Malwarebytes www.malwarebytes.com -Détails du journal- Date de l'analyse: 10/08/2019 Heure de l'analyse: 18:10 Fichier journal: 52e34af4-bb89-11e9-8a8c-309c23870a4c.json -Informations du logiciel- Version: 3.8.3.2965 Version de composants: 1.0.613 Version de pack de mise à jour: 1.0.11950 Licence: Essai -Informations système- Système d'exploitation: Windows 7 Service Pack 1 Processeur: x64 Système de fichiers: NTFS Utilisateur: Rocco-PC\Rocco -Résumé de l'analyse- Type d'analyse: Analyse des menaces Analyse lancée par: Manuel Résultat: Terminé Objets analysés: 211054 Menaces détectées: 56 Menaces mises en quarantaine: 56 Temps écoulé: 2 min, 4 s -Options d'analyse- Mémoire: Activé Démarrage: Activé Système de fichiers: Activé Archives: Activé Rootkits: Désactivé Heuristique: Activé PUP: Détection PUM: Détection -Détails de l'analyse- Processus: 0 (Aucun élément malveillant détecté) Module: 0 (Aucun élément malveillant détecté) Clé du registre: 13 PUP.Optional.DNSUnlocker.ACMB2, HKLM\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CERTIFICATES\26D9E607FFF0C58C7844B47FF8B6E079E5A2220E, En quarantaine, [2939], [260247],1.0.11950 Adware.NetAdapter, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\NATIVEDESKTOPMEDIASERVICE, En quarantaine, [1046], [683133],1.0.11950 PUP.Optional.DNSUnlocker.ACMB2, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CERTIFICATES\26D9E607FFF0C58C7844B47FF8B6E079E5A2220E, En quarantaine, [2939], [260247],1.0.11950 PUP.Optional.PCVARK, HKLM\SOFTWARE\XSC-PR, En quarantaine, [470], [698879],1.0.11950 Adware.NetAdapter, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\{46E0ADA6-D301-4001-984D-5706118EE793}, En quarantaine, [1046], [683129],1.0.11950 Adware.NetAdapter, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{72292C5B-CB59-47C2-9576-055E5FBCB81E}, En quarantaine, [1046], [683129],1.0.11950 Adware.NetAdapter, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\PLAIN\{72292C5B-CB59-47C2-9576-055E5FBCB81E}, En quarantaine, [1046], [683129],1.0.11950 Adware.Adposhel.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\F12CE300-AC2B-F7EB-001D-8AF80C4F59D6, En quarantaine, [3750], [701906],1.0.11950 Adware.Adposhel.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{2F21850E-06F3-4EDE-AEA9-48312A1F3726}, En quarantaine, [3750], [701906],1.0.11950 Adware.Adposhel.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\LOGON\{2F21850E-06F3-4EDE-AEA9-48312A1F3726}, En quarantaine, [3750], [701906],1.0.11950 Adware.NetAdapter, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\{067E1A8D-4D45-47C0-A2DB-BE66DB28F7B2}, En quarantaine, [1046], [683129],1.0.11950 Adware.NetAdapter, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{7FA9CA06-C8FC-4FFB-B12E-A91605EE17AE}, En quarantaine, [1046], [683129],1.0.11950 Adware.NetAdapter, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\PLAIN\{7FA9CA06-C8FC-4FFB-B12E-A91605EE17AE}, En quarantaine, [1046], [683129],1.0.11950 Valeur du registre: 3 Adware.NetAdapter, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\NATIVEDESKTOPMEDIASERVICE|IMAGEPATH, En quarantaine, [1046], [683133],1.0.11950 PUP.Optional.PCVARK, HKLM\SOFTWARE\XSC-PR|UTM_CAMPAIGN, En quarantaine, [470], [698879],1.0.11950 Adware.NetAdapter, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{841941BC-55A5-4C82-BBEE-4DD04707D10D}, En quarantaine, [1046], [683134],1.0.11950 Données du registre: 4 PUP.Optional.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS|NameServer, Remplacé, [2939], [-1],0.0.0 PUP.Optional.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS|DhcpNameServer, Remplacé, [2939], [-1],0.0.0 PUP.Optional.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{E7654347-C232-47A0-819F-B624314E1D14}|NameServer, Remplacé, [2939], [-1],0.0.0 PUP.Optional.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{E7654347-C232-47A0-819F-B624314E1D14}|DhcpNameServer, Remplacé, [2939], [-1],0.0.0 Flux de données: 0 (Aucun élément malveillant détecté) Dossier: 10 Adware.Csdimonetize.E, C:\PROGRAM FILES\DriversCloud.com\8W4RBAAP, En quarantaine, [5096], [650310],1.0.11950 Spyware.StolenData.E, C:\ProgramData\YRXRV91XTC9BS31XLKUE8KWTN\files\Wallets\ElectronCash, En quarantaine, [821], [697276],1.0.11950 Spyware.StolenData.E, C:\ProgramData\YRXRV91XTC9BS31XLKUE8KWTN\files\Wallets\ElectrumLTC, En quarantaine, [821], [697276],1.0.11950 Spyware.StolenData.E, C:\ProgramData\YRXRV91XTC9BS31XLKUE8KWTN\files\Wallets\MultiDoge, En quarantaine, [821], [697276],1.0.11950 Spyware.StolenData.E, C:\ProgramData\YRXRV91XTC9BS31XLKUE8KWTN\files\Wallets\Electrum, En quarantaine, [821], [697276],1.0.11950 Spyware.StolenData.E, C:\ProgramData\YRXRV91XTC9BS31XLKUE8KWTN\files\Wallets\Ethereum, En quarantaine, [821], [697276],1.0.11950 Spyware.StolenData.E, C:\ProgramData\YRXRV91XTC9BS31XLKUE8KWTN\files\Wallets\Exodus, En quarantaine, [821], [697276],1.0.11950 Spyware.StolenData.E, C:\ProgramData\YRXRV91XTC9BS31XLKUE8KWTN\files\Wallets\JAXX, En quarantaine, [821], [697276],1.0.11950 Spyware.StolenData.E, C:\PROGRAMDATA\YRXRV91XTC9BS31XLKUE8KWTN\FILES\Wallets, En quarantaine, [821], [697276],1.0.11950 PUP.Optional.Linkury.Generic, C:\PROGRAMDATA\POLYGENS, En quarantaine, [210], [380106],1.0.11950 Fichier: 26 Adware.Linkury.Generic, C:\USERS\ROCCO\APPDATA\LOCAL\Doublelam.tst, En quarantaine, [3739], [404871],1.0.11950 Adware.Linkury.Generic, C:\USERS\ROCCO\APPDATA\LOCAL\Quadtop.tst, En quarantaine, [3739], [404871],1.0.11950 Adware.Linkury.Generic, C:\USERS\ROCCO\APPDATA\LOCAL\MAIN.DAT, En quarantaine, [3739], [442900],1.0.11950 Adware.Linkury.Generic, C:\USERS\ROCCO\APPDATA\LOCAL\NOAH.DAT, En quarantaine, [3739], [404865],1.0.11950 Adware.Linkury.Generic, C:\USERS\ROCCO\APPDATA\LOCAL\MD.XML, En quarantaine, [3739], [404866],1.0.11950 Adware.Linkury.Generic, C:\USERS\ROCCO\APPDATA\LOCAL\AGENT.DAT, En quarantaine, [3739], [404872],1.0.11950 Adware.Linkury, C:\USERS\ROCCO\APPDATA\LOCAL\installer.dat, En quarantaine, [390], [715618],1.0.11950 Trojan.Agent, C:\USERS\ROCCO\APPDATA\LOCAL\LOBBY.DAT, En quarantaine, [444], [712637],1.0.11950 Adware.Csdimonetize.E, C:\PROGRAM FILES\DriversCloud.com\8W4RBAAP\Kenessey.txt, En quarantaine, [5096], [650310],1.0.11950 Adware.Linkury.Generic, C:\USERS\ROCCO\APPDATA\LOCAL\SHA.DB, En quarantaine, [3739], [709581],1.0.11950 PUP.Optional.Linkury.Generic, C:\PROGRAMDATA\POLYGENS\FF.HP, En quarantaine, [210], [380106],1.0.11950 PUP.Optional.Linkury.Generic, C:\ProgramData\Polygens\ff.NT, En quarantaine, [210], [380106],1.0.11950 PUP.Optional.Linkury.Generic, C:\ProgramData\Polygens\snp.sc, En quarantaine, [210], [380106],1.0.11950 Adware.Linkury.Generic, C:\USERS\ROCCO\APPDATA\LOCAL\CONFIG.XML, En quarantaine, [3739], [404859],1.0.11950 Adware.Linkury.TskLnk, C:\USERS\ROCCO\APPDATA\LOCAL\INSTALLATIONCONFIGURATION.XML, En quarantaine, [14624], [444923],1.0.11950 Generic.Malware/Suspicious, C:\USERS\ROCCO\APPDATA\LOCAL\SUMZAP.BIN, En quarantaine, [0], [392686],1.0.11950 Adware.NetAdapter, C:\WINDOWS\SYSTEM32\TASKS\{46E0ADA6-D301-4001-984D-5706118EE793}, En quarantaine, [1046], [683129],1.0.11950 Adware.Adposhel.Generic, C:\WINDOWS\SYSTEM32\TASKS\F12CE300-AC2B-F7EB-001D-8AF80C4F59D6, En quarantaine, [3750], [701906],1.0.11950 Adware.NetAdapter, C:\WINDOWS\SYSTEM32\TASKS\{067E1A8D-4D45-47C0-A2DB-BE66DB28F7B2}, En quarantaine, [1046], [683129],1.0.11950 Adware.Adposhel, C:\USERS\ROCCO\APPDATA\ROAMING\ZHP\QUARANTINE\ZHPCLEANER\201209708567521713\DESKTOP_MEDIA_SERVICE.EXE, En quarantaine, [492], [702089],1.0.11950 Adware.Adposhel, C:\USERS\ROCCO\APPDATA\ROAMING\ZHP\QUARANTINE\ZHPCLEANER\5497973956236507068\WATCHDOG.EXE, En quarantaine, [492], [689623],1.0.11950 Adware.Adposhel, C:\USERS\ROCCO\APPDATA\ROAMING\ZHP\QUARANTINE\ZHPCLEANER\5497973956236507068\DESKTOP_MEDIA_SERVICE.EXE, En quarantaine, [492], [689760],1.0.11950 HackTool.WinActivator, C:\USERS\ROCCO\APPDATA\ROAMING\WINDOWS_ACTIVATOR\WINDOWS ACTIVATOR.EXE, En quarantaine, [7979], [352889],1.0.11950 Adware.Adposhel.TskLnk, C:\USERS\ROCCO\APPDATA\ROAMING\ZHP\QUARANTINE\ZHPCLEANER\201209708567521713\WATCHDOG.EXE, En quarantaine, [3751], [701818],1.0.11950 Adware.Zdengo, C:\WINDOWS\TEMP\NSJ6124.TMP\DALOHHURDIS.DLL, En quarantaine, [524], [676647],1.0.11950 Adware.Zdengo, C:\WINDOWS\TEMP\NSR1B00.TMP\DALOHHURDIS.DLL, En quarantaine, [524], [676647],1.0.11950 Secteur physique: 0 (Aucun élément malveillant détecté) WMI: 0 (Aucun élément malveillant détecté) (end)