Malwarebytes Anti-Malware www.malwarebytes.org Date de l'analyse: 20/06/2016 Heure de l'analyse: 15:34 Fichier journal: MBAMW.txt Administrateur: Oui Version: 2.2.1.1043 Base de données de programmes malveillants: v2016.06.20.03 Base de données de rootkits: v2016.05.27.01 Licence: Gratuit Protection contre les programmes malveillants: Désactivé Protection contre les sites Web malveillants: Désactivé Autoprotection: Désactivé Système d'exploitation: Windows 7 Service Pack 1 Processeur: x64 Système de fichiers: NTFS Utilisateur: Tom Type d'analyse: Analyse des menaces Résultat: Terminé Objets analysés: 296062 Temps écoulé: 2 min, 50 s Mémoire: Activé Démarrage: Activé Système de fichiers: Activé Archives: Activé Rootkits: Désactivé Heuristique: Activé PUP: Activé PUM: Activé Processus: 0 (Aucun élément malveillant détecté) Modules: 0 (Aucun élément malveillant détecté) Clés du Registre: 10 PUP.Optional.HohoSearch, HKLM\SOFTWARE\CLASSES\CLSID\{98C066AB-D735-4339-9E52-A34875141B56}, En quarantaine, [a48f23dc7a1f15213774cec204fe48b8], PUP.Optional.Linkury.ACMB1, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\Lamzap, En quarantaine, [5fd44eb197025ed8ea097084f21106fa], PUP.Optional.HohoSearch, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{9A5DA745-E94E-42CB-B964-EC1E01E00F74}, Supprimer au redémarrage, [79ba887729704cea086790670ef5b749], PUP.Optional.HohoSearch, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Doroghtshejas Module, Supprimer au redémarrage, [c76c48b72574112572fe05f21ae9d828], PUP.Optional.HohoSearch, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}, En quarantaine, [ca696f90e0b97abc2df9de1804ff847c], PUP.Optional.Linkury.ACMB1, HKLM\SOFTWARE\WOW6432NODE\mtLamzap, En quarantaine, [0c27a55a8f0a52e458a07e76748feb15], PUP.Optional.Linkury.ACMB1, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SILENTPROCESSEXIT\Lamzap.exe, En quarantaine, [81b2f20d4752d95da6519163c73cbd43], PUP.Optional.HohoSearch, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\doroghtshejasmoduleservice, En quarantaine, [6cc7649b7a1f8aac4829cc2b6b98c43c], PUP.Optional.Shopperz.BrwsrFlsh, HKU\.DEFAULT\SOFTWARE\MICROSOFT\INTERNET EXPLORER\INTERNETREGISTRY\REGISTRY\USER\S-1-5-18\SOFTWARE\shopperz170120161127, En quarantaine, [8da644bb8514063093354a914bb8ed13], PUP.Optional.WinYahoo, HKU\S-1-5-21-65359394-896705415-2116839662-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\BFREPORT, En quarantaine, [d55ea857d0c9fb3b0acd599b6b986997], Valeurs du Registre: 7 PUP.Optional.HohoSearch, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{9A5DA745-E94E-42CB-B964-EC1E01E00F74}|Path, \Doroghtshejas Module, Supprimer au redémarrage, [79ba887729704cea086790670ef5b749] PUP.Optional.HohoSearch, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|hp, http://d2ucfwpxlh3zh3.cloudfront.net/?ts=AHEqBH4qCH0lAU..&v=20160603&uid=60FFDCF549500AD88F966901F5F40757&ptid=clc&mode=ffsengext, En quarantaine, [ca696f90e0b97abc2df9de1804ff847c] PUP.Optional.HohoSearch, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|tab, http://d2ucfwpxlh3zh3.cloudfront.net/?ts=AHEqBH4qCH0lAU..&v=20160603&uid=60FFDCF549500AD88F966901F5F40757&ptid=clc&mode=ffsengext, En quarantaine, [eb480af5e5b4a096ef37e511649f0000] PUP.Optional.BrowserAir, HKLM\SOFTWARE\REGISTEREDAPPLICATIONS|BrowserAir.JHTB5WQ2GCPZW27LRJONXHTHRM, Software\Clients\StartMenuInternet\BrowserAir.JHTB5WQ2GCPZW27LRJONXHTHRM\Capabilities, En quarantaine, [75be708facedca6c170e7d3c788b9769] PUP.Optional.BrowserAir, HKLM\SOFTWARE\WOW6432NODE\REGISTEREDAPPLICATIONS|BrowserAir.JHTB5WQ2GCPZW27LRJONXHTHRM, Software\Clients\StartMenuInternet\BrowserAir.JHTB5WQ2GCPZW27LRJONXHTHRM\Capabilities, En quarantaine, [c2716b94584142f4e0455a5f8f7402fe] PUP.Optional.Linkury.ACMB1, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\LAMZAP|ImagePath, C:\ProgramData\\Lamzap\\Lamzap.exe shuz -f "C:\ProgramData\\Lamzap\\Lamzap.dat" -l -a, En quarantaine, [55dea85715840531c83140b453b09f61] PUP.Optional.WinYahoo, HKU\S-1-5-21-65359394-896705415-2116839662-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\BFREPORT|filename, C:\Users\Tom\AppData\Local\{1C1E2A42-38B6-46FA-552E-631271469F8A}\uninstall.exe, En quarantaine, [d55ea857d0c9fb3b0acd599b6b986997] Données du Registre: 0 (Aucun élément malveillant détecté) Dossiers: 6 Trojan.FakeAlert, C:\Users\Tom\AppData\Local\Temp\msupdate71, En quarantaine, [da590ff01d7c7abc99a04a7132d18080], PUP.Optional.Linkury.ACMB1, C:\ProgramData\Lamzap, En quarantaine, [5fd44eb197025ed8ea097084f21106fa], PUP.Optional.Linkury.ACMB1, C:\ProgramData\Lamzap\ondemand, En quarantaine, [5fd44eb197025ed8ea097084f21106fa], PUP.Optional.Linkury.ACMB1, C:\Program Files (x86)\Common Files\Solo-Lam, En quarantaine, [42f17f80336652e472fec7cb848036ca], PUP.Optional.WinYahoo, C:\Users\Tom\AppData\Local\{1C1E2A42-38B6-46FA-552E-631271469F8A}\HowToRemove, En quarantaine, [082b4db24a4fe452a06dace76a9a9e62], PUP.Optional.WinYahoo, C:\Users\Tom\AppData\Local\{1C1E2A42-38B6-46FA-552E-631271469F8A}, En quarantaine, [082b4db24a4fe452a06dace76a9a9e62], Fichiers: 89 PUP.Optional.Linkury, C:\Users\Tom\AppData\Roaming\NamZamdax.bin, En quarantaine, [71c2ec134e4bd5610614cc844bb9e31d], PUP.Optional.LogicHandler, C:\Users\Tom\AppData\Roaming\Treszap.bin, En quarantaine, [5ad95aa58613b58114e12a342fd1f60a], PUP.Optional.PCSpeedUp, C:\Users\Tom\AppData\Roaming\ZHP\Quarantine\awh8C0D.tmp, En quarantaine, [e1528b74b9e021153e91d3587091b34d], PUP.Optional.Nosibay, C:\Users\Tom\AppData\Roaming\ZHP\Quarantine\awh8FCB.tmp, En quarantaine, [68cbf9066c2d95a1854a196ebf454bb5], PUP.Optional.Nosibay, C:\Users\Tom\AppData\Roaming\ZHP\Quarantine\Selection Tools Uninstall.exe, En quarantaine, [43f06f90c1d8b97df9d6d1b6c93be41c], PUP.Optional.WizzCaster, C:\Users\Tom\AppData\Local\Temp\N17PXPYC7L\win.exe, En quarantaine, [6bc8857a0990cc6ad631cdbd4aba6f91], Adware.PennyBee.WnskRST, C:\Windows\Temp\bobca\Feciay.din, En quarantaine, [cd669768e8b15fd711cf318049b88779], PUP.Optional.ABengine, C:\Windows\Temp\lengine.ini.log, En quarantaine, [b47f7d8221787fb7f87abed0cc3732ce], Trojan.FakeAlert, C:\Users\Tom\AppData\Local\Temp\msupdate71\dwm.exe, En quarantaine, [da590ff01d7c7abc99a04a7132d18080], Trojan.FakeAlert, C:\Users\Tom\AppData\Local\Temp\msupdate71\libcurl-4.dl1, En quarantaine, [da590ff01d7c7abc99a04a7132d18080], Trojan.FakeAlert, C:\Users\Tom\AppData\Local\Temp\msupdate71\libiconv-2.dl1, En quarantaine, [da590ff01d7c7abc99a04a7132d18080], Trojan.FakeAlert, C:\Users\Tom\AppData\Local\Temp\msupdate71\libidn-11.dl1, En quarantaine, [da590ff01d7c7abc99a04a7132d18080], Trojan.FakeAlert, C:\Users\Tom\AppData\Local\Temp\msupdate71\libintl-8.dl1, En quarantaine, [da590ff01d7c7abc99a04a7132d18080], Trojan.FakeAlert, C:\Users\Tom\AppData\Local\Temp\msupdate71\libwinpthread-1.dl1, En quarantaine, [da590ff01d7c7abc99a04a7132d18080], Trojan.FakeAlert, C:\Users\Tom\AppData\Local\Temp\msupdate71\msupdate.7z, En quarantaine, [da590ff01d7c7abc99a04a7132d18080], Trojan.FakeAlert, C:\Users\Tom\AppData\Local\Temp\msupdate71\msvcrt.dll, En quarantaine, [da590ff01d7c7abc99a04a7132d18080], Trojan.FakeAlert, C:\Users\Tom\AppData\Local\Temp\msupdate71\proxy.conf, En quarantaine, [da590ff01d7c7abc99a04a7132d18080], Trojan.FakeAlert, C:\Users\Tom\AppData\Local\Temp\msupdate71\zlib1.dl1, En quarantaine, [da590ff01d7c7abc99a04a7132d18080], PUP.Optional.Komodia, C:\Windows\Temp\zcengine.log, En quarantaine, [c96aa7587722ed49b113ca1252b17c84], PUP.Optional.Komodia, C:\Windows\Temp\zdengine.log, En quarantaine, [f3407689f7a26dc9771b9b4b6a9910f0], PUP.Optional.Linkury, C:\Users\Tom\AppData\Roaming\md.xml, En quarantaine, [b47f4ab5514826104586d6111ce78a76], PUP.Optional.Linkury, C:\Users\Tom\AppData\Roaming\noah.dat, En quarantaine, [85aeeb14fe9b1d193d8f35b247bcfa06], PUP.Optional.Linkury, C:\Users\Tom\AppData\Roaming\uninstall_temp.ico, En quarantaine, [8fa405fae3b6c3732ca16e794ab99769], PUP.Optional.Linkury, C:\Users\Tom\AppData\Roaming\lobby.dat, En quarantaine, [45ee08f78c0dd85e9cba38b0877ce21e], PUP.Optional.ProntSpooler, C:\Users\Tom\AppData\Local\Apps\2.0\abril.InstallLog, En quarantaine, [6bc87e812673270ff2efe010758e0ff1], PUP.Optional.ProntSpooler, C:\Users\Tom\AppData\Local\Apps\2.0\abril.InstallState, En quarantaine, [b281eb14049538fee3fe43adee154cb4], PUP.Optional.Linkury.ACMB1, C:\ProgramData\Lamzap\Bigdom.bin, En quarantaine, [5fd44eb197025ed8ea097084f21106fa], PUP.Optional.Linkury.ACMB1, C:\ProgramData\Lamzap\md.xml, En quarantaine, [5fd44eb197025ed8ea097084f21106fa], PUP.Optional.Linkury.ACMB1, C:\ProgramData\Lamzap\conf.config, En quarantaine, [5fd44eb197025ed8ea097084f21106fa], PUP.Optional.Linkury.ACMB1, C:\ProgramData\Lamzap\Config.xml, En quarantaine, [5fd44eb197025ed8ea097084f21106fa], PUP.Optional.Linkury.ACMB1, C:\ProgramData\Lamzap\Dripdex.bin, En quarantaine, [5fd44eb197025ed8ea097084f21106fa], PUP.Optional.Linkury.ACMB1, C:\ProgramData\Lamzap\HotHatkix.dat, En quarantaine, [5fd44eb197025ed8ea097084f21106fa], PUP.Optional.Linkury.ACMB1, C:\ProgramData\Lamzap\Joydomtom.bin, En quarantaine, [5fd44eb197025ed8ea097084f21106fa], PUP.Optional.Linkury.ACMB1, C:\ProgramData\Lamzap\Labdom.dat, En quarantaine, [5fd44eb197025ed8ea097084f21106fa], PUP.Optional.Linkury.ACMB1, C:\ProgramData\Lamzap\Lamtouch.dll, En quarantaine, [5fd44eb197025ed8ea097084f21106fa], PUP.Optional.Linkury.ACMB1, C:\ProgramData\Lamzap\Lamzap.d.dat, En quarantaine, [5fd44eb197025ed8ea097084f21106fa], PUP.Optional.Linkury.ACMB1, C:\ProgramData\Lamzap\Lamzap.dat, En quarantaine, [5fd44eb197025ed8ea097084f21106fa], PUP.Optional.Linkury.ACMB1, C:\ProgramData\Lamzap\Nimtrax.exe.config, En quarantaine, [5fd44eb197025ed8ea097084f21106fa], PUP.Optional.Linkury.ACMB1, C:\ProgramData\Lamzap\Quotelex.exe.config, En quarantaine, [5fd44eb197025ed8ea097084f21106fa], PUP.Optional.Linkury.ACMB1, C:\ProgramData\Lamzap\Statnix.bin, En quarantaine, [5fd44eb197025ed8ea097084f21106fa], PUP.Optional.Linkury.ACMB1, C:\ProgramData\Lamzap\Strongbam.exe.config, En quarantaine, [5fd44eb197025ed8ea097084f21106fa], PUP.Optional.Linkury.ACMB1, C:\ProgramData\Lamzap\Triolight.bin, En quarantaine, [5fd44eb197025ed8ea097084f21106fa], PUP.Optional.Linkury.ACMB1, C:\ProgramData\Lamzap\uninstall.dat, En quarantaine, [5fd44eb197025ed8ea097084f21106fa], PUP.Optional.Linkury.ACMB1, C:\ProgramData\Lamzap\VillaOvezap.bin, En quarantaine, [5fd44eb197025ed8ea097084f21106fa], PUP.Optional.Linkury.ACMB1, C:\ProgramData\Lamzap\Voltcof.bin, En quarantaine, [5fd44eb197025ed8ea097084f21106fa], PUP.Optional.Linkury.Gen, C:\Users\Tom\AppData\Roaming\Stanex.tst, En quarantaine, [979cfc03bedb2e080e9d2bca0102f10f], PUP.Optional.Linkury.Gen, C:\Users\Tom\AppData\Roaming\Unois.tst, En quarantaine, [64cf718eb6e358de3675866fd42f748c], PUP.Optional.GsearchFinder, C:\Users\Tom\AppData\Roaming\Profiles\yzzfdyu4.default\extensions\@A3592ADB-854A-443A-854E-EB92130D470D.xpi, En quarantaine, [d45fce317a1f310504ff48ae887b5ca4], PUP.Optional.HohoSearch, C:\Windows\System32\Tasks\Doroghtshejas Module, En quarantaine, [e64d10ef69301e186c01fff841c223dd], PUP.Optional.Linkury.ACMB1, C:\Program Files (x86)\Common Files\Solo-Lam\InstallationConfiguration.xml, En quarantaine, [42f17f80336652e472fec7cb848036ca], PUP.Optional.Linkury.ACMB1, C:\Program Files (x86)\Common Files\Solo-Lam\uninstall.dat, En quarantaine, [42f17f80336652e472fec7cb848036ca], PUP.Optional.Linkury.ACMB1, C:\Program Files (x86)\Common Files\Solo-Lam\uninstall.ico, En quarantaine, [42f17f80336652e472fec7cb848036ca], PUP.Optional.WinYahoo, C:\Users\Tom\AppData\Local\{1C1E2A42-38B6-46FA-552E-631271469F8A}\HowToRemove\HowToRemove.html, En quarantaine, [082b4db24a4fe452a06dace76a9a9e62], PUP.Optional.WinYahoo, C:\Users\Tom\AppData\Local\{1C1E2A42-38B6-46FA-552E-631271469F8A}\HowToRemove\chromium-min.jpg, En quarantaine, [082b4db24a4fe452a06dace76a9a9e62], PUP.Optional.WinYahoo, C:\Users\Tom\AppData\Local\{1C1E2A42-38B6-46FA-552E-631271469F8A}\HowToRemove\control panel-min-min.JPG, En quarantaine, [082b4db24a4fe452a06dace76a9a9e62], PUP.Optional.WinYahoo, C:\Users\Tom\AppData\Local\{1C1E2A42-38B6-46FA-552E-631271469F8A}\HowToRemove\down.png, En quarantaine, [082b4db24a4fe452a06dace76a9a9e62], PUP.Optional.WinYahoo, C:\Users\Tom\AppData\Local\{1C1E2A42-38B6-46FA-552E-631271469F8A}\HowToRemove\ff menu.JPG, En quarantaine, [082b4db24a4fe452a06dace76a9a9e62], PUP.Optional.WinYahoo, C:\Users\Tom\AppData\Local\{1C1E2A42-38B6-46FA-552E-631271469F8A}\HowToRemove\ff search engine-min.png, En quarantaine, [082b4db24a4fe452a06dace76a9a9e62], PUP.Optional.WinYahoo, C:\Users\Tom\AppData\Local\{1C1E2A42-38B6-46FA-552E-631271469F8A}\HowToRemove\hp-min ff.png, En quarantaine, [082b4db24a4fe452a06dace76a9a9e62], PUP.Optional.WinYahoo, C:\Users\Tom\AppData\Local\{1C1E2A42-38B6-46FA-552E-631271469F8A}\HowToRemove\hp-min ie.png, En quarantaine, [082b4db24a4fe452a06dace76a9a9e62], PUP.Optional.WinYahoo, C:\Users\Tom\AppData\Local\{1C1E2A42-38B6-46FA-552E-631271469F8A}\HowToRemove\search engine.gif, En quarantaine, [082b4db24a4fe452a06dace76a9a9e62], PUP.Optional.WinYahoo, C:\Users\Tom\AppData\Local\{1C1E2A42-38B6-46FA-552E-631271469F8A}\HowToRemove\setup pages.gif, En quarantaine, [082b4db24a4fe452a06dace76a9a9e62], PUP.Optional.WinYahoo, C:\Users\Tom\AppData\Local\{1C1E2A42-38B6-46FA-552E-631271469F8A}\HowToRemove\sp-min.png, En quarantaine, [082b4db24a4fe452a06dace76a9a9e62], PUP.Optional.WinYahoo, C:\Users\Tom\AppData\Local\{1C1E2A42-38B6-46FA-552E-631271469F8A}\HowToRemove\start-min.jpg, En quarantaine, [082b4db24a4fe452a06dace76a9a9e62], PUP.Optional.WinYahoo, C:\Users\Tom\AppData\Local\{1C1E2A42-38B6-46FA-552E-631271469F8A}\HowToRemove\up.png, En quarantaine, [082b4db24a4fe452a06dace76a9a9e62], PUP.Optional.WinYahoo, C:\Users\Tom\AppData\Local\{1C1E2A42-38B6-46FA-552E-631271469F8A}\bapi.dat, En quarantaine, [082b4db24a4fe452a06dace76a9a9e62], PUP.Optional.WinYahoo, C:\Users\Tom\AppData\Local\{1C1E2A42-38B6-46FA-552E-631271469F8A}\config.dat, En quarantaine, [082b4db24a4fe452a06dace76a9a9e62], PUP.Optional.WinYahoo, C:\Users\Tom\AppData\Local\{1C1E2A42-38B6-46FA-552E-631271469F8A}\deca, En quarantaine, [082b4db24a4fe452a06dace76a9a9e62], PUP.Optional.WinYahoo, C:\Users\Tom\AppData\Local\{1C1E2A42-38B6-46FA-552E-631271469F8A}\fada, En quarantaine, [082b4db24a4fe452a06dace76a9a9e62], PUP.Optional.WinYahoo, C:\Users\Tom\AppData\Local\{1C1E2A42-38B6-46FA-552E-631271469F8A}\info.dat, En quarantaine, [082b4db24a4fe452a06dace76a9a9e62], PUP.Optional.WinYahoo, C:\Users\Tom\AppData\Local\{1C1E2A42-38B6-46FA-552E-631271469F8A}\install.log, En quarantaine, [082b4db24a4fe452a06dace76a9a9e62], PUP.Optional.WinYahoo, C:\Users\Tom\AppData\Local\{1C1E2A42-38B6-46FA-552E-631271469F8A}\Sqlite3.dll, En quarantaine, [082b4db24a4fe452a06dace76a9a9e62], PUP.Optional.WinYahoo, C:\Users\Tom\AppData\Local\{1C1E2A42-38B6-46FA-552E-631271469F8A}\uninst.dat, En quarantaine, [082b4db24a4fe452a06dace76a9a9e62], PUP.Optional.Linkury.ACMB1, C:\Users\Tom\AppData\Roaming\Config.xml, En quarantaine, [4fe43cc36237dc5ab7b0761c49bbed13], PUP.Optional.Linkury.ACMB1, C:\Users\Tom\AppData\Roaming\InstallationConfiguration.xml, En quarantaine, [fd36ea153a5f9e98baae672b4bb9e31d], PUP.Optional.HohoSearch, C:\Users\Tom\AppData\Roaming\Profiles\818fakga.default\searchplugins\ktgg5m20.xml, En quarantaine, [be75f807009934021eea474c34d06c94], PUP.Optional.HohoSearch, C:\Users\Tom\AppData\Roaming\Profiles\yzzfdyu4.default\searchplugins\ktgg5m20.xml, En quarantaine, [9a996798960355e159afa3f0ac582ad6], PUP.Optional.HijackHosts.Gen, C:\Windows\System32\reb\ani\sesri.dat, En quarantaine, [bc7715eaf5a4a6901346eda229dba35d], Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (#107.178.247.130 connect.facebook.net), Remplacé,[b281e71899007bbb3e069cf75ea640c0] Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (t.facebook.net #107.178.255.88 www.g), Remplacé,[c46fbd42cfca06309fa52e65d430dc24] Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (#107.178.248.130 static.doubleclick.net), Remplacé,[f93aa15e2475a78fcf76c8cb8084dd23] Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (t.facebook.net #107.178.255.88 www.goo), Remplacé,[f043c23d2d6c92a464e1840fd331bc44] Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (#107.178.255.88 www.google-analytics.com), Remplacé,[38fbcf30940560d658ee9ef57292f10f] Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (analytics.com #107.178.255.88 www.), Remplacé,[38fb20df5643a690e660fc9732d245bb] Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (ogle-analytics.com #107.178.25), Remplacé,[ed46de21abeebc7afb4b7e15699b629e] Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (w.google-analytics.com #107.178.255.88 ), Remplacé,[92a10ef16534c076ff47aae93ec6e917] Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (analytics.com #107.178.255.88 www.statcount), Remplacé,[082b29d695045ed84600dbb8fe06926e] Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (ytics.com #107.178.255.88 www.statc), Remplacé,[161d6c936435c17583c3efa45da7a35d] Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (ter.com #107.178.255.88 ssl.google-anal), Remplacé,[f043a6595544f0461e28fd96ac58d927] Secteurs physiques: 0 (Aucun élément malveillant détecté) (end)