cjoint

Publicité


Publicité

Format du document : text/plain

Prévisualisation

Malwarebytes Anti-Malware
www.malwarebytes.org

Date de l'examen: 29/04/2015
Heure de l'examen: 17:16:16
Fichier journal: ml2.txt
Administrateur: Oui

Version: 2.01.6.1022
Base de donn�es Malveillants: v2015.04.29.04
Base de donn�es Rootkits: v2015.04.21.01
Licence: Premium
Protection contre les malveillants: Activ�(e)
Protection contre les sites Web malveillants: Activ�(e)
Auto-protection: D�sactiv�(e)

Syst�me d'exploitation: Windows XP Service Pack 2
Processeur: x86
Syst�me de fichiers: NTFS
Utilisateur: ayoub

Type d'examen: Examen "Menaces"
R�sultat: Termin�
Objets analys�s: 292377
Temps �coul�: 18 min, 41 sec

M�moire: Activ�(e)
D�marrage: Activ�(e)
Syst�me de fichiers: Activ�(e)
Archives: Activ�(e)
Rootkits: D�sactiv�(e)
Heuristique: Activ�(e)
PUP: Activ�(e)
PUM: Activ�(e)

Processus: 0
(Aucun �l�ment malicieux d�tect�)

Modules: 0
(Aucun �l�ment malicieux d�tect�)

Cl�s du Registre: 120
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\avp.com, Mis en quarantaine, [35231b5748421e18d36bb8ddc63ed828],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\IceSword.exe, Mis en quarantaine, [f86031413258ec4a3fc13760c440b24e],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KaScrScn.SCR, Mis en quarantaine, [213790e20f7b0f2712340691c242817f],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KRepair.COM, Mis en quarantaine, [76e2acc61d6d270f7cf5d7c04db77e82],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVCenter.kxp, Mis en quarantaine, [69efea88098179bdbbc0b9de6f950cf4],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVMonXP.kxp, Mis en quarantaine, [f6628fe34842d75f592884135aaada26],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVMonXP_1.kxp, Mis en quarantaine, [3226c5adc6c42511a9d9395ee71d649c],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KvReport.kxp, Mis en quarantaine, [94c4d59d16748da975117423e3217789],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVScan.kxp, Mis en quarantaine, [1c3c94de5a30b581a7e0098e4aba60a0],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVStub.kxp, Mis en quarantaine, [97c1c2b043474aec4149c4d34cb8cd33],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KvXP.kxp, Mis en quarantaine, [26325022404aff372f5fdbbc9371bb45],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KvXP_1.kxp, Mis en quarantaine, [4612a9c99af0c96d0689eaadd034c838],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\TrojDie.kxp, Mis en quarantaine, [82d6f181662467cf4d65d0ca659f2ad6],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360HOTFIX.EXE, Mis en quarantaine, [144481f1beccad89c52540fcc63e0cf4],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360RPT.EXE, Mis en quarantaine, [d484a4ce23673ff78367b6860bf94eb2],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360SAFE.EXE, Mis en quarantaine, [d8804e24f496ec4af0fa94a8a262ce32],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360SAFEBOX.EXE, Mis en quarantaine, [d385da982763cf671eccd26ae61eb34d],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360TRAY.EXE, Mis en quarantaine, [32265c16e4a62016d515df5d1de7e61a],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\ADAM.EXE, Mis en quarantaine, [79dfc9a9f59515214c0bb7dd4aba0ff1],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\ANTIARP.EXE, Mis en quarantaine, [de7acca6c4c6ee4895f3eca8b4508d73],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\APPSVC32.EXE, Mis en quarantaine, [5701df93eaa014220f94583c15efee12],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\ARVMON.EXE, Mis en quarantaine, [96c26a08c5c53402ab08f3a1f60eb24e],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AUTOGUARDER.EXE, Mis en quarantaine, [b8a032407911cb6bf8e84c4836ced030],
Trojan.Agent, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AUTORUNS.EXE, Mis en quarantaine, [e375dd9541494ee84a9aeba9df2502fe],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVGRSSVC.EXE, Mis en quarantaine, [0c4c00722862fb3bc25071248183c33d],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVMONITOR.EXE, Mis en quarantaine, [61f7cea41278d36340fbe2b328dc6997],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CCENTER.EXE, Mis en quarantaine, [cc8cc5addbaf52e4f7c58015f50f44bc],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\FILEDSTY.EXE, Mis en quarantaine, [68f0f77beaa0a0963951c0d604005ea2],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\FINDT2005.EXE, Mis en quarantaine, [6deb640e43472412810c62343ec6f40c],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\FTCLEANERSHELL.EXE, Mis en quarantaine, [c593d2a04e3ced49dce9a0f6b153956b],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\IPARMO.EXE, Mis en quarantaine, [4b0da5cd01895adcc66601967193bf41],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\IPARMOR.EXE, Mis en quarantaine, [ef698de5d8b2979f8e9f1c7b0cf84fb1],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\ISHELP.EXE, Mis en quarantaine, [17416210d4b626107eb3efa8877db24e],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\ISPWDSVC.EXE, Mis en quarantaine, [3f19135ff2980d293bf7c2d57a8a60a0],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KABALOAD.EXE, Mis en quarantaine, [adab1a5846441e1846fbb0e752b202fe],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KASMAIN.EXE, Mis en quarantaine, [0751373be3a701350e398215c14327d9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KASTASK.EXE, Mis en quarantaine, [abadfe74ef9b3df97fca4750996bfc04],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KAV32.EXE, Mis en quarantaine, [f068640e3f4b84b267e64156897bc43c],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KAVDX.EXE, Mis en quarantaine, [bb9d135f404a979f262a4e499d67966a],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KAVPFW.EXE, Mis en quarantaine, [42168de5b9d190a69eb6a4f38d77728e],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KAVSETUP.EXE, Mis en quarantaine, [f365c6ac7713092d6bebeaad06fe827e],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KAVSTART.EXE, Mis en quarantaine, [253395dd404a73c399bea1f63cc8be42],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KILLHIDEPID.EXE, Mis en quarantaine, [d187185a9befc373164af2a5778d837d],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KISLNCHR.EXE, Mis en quarantaine, [d385c9a993f785b1a5be524553b158a8],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KMAILMON.EXE, Mis en quarantaine, [0f49d1a1701a8ea8de873f58e02429d7],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KMFILTER.EXE, Mis en quarantaine, [93c5bab87317cd69d6906a2d8f75de22],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KPFW32.EXE, Mis en quarantaine, [71e71959c7c339fdff6a128535cfdf21],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KPFW32X.EXE, Mis en quarantaine, [1345afc35139fd39d8921681b84c0ff1],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KPFWSVC.EXE, Mis en quarantaine, [1642a4ced3b7d36396d5c8cf1aead729],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KSLOADER.EXE, Mis en quarantaine, [2632e58d771378be7ff7a5f22adab14f],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVDETECT.EXE, Mis en quarantaine, [7ddb3e349ded082e1469dcbb07fd29d7],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVFW.EXE, Mis en quarantaine, [2e2a0171fc8e181e6c121e79ba4aef11],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVFWMCL.EXE, Mis en quarantaine, [59ffbcb6c0ca201617684c4b9a6a827e],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVOL.EXE, Mis en quarantaine, [d484363c761480b63d4641560df715eb],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVOLSELF.EXE, Mis en quarantaine, [e573bfb3226846f073116532a75d24dc],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVSRVXP.EXE, Mis en quarantaine, [3325caa8d7b35fd701877a1de420b44c],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVUPLOAD.EXE, Mis en quarantaine, [500881f1d4b6ca6cf8937c1b49bbfa06],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVWSC.EXE, Mis en quarantaine, [24345d15e0aa1d19b3d9811615efb44c],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KWATCH.EXE, Mis en quarantaine, [3226f57d3a50171ffa96dfb826de817f],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KWATCH9X.EXE, Mis en quarantaine, [95c3f2803f4bee488c05a7f0ba4a51af],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KWATCHX.EXE, Mis en quarantaine, [dd7b22506d1d74c2276c0b8cd62e11ef],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\LIVEUPDATE360.EXE, Mis en quarantaine, [a9af75fd49410135f8b1ddba8282df21],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\LOADDLL.EXE, Mis en quarantaine, [be9a81f15c2e42f43378ecabf212b24e],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MAGICSET.EXE, Mis en quarantaine, [5602f67c9dedba7c04baf4a320e47888],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MCCONSOL.EXE, Mis en quarantaine, [bb9df082f397fe383299395ee321d52b],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MMQCZJ.EXE, Mis en quarantaine, [9bbd92e0cac084b2f1078d0a8f756e92],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MMSK.EXE, Mis en quarantaine, [ec6c1e546723fd39c5341c7b0cf89f61],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\NAVSETUP.EXE, Mis en quarantaine, [094f5919642654e26fe15c3cc83c4ab6],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\NOD32KRN.EXE, Mis en quarantaine, [5bfd86ece6a471c5a5d0574131d3eb15],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\NOD32KUI.EXE, Mis en quarantaine, [4c0c046e0a8023136115593f18ec19e7],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\PFW.EXE, Mis en quarantaine, [c1976a084149ee484ec6316802021ce4],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\PFWLIVEUPDATE.EXE, Mis en quarantaine, [62f6aac8bad084b2b3653663e22202fe],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\QHSET.EXE, Mis en quarantaine, [59ff343e4743ec4afc618217996bf709],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAS.EXE, Mis en quarantaine, [6fe9036f1f6b6bcb9fd3594039cbd828],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAV.EXE, Mis en quarantaine, [a7b1ff73aae0e6509bd8a8f10ff5c040],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAVCOPY.EXE, Mis en quarantaine, [3127452d1773b87e9cdb306963a126da],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAVMON.EXE, Mis en quarantaine, [81d77002b4d680b6fb7d22777a8af50b],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAVMOND.EXE, Mis en quarantaine, [3622ff73adddd0662c4d1c7dbd47b64a],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAVSTORE.EXE, Mis en quarantaine, [85d3c5ad8307fc3af685afea29db57a9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAVSTUB.EXE, Mis en quarantaine, [59ff77fb6426d75fc8b41a7f0004c53b],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAVT08.EXE, Mis en quarantaine, [bd9b1c56464494a2bcc15e3b679d8f71],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAVTASK.EXE, Mis en quarantaine, [71e7383a5d2d51e5ccb25346818309f7],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\REGCLEAN.EXE, Mis en quarantaine, [3721244ec3c78caa8702abee4db7649c],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\REGEX.EXE, Mis en quarantaine, [83d5ed85ec9e3cfa5b334158aa5a8d73],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RFWCFG.EXE, Mis en quarantaine, [c1971959b7d367cf10877b1e19eb12ee],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RFWMAIN.EXE, Mis en quarantaine, [2830165c266461d52b6d06932bd9cd33],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RFWOLUSR.EXE, Mis en quarantaine, [ca8ee78bdfab3ef88d0c0495ba4a946c],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RFWPROXY.EXE, Mis en quarantaine, [64f4b2c0008af343a9f14d4c996b57a9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RFWSRV.EXE, Mis en quarantaine, [0850531f543691a50b91f1a8fc081ee2],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RSAGENT.EXE, Mis en quarantaine, [83d5e38f197181b5a602d3c62ed621df],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RSAUPD.EXE, Mis en quarantaine, [cc8c0e64e8a261d5f5b4fa9fc242a15f],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RSMAIN.EXE, Mis en quarantaine, [2f29b7bb7e0ccf67eebfb8e1e024f60a],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RSNETSVR.EXE, Mis en quarantaine, [fe5add955a307fb7cee025749371f20e],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RSTRAY.EXE, Mis en quarantaine, [9dbbea881a708aac4c6412872ed658a8],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\runiep.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\safebank.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\safeboxTray.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\safelive.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\ScanFrm.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\shcfg32.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\smartassistant.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SmartUp.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SREng.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SREngPS.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\syscheck.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\Syscheck2.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SysSafe.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\ToolsUp.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\TrojanDetector.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\Trojanwall.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\UIHost.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\UmxAgent.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\UmxAttachment.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\UmxCfg.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\UmxFwHlp.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\UmxPol.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\UpLive.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WoptiClean.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\Your Image File Name Here without a path, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\zxsweep.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],

Valeurs du Registre: 106
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360hotfix.exe|Debugger, ntsd -d, Mis en quarantaine, [144481f1beccad89c52540fcc63e0cf4]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360rpt.exe|Debugger, ntsd -d, Mis en quarantaine, [d484a4ce23673ff78367b6860bf94eb2]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360Safe.exe|Debugger, ntsd -d, Mis en quarantaine, [d8804e24f496ec4af0fa94a8a262ce32]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360safebox.exe|Debugger, ntsd -d, Mis en quarantaine, [d385da982763cf671eccd26ae61eb34d]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360tray.exe|Debugger, ntsd -d, Mis en quarantaine, [32265c16e4a62016d515df5d1de7e61a]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\ADAM.EXE|Debugger, ntsd -d, Mis en quarantaine, [79dfc9a9f59515214c0bb7dd4aba0ff1]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\ANTIARP.EXE|Debugger, ntsd -d, Mis en quarantaine, [de7acca6c4c6ee4895f3eca8b4508d73]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\APPSVC32.EXE|Debugger, ntsd -d, Mis en quarantaine, [5701df93eaa014220f94583c15efee12]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\ARVMON.EXE|Debugger, ntsd -d, Mis en quarantaine, [96c26a08c5c53402ab08f3a1f60eb24e]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AUTOGUARDER.EXE|Debugger, ntsd -d, Mis en quarantaine, [b8a032407911cb6bf8e84c4836ced030]
Trojan.Agent, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AUTORUNS.EXE|Debugger, ntsd -d, Mis en quarantaine, [e375dd9541494ee84a9aeba9df2502fe]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVGRSSVC.EXE|Debugger, ntsd -d, Mis en quarantaine, [0c4c00722862fb3bc25071248183c33d]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVMONITOR.EXE|Debugger, ntsd -d, Mis en quarantaine, [61f7cea41278d36340fbe2b328dc6997]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CCENTER.EXE|Debugger, ntsd -d, Mis en quarantaine, [cc8cc5addbaf52e4f7c58015f50f44bc]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\FILEDSTY.EXE|Debugger, ntsd -d, Mis en quarantaine, [68f0f77beaa0a0963951c0d604005ea2]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\FINDT2005.EXE|Debugger, ntsd -d, Mis en quarantaine, [6deb640e43472412810c62343ec6f40c]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\FTCLEANERSHELL.EXE|Debugger, ntsd -d, Mis en quarantaine, [c593d2a04e3ced49dce9a0f6b153956b]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\IPARMO.EXE|Debugger, ntsd -d, Mis en quarantaine, [4b0da5cd01895adcc66601967193bf41]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\IPARMOR.EXE|Debugger, ntsd -d, Mis en quarantaine, [ef698de5d8b2979f8e9f1c7b0cf84fb1]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\ISHELP.EXE|Debugger, ntsd -d, Mis en quarantaine, [17416210d4b626107eb3efa8877db24e]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\ISPWDSVC.EXE|Debugger, ntsd -d, Mis en quarantaine, [3f19135ff2980d293bf7c2d57a8a60a0]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KABALOAD.EXE|Debugger, ntsd -d, Mis en quarantaine, [adab1a5846441e1846fbb0e752b202fe]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KASMAIN.EXE|Debugger, ntsd -d, Mis en quarantaine, [0751373be3a701350e398215c14327d9]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KASTASK.EXE|Debugger, ntsd -d, Mis en quarantaine, [abadfe74ef9b3df97fca4750996bfc04]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KAV32.EXE|Debugger, ntsd -d, Mis en quarantaine, [f068640e3f4b84b267e64156897bc43c]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KAVDX.EXE|Debugger, ntsd -d, Mis en quarantaine, [bb9d135f404a979f262a4e499d67966a]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KAVPFW.EXE|Debugger, ntsd -d, Mis en quarantaine, [42168de5b9d190a69eb6a4f38d77728e]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KAVSETUP.EXE|Debugger, ntsd -d, Mis en quarantaine, [f365c6ac7713092d6bebeaad06fe827e]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KAVSTART.EXE|Debugger, ntsd -d, Mis en quarantaine, [253395dd404a73c399bea1f63cc8be42]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KILLHIDEPID.EXE|Debugger, ntsd -d, Mis en quarantaine, [d187185a9befc373164af2a5778d837d]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KISLNCHR.EXE|Debugger, ntsd -d, Mis en quarantaine, [d385c9a993f785b1a5be524553b158a8]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KMAILMON.EXE|Debugger, ntsd -d, Mis en quarantaine, [0f49d1a1701a8ea8de873f58e02429d7]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KMFILTER.EXE|Debugger, ntsd -d, Mis en quarantaine, [93c5bab87317cd69d6906a2d8f75de22]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KPFW32.EXE|Debugger, ntsd -d, Mis en quarantaine, [71e71959c7c339fdff6a128535cfdf21]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KPFW32X.EXE|Debugger, ntsd -d, Mis en quarantaine, [1345afc35139fd39d8921681b84c0ff1]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KPFWSVC.EXE|Debugger, ntsd -d, Mis en quarantaine, [1642a4ced3b7d36396d5c8cf1aead729]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KSLOADER.EXE|Debugger, ntsd -d, Mis en quarantaine, [2632e58d771378be7ff7a5f22adab14f]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVDETECT.EXE|Debugger, ntsd -d, Mis en quarantaine, [7ddb3e349ded082e1469dcbb07fd29d7]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVFW.EXE|Debugger, ntsd -d, Mis en quarantaine, [2e2a0171fc8e181e6c121e79ba4aef11]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVFWMCL.EXE|Debugger, ntsd -d, Mis en quarantaine, [59ffbcb6c0ca201617684c4b9a6a827e]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVOL.EXE|Debugger, ntsd -d, Mis en quarantaine, [d484363c761480b63d4641560df715eb]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVOLSELF.EXE|Debugger, ntsd -d, Mis en quarantaine, [e573bfb3226846f073116532a75d24dc]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVSRVXP.EXE|Debugger, ntsd -d, Mis en quarantaine, [3325caa8d7b35fd701877a1de420b44c]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVUPLOAD.EXE|Debugger, ntsd -d, Mis en quarantaine, [500881f1d4b6ca6cf8937c1b49bbfa06]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVWSC.EXE|Debugger, ntsd -d, Mis en quarantaine, [24345d15e0aa1d19b3d9811615efb44c]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KWATCH.EXE|Debugger, ntsd -d, Mis en quarantaine, [3226f57d3a50171ffa96dfb826de817f]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KWATCH9X.EXE|Debugger, ntsd -d, Mis en quarantaine, [95c3f2803f4bee488c05a7f0ba4a51af]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KWATCHX.EXE|Debugger, ntsd -d, Mis en quarantaine, [dd7b22506d1d74c2276c0b8cd62e11ef]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\LIVEUPDATE360.EXE|Debugger, ntsd -d, Mis en quarantaine, [a9af75fd49410135f8b1ddba8282df21]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\LOADDLL.EXE|Debugger, ntsd -d, Mis en quarantaine, [be9a81f15c2e42f43378ecabf212b24e]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MAGICSET.EXE|Debugger, ntsd -d, Mis en quarantaine, [5602f67c9dedba7c04baf4a320e47888]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MCCONSOL.EXE|Debugger, ntsd -d, Mis en quarantaine, [bb9df082f397fe383299395ee321d52b]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MMQCZJ.EXE|Debugger, ntsd -d, Mis en quarantaine, [9bbd92e0cac084b2f1078d0a8f756e92]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MMSK.EXE|Debugger, ntsd -d, Mis en quarantaine, [ec6c1e546723fd39c5341c7b0cf89f61]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\NAVSETUP.EXE|Debugger, ntsd -d, Mis en quarantaine, [094f5919642654e26fe15c3cc83c4ab6]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\NOD32KRN.EXE|Debugger, ntsd -d, Mis en quarantaine, [5bfd86ece6a471c5a5d0574131d3eb15]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\NOD32KUI.EXE|Debugger, ntsd -d, Mis en quarantaine, [4c0c046e0a8023136115593f18ec19e7]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\PFW.EXE|Debugger, ntsd -d, Mis en quarantaine, [c1976a084149ee484ec6316802021ce4]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\PFWLIVEUPDATE.EXE|Debugger, ntsd -d, Mis en quarantaine, [62f6aac8bad084b2b3653663e22202fe]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\QHSET.EXE|Debugger, ntsd -d, Mis en quarantaine, [59ff343e4743ec4afc618217996bf709]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAS.EXE|Debugger, ntsd -d, Mis en quarantaine, [6fe9036f1f6b6bcb9fd3594039cbd828]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAV.EXE|Debugger, ntsd -d, Mis en quarantaine, [a7b1ff73aae0e6509bd8a8f10ff5c040]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAVCOPY.EXE|Debugger, ntsd -d, Mis en quarantaine, [3127452d1773b87e9cdb306963a126da]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAVMON.EXE|Debugger, ntsd -d, Mis en quarantaine, [81d77002b4d680b6fb7d22777a8af50b]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAVMOND.EXE|Debugger, ntsd -d, Mis en quarantaine, [3622ff73adddd0662c4d1c7dbd47b64a]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAVSTORE.EXE|Debugger, ntsd -d, Mis en quarantaine, [85d3c5ad8307fc3af685afea29db57a9]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAVSTUB.EXE|Debugger, ntsd -d, Mis en quarantaine, [59ff77fb6426d75fc8b41a7f0004c53b]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAVT08.EXE|Debugger, ntsd -d, Mis en quarantaine, [bd9b1c56464494a2bcc15e3b679d8f71]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAVTASK.EXE|Debugger, ntsd -d, Mis en quarantaine, [71e7383a5d2d51e5ccb25346818309f7]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\REGCLEAN.EXE|Debugger, ntsd -d, Mis en quarantaine, [3721244ec3c78caa8702abee4db7649c]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\REGEX.EXE|Debugger, ntsd -d, Mis en quarantaine, [83d5ed85ec9e3cfa5b334158aa5a8d73]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RFWCFG.EXE|Debugger, ntsd -d, Mis en quarantaine, [c1971959b7d367cf10877b1e19eb12ee]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RFWMAIN.EXE|Debugger, ntsd -d, Mis en quarantaine, [2830165c266461d52b6d06932bd9cd33]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RFWOLUSR.EXE|Debugger, ntsd -d, Mis en quarantaine, [ca8ee78bdfab3ef88d0c0495ba4a946c]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RFWPROXY.EXE|Debugger, ntsd -d, Mis en quarantaine, [64f4b2c0008af343a9f14d4c996b57a9]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RFWSRV.EXE|Debugger, ntsd -d, Mis en quarantaine, [0850531f543691a50b91f1a8fc081ee2]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RSAGENT.EXE|Debugger, ntsd -d, Mis en quarantaine, [83d5e38f197181b5a602d3c62ed621df]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RSAUPD.EXE|Debugger, ntsd -d, Mis en quarantaine, [cc8c0e64e8a261d5f5b4fa9fc242a15f]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RSMAIN.EXE|Debugger, ntsd -d, Mis en quarantaine, [2f29b7bb7e0ccf67eebfb8e1e024f60a]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RSNETSVR.EXE|Debugger, ntsd -d, Mis en quarantaine, [fe5add955a307fb7cee025749371f20e]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RSTRAY.EXE|Debugger, ntsd -d, Mis en quarantaine, [9dbbea881a708aac4c6412872ed658a8]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RUNIEP.EXE|Debugger, ntsd -d, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SAFEBANK.EXE|Debugger, ntsd -d, Mis en quarantaine, [0850373b4e3cbd79912c772225df0cf4]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SAFEBOXTRAY.EXE|Debugger, ntsd -d, Mis en quarantaine, [c2963a383d4d191d3589217811f3669a]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SAFELIVE.EXE|Debugger, ntsd -d, Mis en quarantaine, [f86051217a1041f559671c7d51b351af]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SCANFRM.EXE|Debugger, ntsd -d, Mis en quarantaine, [4117dd95850561d5be1583160ff5fe02]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SHCFG32.EXE|Debugger, ntsd -d, Mis en quarantaine, [2e2a9dd55832340211e9306925df38c8]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SMARTASSISTANT.EXE|Debugger, ntsd -d, Mis en quarantaine, [97c12f431773f73ff015831708fcd52b]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SMARTUP.EXE|Debugger, ntsd -d, Mis en quarantaine, [2d2b6b07c8c283b3cd3b6f2b8e7617e9]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SRENG.EXE|Debugger, ntsd -d, Mis en quarantaine, [6eeaacc6434737ff3cf012880df77888]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SRENGPS.EXE|Debugger, ntsd -d, Mis en quarantaine, [bb9dfe74c4c6fc3a0e20a2f8c53f23dd]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SYSCHECK.EXE|Debugger, ntsd -d, Mis en quarantaine, [ef69432f6e1cf046b4a7cdcdee16629e]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SYSCHECK2.EXE|Debugger, ntsd -d, Mis en quarantaine, [70e8a7cbd7b347ef3725d1c9b74df10f]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SYSSAFE.EXE|Debugger, ntsd -d, Mis en quarantaine, [8bcd046e99f1b87ec9984852bf45e61a]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\TOOLSUP.EXE|Debugger, ntsd -d, Mis en quarantaine, [5305b7bb2c5e2f07772ad7c3c83ca060]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\TROJANDETECTOR.EXE|Debugger, ntsd -d, Mis en quarantaine, [98c0a3cf41495cdae2cb3466c93b867a]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\TROJANWALL.EXE|Debugger, ntsd -d, Mis en quarantaine, [d0881a58830764d2119f217936ce07f9]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\UIHOST.EXE|Debugger, ntsd -d, Mis en quarantaine, [1a3ed69c6e1c1e189928abefa65ed927]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\UMXAGENT.EXE|Debugger, ntsd -d, Mis en quarantaine, [e1771a5892f8191d06bf3664c143b54b]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\UMXATTACHMENT.EXE|Debugger, ntsd -d, Mis en quarantaine, [95c3a3cfe4a6bd794d79c3d711f3eb15]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\UMXCFG.EXE|Debugger, ntsd -d, Mis en quarantaine, [1e3af37f602ac571f1d62e6c986cd927]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\UMXFWHLP.EXE|Debugger, ntsd -d, Mis en quarantaine, [d781b1c1e2a87bbb2c9c4b4f4eb6738d]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\UMXPOL.EXE|Debugger, ntsd -d, Mis en quarantaine, [20384b27fe8cd462f2d7b2e8fe0640c0]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\UPLIVE.EXE|Debugger, ntsd -d, Mis en quarantaine, [a6b293df51391a1c16c019813dc7956b]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WOPTICLEAN.EXE|Debugger, ntsd -d, Mis en quarantaine, [a7b1fa78404a0234e86ecad127dd5fa1]
Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\ZXSWEEP.EXE|Debugger, ntsd -d, Mis en quarantaine, [8fc9d89a078389ade1a73863a460cd33]

Donn�es du Registre: 0
(Aucun �l�ment malicieux d�tect�)

Dossiers: 0
(Aucun �l�ment malicieux d�tect�)

Fichiers: 8
Backdoor.Bot, C:\SysAnti.exe, Mis en quarantaine, [aeaa87ebd9b14de92f032f2cb450718f],
Security.Hijack, C:\WINDOWS\system32\ntsd.exe, Mis en quarantaine, [67f13a38b5d50c2ae2d63564857f07f9],
Hijack.Host, C:\WINDOWS\system32\drivers\etc\hosts, Bon: (), Mauvais: (127.0.0.1 virustotal.com), Remplac�,[a9af0072c3c74de98d6c52f85ea850b0]
Hijack.Host, C:\WINDOWS\system32\drivers\etc\hosts, Bon: (), Mauvais: (.1 www.jiangmin.com
127.0.0), Remplac�,[6bede38fed9d96a031c8e9619076de22]
Hijack.Host, C:\WINDOWS\system32\drivers\etc\hosts, Bon: (), Mauvais: (127.0.0.1 virscan.org), Remplac�,[a1b7244e9af0de5816edc883699d768a]
Hijack.Host, C:\WINDOWS\system32\drivers\etc\hosts, Bon: (), Mauvais: (7.0.0.1 www.360.cn
127.0), Remplac�,[d583e38f4347e4528a79cb80c5417f81]
Hijack.Host, C:\WINDOWS\system32\drivers\etc\hosts, Bon: (), Mauvais: (127.0.0.1 www.kaspersky.com.cn), Remplac�,[f3654131543633037236dd6ec145649c]
Hijack.Host, C:\WINDOWS\system32\drivers\etc\hosts, Bon: (), Mauvais: (.1 www.rising.com.cn
127.0), Remplac�,[51075220e0aae74f5c4c51fafc0a30d0]

Secteurs physiques: 0
(Aucun �l�ment malicieux d�tect�)


(end)

Publicité


Signaler le contenu de ce document

Publicité