cjoint

Publicité


Publicité

Format du document : text/plain

Prévisualisation

Malwarebytes
www.malwarebytes.com

-Détails du journal-
Date de l'analyse: 10/08/2019
Heure de l'analyse: 18:10
Fichier journal: 52e34af4-bb89-11e9-8a8c-309c23870a4c.json

-Informations du logiciel-
Version: 3.8.3.2965
Version de composants: 1.0.613
Version de pack de mise à jour: 1.0.11950
Licence: Essai

-Informations système-
Système d'exploitation: Windows 7 Service Pack 1
Processeur: x64
Système de fichiers: NTFS
Utilisateur: Rocco-PC\Rocco

-Résumé de l'analyse-
Type d'analyse: Analyse des menaces
Analyse lancée par: Manuel
Résultat: Terminé
Objets analysés: 211054
Menaces détectées: 56
Menaces mises en quarantaine: 56
Temps écoulé: 2 min, 4 s

-Options d'analyse-
Mémoire: Activé
Démarrage: Activé
Système de fichiers: Activé
Archives: Activé
Rootkits: Désactivé
Heuristique: Activé
PUP: Détection
PUM: Détection

-Détails de l'analyse-
Processus: 0
(Aucun élément malveillant détecté)

Module: 0
(Aucun élément malveillant détecté)

Clé du registre: 13
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CERTIFICATES\26D9E607FFF0C58C7844B47FF8B6E079E5A2220E, En quarantaine, [2939], [260247],1.0.11950
Adware.NetAdapter, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\NATIVEDESKTOPMEDIASERVICE, En quarantaine, [1046], [683133],1.0.11950
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CERTIFICATES\26D9E607FFF0C58C7844B47FF8B6E079E5A2220E, En quarantaine, [2939], [260247],1.0.11950
PUP.Optional.PCVARK, HKLM\SOFTWARE\XSC-PR, En quarantaine, [470], [698879],1.0.11950
Adware.NetAdapter, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\{46E0ADA6-D301-4001-984D-5706118EE793}, En quarantaine, [1046], [683129],1.0.11950
Adware.NetAdapter, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{72292C5B-CB59-47C2-9576-055E5FBCB81E}, En quarantaine, [1046], [683129],1.0.11950
Adware.NetAdapter, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\PLAIN\{72292C5B-CB59-47C2-9576-055E5FBCB81E}, En quarantaine, [1046], [683129],1.0.11950
Adware.Adposhel.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\F12CE300-AC2B-F7EB-001D-8AF80C4F59D6, En quarantaine, [3750], [701906],1.0.11950
Adware.Adposhel.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{2F21850E-06F3-4EDE-AEA9-48312A1F3726}, En quarantaine, [3750], [701906],1.0.11950
Adware.Adposhel.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\LOGON\{2F21850E-06F3-4EDE-AEA9-48312A1F3726}, En quarantaine, [3750], [701906],1.0.11950
Adware.NetAdapter, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\{067E1A8D-4D45-47C0-A2DB-BE66DB28F7B2}, En quarantaine, [1046], [683129],1.0.11950
Adware.NetAdapter, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{7FA9CA06-C8FC-4FFB-B12E-A91605EE17AE}, En quarantaine, [1046], [683129],1.0.11950
Adware.NetAdapter, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\PLAIN\{7FA9CA06-C8FC-4FFB-B12E-A91605EE17AE}, En quarantaine, [1046], [683129],1.0.11950

Valeur du registre: 3
Adware.NetAdapter, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\NATIVEDESKTOPMEDIASERVICE|IMAGEPATH, En quarantaine, [1046], [683133],1.0.11950
PUP.Optional.PCVARK, HKLM\SOFTWARE\XSC-PR|UTM_CAMPAIGN, En quarantaine, [470], [698879],1.0.11950
Adware.NetAdapter, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{841941BC-55A5-4C82-BBEE-4DD04707D10D}, En quarantaine, [1046], [683134],1.0.11950

Données du registre: 4
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS|NameServer, Remplacé, [2939], [-1],0.0.0
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS|DhcpNameServer, Remplacé, [2939], [-1],0.0.0
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{E7654347-C232-47A0-819F-B624314E1D14}|NameServer, Remplacé, [2939], [-1],0.0.0
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{E7654347-C232-47A0-819F-B624314E1D14}|DhcpNameServer, Remplacé, [2939], [-1],0.0.0

Flux de données: 0
(Aucun élément malveillant détecté)

Dossier: 10
Adware.Csdimonetize.E, C:\PROGRAM FILES\DriversCloud.com\8W4RBAAP, En quarantaine, [5096], [650310],1.0.11950
Spyware.StolenData.E, C:\ProgramData\YRXRV91XTC9BS31XLKUE8KWTN\files\Wallets\ElectronCash, En quarantaine, [821], [697276],1.0.11950
Spyware.StolenData.E, C:\ProgramData\YRXRV91XTC9BS31XLKUE8KWTN\files\Wallets\ElectrumLTC, En quarantaine, [821], [697276],1.0.11950
Spyware.StolenData.E, C:\ProgramData\YRXRV91XTC9BS31XLKUE8KWTN\files\Wallets\MultiDoge, En quarantaine, [821], [697276],1.0.11950
Spyware.StolenData.E, C:\ProgramData\YRXRV91XTC9BS31XLKUE8KWTN\files\Wallets\Electrum, En quarantaine, [821], [697276],1.0.11950
Spyware.StolenData.E, C:\ProgramData\YRXRV91XTC9BS31XLKUE8KWTN\files\Wallets\Ethereum, En quarantaine, [821], [697276],1.0.11950
Spyware.StolenData.E, C:\ProgramData\YRXRV91XTC9BS31XLKUE8KWTN\files\Wallets\Exodus, En quarantaine, [821], [697276],1.0.11950
Spyware.StolenData.E, C:\ProgramData\YRXRV91XTC9BS31XLKUE8KWTN\files\Wallets\JAXX, En quarantaine, [821], [697276],1.0.11950
Spyware.StolenData.E, C:\PROGRAMDATA\YRXRV91XTC9BS31XLKUE8KWTN\FILES\Wallets, En quarantaine, [821], [697276],1.0.11950
PUP.Optional.Linkury.Generic, C:\PROGRAMDATA\POLYGENS, En quarantaine, [210], [380106],1.0.11950

Fichier: 26
Adware.Linkury.Generic, C:\USERS\ROCCO\APPDATA\LOCAL\Doublelam.tst, En quarantaine, [3739], [404871],1.0.11950
Adware.Linkury.Generic, C:\USERS\ROCCO\APPDATA\LOCAL\Quadtop.tst, En quarantaine, [3739], [404871],1.0.11950
Adware.Linkury.Generic, C:\USERS\ROCCO\APPDATA\LOCAL\MAIN.DAT, En quarantaine, [3739], [442900],1.0.11950
Adware.Linkury.Generic, C:\USERS\ROCCO\APPDATA\LOCAL\NOAH.DAT, En quarantaine, [3739], [404865],1.0.11950
Adware.Linkury.Generic, C:\USERS\ROCCO\APPDATA\LOCAL\MD.XML, En quarantaine, [3739], [404866],1.0.11950
Adware.Linkury.Generic, C:\USERS\ROCCO\APPDATA\LOCAL\AGENT.DAT, En quarantaine, [3739], [404872],1.0.11950
Adware.Linkury, C:\USERS\ROCCO\APPDATA\LOCAL\installer.dat, En quarantaine, [390], [715618],1.0.11950
Trojan.Agent, C:\USERS\ROCCO\APPDATA\LOCAL\LOBBY.DAT, En quarantaine, [444], [712637],1.0.11950
Adware.Csdimonetize.E, C:\PROGRAM FILES\DriversCloud.com\8W4RBAAP\Kenessey.txt, En quarantaine, [5096], [650310],1.0.11950
Adware.Linkury.Generic, C:\USERS\ROCCO\APPDATA\LOCAL\SHA.DB, En quarantaine, [3739], [709581],1.0.11950
PUP.Optional.Linkury.Generic, C:\PROGRAMDATA\POLYGENS\FF.HP, En quarantaine, [210], [380106],1.0.11950
PUP.Optional.Linkury.Generic, C:\ProgramData\Polygens\ff.NT, En quarantaine, [210], [380106],1.0.11950
PUP.Optional.Linkury.Generic, C:\ProgramData\Polygens\snp.sc, En quarantaine, [210], [380106],1.0.11950
Adware.Linkury.Generic, C:\USERS\ROCCO\APPDATA\LOCAL\CONFIG.XML, En quarantaine, [3739], [404859],1.0.11950
Adware.Linkury.TskLnk, C:\USERS\ROCCO\APPDATA\LOCAL\INSTALLATIONCONFIGURATION.XML, En quarantaine, [14624], [444923],1.0.11950
Generic.Malware/Suspicious, C:\USERS\ROCCO\APPDATA\LOCAL\SUMZAP.BIN, En quarantaine, [0], [392686],1.0.11950
Adware.NetAdapter, C:\WINDOWS\SYSTEM32\TASKS\{46E0ADA6-D301-4001-984D-5706118EE793}, En quarantaine, [1046], [683129],1.0.11950
Adware.Adposhel.Generic, C:\WINDOWS\SYSTEM32\TASKS\F12CE300-AC2B-F7EB-001D-8AF80C4F59D6, En quarantaine, [3750], [701906],1.0.11950
Adware.NetAdapter, C:\WINDOWS\SYSTEM32\TASKS\{067E1A8D-4D45-47C0-A2DB-BE66DB28F7B2}, En quarantaine, [1046], [683129],1.0.11950
Adware.Adposhel, C:\USERS\ROCCO\APPDATA\ROAMING\ZHP\QUARANTINE\ZHPCLEANER\201209708567521713\DESKTOP_MEDIA_SERVICE.EXE, En quarantaine, [492], [702089],1.0.11950
Adware.Adposhel, C:\USERS\ROCCO\APPDATA\ROAMING\ZHP\QUARANTINE\ZHPCLEANER\5497973956236507068\WATCHDOG.EXE, En quarantaine, [492], [689623],1.0.11950
Adware.Adposhel, C:\USERS\ROCCO\APPDATA\ROAMING\ZHP\QUARANTINE\ZHPCLEANER\5497973956236507068\DESKTOP_MEDIA_SERVICE.EXE, En quarantaine, [492], [689760],1.0.11950
HackTool.WinActivator, C:\USERS\ROCCO\APPDATA\ROAMING\WINDOWS_ACTIVATOR\WINDOWS ACTIVATOR.EXE, En quarantaine, [7979], [352889],1.0.11950
Adware.Adposhel.TskLnk, C:\USERS\ROCCO\APPDATA\ROAMING\ZHP\QUARANTINE\ZHPCLEANER\201209708567521713\WATCHDOG.EXE, En quarantaine, [3751], [701818],1.0.11950
Adware.Zdengo, C:\WINDOWS\TEMP\NSJ6124.TMP\DALOHHURDIS.DLL, En quarantaine, [524], [676647],1.0.11950
Adware.Zdengo, C:\WINDOWS\TEMP\NSR1B00.TMP\DALOHHURDIS.DLL, En quarantaine, [524], [676647],1.0.11950

Secteur physique: 0
(Aucun élément malveillant détecté)

WMI: 0
(Aucun élément malveillant détecté)


(end)

Publicité


Signaler le contenu de ce document

Publicité