CC2-820E-C8E264502A1F}|Path, \Plus-HD-3.5-codedownloader, En quarantaine, [b0550882c0d953e3d1e0d1c019eb1be5]
Données du Registre: 0
(Aucun élément malveillant détecté)
Dossiers: 4
PUP.Optional.VBates, C:\Users\miguel family\AppData\LocalLow\Company\Product\1.0, En quarantaine, [6e9727634b4e69cde9e2f0569470b947],
PUP.Optional.VBates, C:\Users\miguel family\AppData\LocalLow\Company\Product, En quarantaine, [6e9727634b4e69cde9e2f0569470b947],
PUP.Optional.VBates, C:\Users\Pikach\AppData\LocalLow\Company\Product\1.0, En quarantaine, [c243e5a52376aa8cc7041b2bef157c84],
PUP.Optional.VBates, C:\Users\Pikach\AppData\LocalLow\Company\Product, En quarantaine, [c243e5a52376aa8cc7041b2bef157c84],
Fichiers: 29
Adware.PennyBee.WnskRST, C:\Users\Pikach\AppData\Roaming\UpicEpokne\Fitpep.din, En quarantaine, [06ff4446f7a27bbbfa6222eaa06207f9],
PUP.Optional.ConvertAd, C:\Windows\Temp\7FE7.tmp, En quarantaine, [b84d602ad4c54cea50bc657c9a6751af],
Adware.ConvertAd, C:\Windows\Temp\vns4850.tmp, En quarantaine, [b64f3951eaaf2214172cbe4460a2dc24],
Adware.ConvertAd, C:\Windows\Temp\vns7A13.tmp, En quarantaine, [6c9999f1f2a790a6b093818108fade22],
Adware.ConvertAd, C:\Windows\Temp\vnsB0F.tmp, En quarantaine, [26df7c0ec3d67fb74ef57989d131f40c],
Adware.ConvertAd, C:\Windows\Temp\vnsD354.tmp, En quarantaine, [56afa3e73b5e3204301343bf17ebee12],
PUP.Optional.ConvertAd, C:\Windows\Temp\DD47.tmp, En quarantaine, [e4213951316815217b91677ac43de21e],
PUP.Optional.ConvertAd, C:\Windows\Temp\8E0F.tmp, En quarantaine, [e025286296034beba4688f520bf6e11f],
Adware.PennyBee.WnskRST, C:\Windows\Temp\bobca\Awoxju.din, En quarantaine, [28dd2466bcddd2641844f9134fb30ef2],
Adware.PennyBee, C:\Windows\Temp\bobca\Seupg.exe, En quarantaine, [a164008aa8f164d2b4e2e718837e54ac],
PUP.Optional.ReMarkable, C:\Users\miguel family\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_static.re-markable00.re-markable.net_0.localstorage, En quarantaine, [41c4abdf30692d09f3ca84a4bb4954ac],
PUP.Optional.ReMarkable, C:\Users\miguel family\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_static.re-markable00.re-markable.net_0.localstorage-journal, En quarantaine, [7b8a3f4b584136006a5378b0b84ce719],
PUP.Optional.VBates, C:\Users\miguel family\AppData\LocalLow\Company\Product\1.0\localStorageIE.txt, En quarantaine, [6e9727634b4e69cde9e2f0569470b947],
PUP.Optional.VBates, C:\Users\miguel family\AppData\LocalLow\Company\Product\1.0\localStorageIE_backup.txt, En quarantaine, [6e9727634b4e69cde9e2f0569470b947],
PUP.Optional.VBates, C:\Users\Pikach\AppData\LocalLow\Company\Product\1.0\localStorageIE.txt, En quarantaine, [c243e5a52376aa8cc7041b2bef157c84],
PUP.Optional.VBates, C:\Users\Pikach\AppData\LocalLow\Company\Product\1.0\localStorageIE_backup.txt, En quarantaine, [c243e5a52376aa8cc7041b2bef157c84],
PUP.Optional.ShopperDealsWay, C:\Users\miguel family\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_shopper.deals-way.com_0.localstorage, En quarantaine, [17ee1476a7f2181e62f0c9b21fe57888],
PUP.Optional.ShopperDealsWay, C:\Users\miguel family\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_shopper.deals-way.com_0.localstorage-journal, En quarantaine, [2cd9028836632b0b39191b6016eec53b],
PUP.Optional.BestPriceNinja, C:\Users\miguel family\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_pstatic.bestpriceninja.com_0.localstorage, En quarantaine, [040149410a8f0b2b17afb7c5ca3a966a],
PUP.Optional.BestPriceNinja, C:\Users\miguel family\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_pstatic.bestpriceninja.com_0.localstorage-journal, En quarantaine, [f90ccfbb8e0bf93d3b8b90ec4aba9b65],
PUP.Optional.BestPriceNinja, C:\Users\miguel family\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_pstatic.bestpriceninja.com_0.localstorage, En quarantaine, [39cc48428d0c91a5b3136a127391c63a],
PUP.Optional.BestPriceNinja, C:\Users\miguel family\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_pstatic.bestpriceninja.com_0.localstorage-journal, En quarantaine, [996c503a3a5fe4529f27c8b40ff5f40c],
PUP.Optional.HDApp, C:\Users\miguel family\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_hdapp1008-a.akamaihd.net_0.localstorage, En quarantaine, [16effd8d5643f3430a0a3551ca3aeb15],
PUP.Optional.HDApp, C:\Users\miguel family\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_hdapp1008-a.akamaihd.net_0.localstorage-journal, En quarantaine, [ee17701a5247290db460266046bea55b],
PUP.Optional.ReMarkIt.PrxySvrRST, C:\Users\miguel family\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_static.re-markit00.re-markit.co_0.localstorage, En quarantaine, [35d084063267132300073f4bd43042be],
PUP.Optional.ReMarkIt.PrxySvrRST, C:\Users\miguel family\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_static.re-markit00.re-markit.co_0.localstorage-journal, En quarantaine, [17ee4f3b73261323f01799f1a65e49b7],
PUP.Optional.Yontoo, C:\Users\Pikach\AppData\Roaming\Mozilla\Firefox\Profiles\mvoq9eth.default-1391263204215\prefs.js, Bon : (), Mauvais : (user_pref("browser.startup.homepage", "
http://searchinterneat-a.akamaihd.net/h ... tdEkwdVUY=");), Remplacé,[30d528626138a5916aa59bb215f0bc44]
PUP.Optional.Yontoo, C:\Users\Pikach\AppData\Roaming\Mozilla\Firefox\Profiles\mvoq9eth.default-1391263204215\prefs.js, Bon : (user_pref("browser.startup.homepage", "
https://www.malwarebytes.org/restorebrowser/), Mauvais : (user_pref("browser.startup.homepage", "
http://searchinterneat-a.akamaihd.net/h ... tdEkwdVUY=");), Remplacé,[8184c3c72970989e16f0b59ac93c2fd1]
PUP.Optional.Yontoo, C:\Users\Pikach\AppData\Roaming\Mozilla\Firefox\Profiles\mvoq9eth.default-1391263204215\searchplugins\default.xml, En quarantaine, [0500ed9d3b5e32041c9da8a31aeb21df],
Secteurs physiques: 0
(Aucun élément malveillant détecté)
(end)