Malwarebytes Anti-Malware www.malwarebytes.org Date de l'analyse: 14/07/2016 Heure de l'analyse: 14:31 Fichier journal: malware.txt Administrateur: Oui Version: 2.2.1.1043 Base de données de programmes malveillants: v2016.07.14.05 Base de données de rootkits: v2016.05.27.01 Licence: Gratuit Protection contre les programmes malveillants: Désactivé Protection contre les sites Web malveillants: Désactivé Autoprotection: Désactivé Système d'exploitation: Windows 10 Processeur: x86 Système de fichiers: NTFS Utilisateur: roland Type d'analyse: Analyse des menaces Résultat: Terminé Objets analysés: 351673 Temps écoulé: 10 min, 39 s Mémoire: Activé Démarrage: Activé Système de fichiers: Activé Archives: Activé Rootkits: Désactivé Heuristique: Activé PUP: Activé PUM: Activé Processus: 0 (Aucun élément malveillant détecté) Modules: 0 (Aucun élément malveillant détecté) Clés du Registre: 4 PUP.Optional.HohoSearch, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\PtcModuleservice, En quarantaine, [618ca77c7426999d114118ce99688a76], PUP.Optional.Tuto4PC, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{8FF10FED-2F0A-4F7F-BE87-B04F1DCD4319}, En quarantaine, [806d26fd9703f1451892f2a5d131f907], PUP.Optional.Wajam, HKLM\SOFTWARE\GOOGLE\CHROME\EXTENSIONS\aaamnkbkbppehfhhkmiodoniifhfpkka, En quarantaine, [915c0f14d5c57eb814a5be410bf8dc24], PUP.Optional.Tuto4PC, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\mbot_fr_014010376_is1, En quarantaine, [925b47dcfc9e3afc82e8677fa65deb15], Valeurs du Registre: 1 PUP.Optional.HohoSearch, HKLM\SOFTWARE\MICROSOFT|help, http://d2ucfwpxlh3zh3.cloudfront.net/?ts=AHEqC3EsBHUrAk..&v=20160711&uid=9CEDB1C0CB57972D297AC4DBF2E28FBE&ptid=csdi&mode=loadmex, En quarantaine, [1fcebb68089253e323513cc4788c8e72] Données du Registre: 0 (Aucun élément malveillant détecté) Dossiers: 5 PUP.Optional.MorePowerfulCleaner, C:\Users\roland\AppData\Local\Temp\MPCOnline, En quarantaine, [d21bf231dbbf91a5c0736069e81ac53b], PUP.Optional.MorePowerfulCleaner, C:\Users\roland\AppData\Local\Temp\MPCOnline\Microsoft.VC90.CRT, En quarantaine, [d21bf231dbbf91a5c0736069e81ac53b], PUP.Optional.VBates, C:\Users\roland\AppData\LocalLow00652900, En quarantaine, [01ec44df534789ad54e0a821b74b44bc], PUP.Optional.Elex, C:\Program Files\Petckjahaght, En quarantaine, [b5387fa4f0aa42f40fbcf9b7798b43bd], PUP.Optional.Elex, C:\Program Files\Atapotainclemege, En quarantaine, [14d9f82b376395a108c50aa67e8604fc], Fichiers: 99 PUP.Optional.HohoSearch, C:\Program Files\Petckjahaght\PtcModuleservice.html5, En quarantaine, [618ca77c7426999d114118ce99688a76], PUP.Optional.VBates.WnskRST, C:\Users\roland\AppData\Roaming\Emehqyvmiu\Sazaguns.dll, En quarantaine, [c02d76ad762440f6e9244e8d4ab7669a], PUP.Optional.VBates.WnskRST, C:\Users\roland\AppData\Roaming\Emehqyvmiu\Sazaguns.exe, En quarantaine, [30bd48db7426330335d9c318768bad53], PUP.Optional.VBates.WnskRST, C:\Users\roland\AppData\Roaming\Emehqyvmiu\Ylaekut.dll, En quarantaine, [11dc6cb73f5b3105868668736b96f907], PUP.Optional.VBates, C:\Users\roland\AppData\Roaming\Emehqyvmiu\Ylaekut.exe, En quarantaine, [df0eb86b42584beb12f79e3dde236b95], PUP.Optional.WizzCaster, C:\Users\roland\AppData\Roaming\fMJtH\uninstaller.exe, En quarantaine, [f6f7e142d6c483b32a158113aa5ac13f], PUP.Optional.WizzCaster, C:\Users\roland\AppData\Roaming\fMJtH\Windows screen manage updater.exe, En quarantaine, [47a6a67d79215bdbca75bbd9887c5ba5], PUP.Optional.WizzCaster, C:\Users\roland\AppData\Roaming\fMJtH\windows screen manager.exe, En quarantaine, [48a5859ef8a29c9a0936088c5ea6bd43], PUP.Optional.Nosibay, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\Bubble Dock Uninstall.exe, En quarantaine, [37b6aa798f0b63d3af054d448282b050], Rootkit.Agent, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\cherimoya.sys, En quarantaine, [8f5ef52e2a7042f41aa9eddf41c0cd33], PUP.Optional.VBates.WnskRST, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\Ciypxelkip.dll, En quarantaine, [8c61fe2503971f17bc516a7130d114ec], PUP.Optional.VBates.WnskRST, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\Ciypxelkip.exe, En quarantaine, [2ebf45de37639b9bc64866757d8440c0], PUP.Optional.SearchProtect, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\SPTool.dll, En quarantaine, [36b7cd566e2c65d15c832b8c7f82fd03], PUP.Optional.Wajam, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\d3b9fdc384ecb7b7a9cab039583897e0.sys, En quarantaine, [747970b345554bebdfb50ccbef1211ef], PUP.Optional.Nosibay, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\WindApp Uninstall.exe, En quarantaine, [7e6f2ef50b8f7bbb5361a1f047bdc23e], PUP.Optional.VBates, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\Xomesenlob.exe, En quarantaine, [10dd60c3009a4aec39cd6179b64b02fe], PUP.Optional.Komodia, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\zdwfp.sys, En quarantaine, [20cdcb58a5f547ef541bcdd223de9967], PUP.Optional.CSDI, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\LR7BQ5R80X.exe, En quarantaine, [54999a894159e94d6506d2c69074aa56], PUP.Optional.MorePowerfulCleaner, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\MPCSetup_4.exe, En quarantaine, [58957aa9504aee48372ed3bff8093bc5], PUP.Optional.Nosibay, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\Selection Tools Uninstall.exe, En quarantaine, [da13041f702ae84ef4c0236ea85cb24e], Adware.Agent, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\CleanBrowser\uninstall.exe, En quarantaine, [e706c45fceccf93d34b7b7b4a26020e0], PUP.Optional.Nosibay, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\Store\WindApp\WindApp Uninstall.exe, En quarantaine, [1ecfca590e8cc4724c68058c659ff50b], PUP.Optional.Nosibay, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\Store\WindApp\WindApp Update.exe, En quarantaine, [bd3048db4852a6907d370e83a2620df3], PUP.Optional.EoRezo, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\SunnyDay21\usun.exe, En quarantaine, [bb320a196139ae887f7e39a156ab6b95], PUP.Optional.Tuto4PC, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\SunnyDay21\Download\wizzrelease.exe, En quarantaine, [5994d94ae1b9d95d0ba19a4e6c9533cd], PUP.Optional.Nosibay, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\WTools\Selection Tools\Selection Tools Uninstall.exe, En quarantaine, [8964a083e6b474c2942099f8966e9769], PUP.Optional.Nosibay, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\WTools\Selection Tools\Selection Tools Update.exe, En quarantaine, [11dc38eb623896a0783c4849c4408977], PUP.Optional.Nosibay, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\WTools\Selection Tools\Selection Tools.exe, En quarantaine, [4ba2e53e3c5e14225c58cac7ed17cc34], PUP.Optional.VBates.WnskRST, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\Xomesenlob.DIR\Ciypxelkip.dll, En quarantaine, [12dbbb683b5f41f5b25b30abf70aee12], PUP.Optional.VBates.WnskRST, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\Xomesenlob.DIR\Ciypxelkip.exe, En quarantaine, [e00dc45f7327082efe109c3f61a0f907], PUP.Optional.VBates.WnskRST, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\Xomesenlob.DIR\Gobbofhuem.dll, En quarantaine, [15d8db484258b4828d7fe2f97c850cf4], PUP.Optional.VBates, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\Xomesenlob.DIR\Gobbofhuem.exe, En quarantaine, [5f8ea380bedca88e30d96b700ff23dc3], Adware.EoRezo, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\mbot_fr_014010376\predm.exe, En quarantaine, [6a83a57e9604ec4a4f776bd12cd40bf5], PUP.Optional.Komodia, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\OtherSearch\zdengine.dll, En quarantaine, [ad40f0336e2c1125204e4d52d52cf50b], PUP.Optional.Komodia, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\OtherSearch\zdengine64.dll, En quarantaine, [3bb2071cafeb45f11f4fecb305fc03fd], PUP.Optional.Komodia, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\OtherSearch\zdenginecert.dll, En quarantaine, [b934be65e5b5c47277f7dec16b966b95], PUP.Optional.Komodia, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\OtherSearch\zdinstaller.exe, En quarantaine, [eeffe0439ffbaf87313e653a0af77888], PUP.Optional.Komodia, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\OtherSearch\zdwfp.sys, En quarantaine, [ca237ca73c5ee84e59169c0357aa9b65], PUP.Optional.Komodia, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\OtherSearch\zdwfp64.sys, En quarantaine, [cd20a57e138748eebfb0f7a82ad7af51], PUP.Optional.Komodia, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\OtherSearch\ziengine64.exe, En quarantaine, [6e7fc95ac2d8270f3e30dfc0738ed927], PUP.Optional.QuickSearch, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\QuickSearch\uninstall.exe, En quarantaine, [a24b72b15e3cfc3a1cc190448d7418e8], PUP.Optional.Komodia.WnskRST, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\QuickSearch\zdengine.dll, En quarantaine, [b736c3603a60290ddc94e7b824dd1be5], PUP.Optional.Komodia.WnskRST, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\QuickSearch\zdengine64.dll, En quarantaine, [717c6fb448520333e090e1beb34ea65a], PUP.Optional.Komodia.WnskRST, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\QuickSearch\zdenginecert.dll, En quarantaine, [49a4c55e9208f541e28e346b679af907], PUP.Optional.Komodia, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\QuickSearch\zdinstaller.exe, En quarantaine, [905d32f126740d298be40f90d829ab55], PUP.Optional.Komodia, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\QuickSearch\zdwfp.sys, En quarantaine, [12db988b5c3e80b6aec14758f9086b95], PUP.Optional.Komodia, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\QuickSearch\zdwfp64.sys, En quarantaine, [3eaf81a20a9079bde788148b4bb6728e], PUP.Optional.Komodia, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\QuickSearch\ziengine.exe, En quarantaine, [24c972b1f9a1eb4be18db1ee9d64bd43], PUP.Optional.Komodia, C:\Users\roland\AppData\Roaming\ZHP\Quarantine\QuickSearch\ziengine64.exe, En quarantaine, [8e5fa3807624ba7cc0ae9b0457aac040], Adware.PennyBee.WnskRST, C:\Users\roland\AppData\Roaming\ZoccuQaiaebz\Mobmutm.din, En quarantaine, [24c933f0cdcd44f29369f5bd46bb17e9], PUP.Optional.YesSearches, C:\Users\roland\AppData\Local\Microsoft\Windows\INetCookies\plqeph.dll, En quarantaine, [06e7ee359a002214a383d11542bf09f7], PUP.Optional.OutBrowse, C:\Users\roland\AppData\Local\Temp\{1DF6363A-8A57-4011-BCFC-0B402CD10412}.exe, En quarantaine, [ce1fb96af4a6280e7dcf35b7659c639d], PUP.Optional.OutBrowse, C:\Users\roland\AppData\Local\Temp\{9ECC40BF-2A3B-4F3B-9DCC-0E78E881F35E}.exe, En quarantaine, [2fbeef34366451e5e666717bd22fac54], PUP.Optional.Amonetize, C:\Users\roland\AppData\Local\Temp\sdf9343.exe, En quarantaine, [29c474afa3f7f442c741a924e41dd927], PUP.Optional.MyBestOffersToday, C:\Users\roland\AppData\Local\Temp\setup_mbot_fr.exe, En quarantaine, [35b8859e0e8c20160636502e1fe26f91], PUP.Optional.Tuto4PC, C:\Users\roland\AppData\Local\Temp\880DAAXSCK.exe, En quarantaine, [698473b0f0aa092d367a87289074a55b], PUP.Optional.PennyBee, C:\Users\roland\AppData\Local\Temp\31RH6JCVF\31RH6JCVF.exe, En quarantaine, [b835d152d6c4e74f0b2c7afd1ee3fe02], PUP.Optional.MorePowerfulCleaner, C:\Users\roland\AppData\Local\Temp\3P82YLZ2M\3P82YLZ2M.exe, En quarantaine, [35b85cc76c2e0d294d5c177fee163ec2], Adware.EoRezo, C:\Users\roland\AppData\Local\Temp\is-U287K.tmp\predm.exe, En quarantaine, [7875fc27eab0c4725a6cd06cc040fd03], PUP.Optional.Cloud4PC, C:\Users\roland\AppData\Local\Temp\is-U287K.tmp\SunnyDay.exe, En quarantaine, [7d708a99bddd6dc94c0f316652b2aa56], PUP.Optional.EoRezo, C:\Users\roland\AppData\Local\Temp\is-U287K.tmp\usun.exe, En quarantaine, [5d9071b2207a46f0d52826b41ee3f50b], PUP.Optional.MorePowerfulCleaner, C:\Users\roland\AppData\Local\Temp\K12Z9H512\K12Z9H512.exe, En quarantaine, [f4f9f42f88122c0abcedd7bf5da7ad53], PUP.Optional.EoRezo.Generic, C:\Users\roland\AppData\Local\Temp\LL9HDB1N0\LL9HDB1N0.exe, En quarantaine, [13da9b888f0b023404afccf83cc54cb4], PUP.Optional.Conduit, C:\Users\roland\AppData\Local\Temp\f9626892-7a78-3199-abd2-97bbce96297b\Extracted\adv_114.exe, En quarantaine, [0de0e142e3b7ba7ca7c8c7630ef333cd], PUP.Optional.EoRezo.Generic, C:\Users\roland\AppData\Local\Temp\IX4X5MNVH\IX4X5MNVH.exe, En quarantaine, [727bc75cdfbb06304f6423a1827f14ec], PUP.Optional.Amonetize, C:\Users\roland\AppData\Local\Temp\7COL6EVNN\Bundle_FlowsurfCB.exe, En quarantaine, [ad40a77c5f3b66d00e90713fdd2739c7], PUP.Optional.SystemHealer, C:\Users\roland\AppData\Local\Temp\8ZFTA5D09\8ZFTA5D09.exe, En quarantaine, [b23bb66d6b2f0c2ad93794ce7889de22], PUP.Optional.Komodia, C:\Windows\Temp\ziengine.ini.log, En quarantaine, [d7162201b5e553e3147cad4121e22ed2], PUP.Optional.Komodia, C:\Windows\Temp\zdengine.log, En quarantaine, [06e7b96ab3e73cfa6d248e60f70c20e0], PUP.Optional.MorePowerfulCleaner, C:\Users\roland\AppData\Roaming\Microsoft\Windows\SendTo\MPC Desktop.lnk, En quarantaine, [56974ed53367171f5b0ad52af40f659b], PUP.Optional.Wajam, C:\Users\roland\AppData\Roaming\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\{5a95a9e0-59dd-4314-bd84-4d18ca84b1f3}.xpi, En quarantaine, [df0e66bdfd9df5419820e51a6a9947b9], PUP.Optional.MorePowerfulCleaner, C:\Users\roland\AppData\Local\Temp\MPCOnline\DLBT.dll, En quarantaine, [d21bf231dbbf91a5c0736069e81ac53b], PUP.Optional.MorePowerfulCleaner, C:\Users\roland\AppData\Local\Temp\MPCOnline\MPCSetup_4.torrent, En quarantaine, [d21bf231dbbf91a5c0736069e81ac53b], PUP.Optional.MorePowerfulCleaner, C:\Users\roland\AppData\Local\Temp\MPCOnline\p2pconfig.ini, En quarantaine, [d21bf231dbbf91a5c0736069e81ac53b], PUP.Optional.MorePowerfulCleaner, C:\Users\roland\AppData\Local\Temp\MPCOnline\Microsoft.VC90.CRT\Microsoft.VC90.CRT.manifest, En quarantaine, [d21bf231dbbf91a5c0736069e81ac53b], PUP.Optional.MorePowerfulCleaner, C:\Users\roland\AppData\Local\Temp\MPCOnline\Microsoft.VC90.CRT\msvcm90.dll, En quarantaine, [d21bf231dbbf91a5c0736069e81ac53b], PUP.Optional.MorePowerfulCleaner, C:\Users\roland\AppData\Local\Temp\MPCOnline\Microsoft.VC90.CRT\msvcp90.dll, En quarantaine, [d21bf231dbbf91a5c0736069e81ac53b], PUP.Optional.MorePowerfulCleaner, C:\Users\roland\AppData\Local\Temp\MPCOnline\Microsoft.VC90.CRT\msvcr90.dll, En quarantaine, [d21bf231dbbf91a5c0736069e81ac53b], PUP.Optional.VBates, C:\Users\roland\AppData\LocalLow00652900\005D2630, En quarantaine, [01ec44df534789ad54e0a821b74b44bc], PUP.Optional.Amonetize, C:\Users\roland\AppData\Local\Temp\amipixel.cfg, En quarantaine, [69846bb8a1f94beb1402b2eb30d4c040], PUP.Optional.Linkury.ACMB1, C:\Users\roland\AppData\Roaming\InstallationConfiguration.xml, En quarantaine, [a647cc57dcbeca6cfe5a3a6355af5aa6], PUP.Optional.HohoSearch, C:\Users\roland\AppData\Roaming\Mozilla\Firefox\Profiles\gnp8e4jp.default\searchplugins\tta8plpy.xml, En quarantaine, [915cec3727733501ad42a5f820e42cd4], PUM.Optional.FireFoxSecurityOverride, C:\Users\roland\AppData\Roaming\Mozilla\Firefox\Profiles\gnp8e4jp.default\user.js, En quarantaine, [a647f52ee1b969cdcc1533693aca22de], PUP.Optional.Elex, C:\Users\roland\AppData\Roaming\Profiles\jrwgdzq5.default\prefs.js, Bon : (), Mauvais : (user_pref("browser.newtab.url", "http://d2ucfwpxlh3zh3.cloudfront.net/?ts=AHEqBX8qBXUmBk..&v=20160615&uid=879DF59F23D94FFBB766EE6F0E1E6A94&ptid=csdi&mode=loadm");), Remplacé,[85680320613952e44ae356523bc9f40c] PUP.Optional.HohoSearch, C:\Users\roland\AppData\Roaming\Profiles\jrwgdzq5.default\searchplugins\tta8plpy.xml, En quarantaine, [af3e27fcadedb185965a7528669e10f0], PUP.Optional.HijackHosts.Gen, C:\Windows\System32\wywg\idys\kim.dat, En quarantaine, [4ca13ce7c4d651e5c186eab024e0847c], PUP.Optional.HijackHosts.Gen, C:\Windows\System32\zebl\fuuc\jeg.dat, En quarantaine, [aa439d86039784b2c681108a6f9558a8], PUP.Optional.HijackHosts.Gen, C:\Windows\System32\jha\gyc\aselv.dat, En quarantaine, [36b782a13c5e7db9d773faa013f18878], Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (#107.178.247.130 connect.facebook.net), Remplacé,[11dc9f84039750e687b0d4ca808437c9] Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (t.facebook.net #107.178.255.88 www.g), Remplacé,[f3fad54e683252e455e2801e13f1c63a] Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (#107.178.248.130 static.doubleclick.net), Remplacé,[1cd11013c0da50e67eba77272ada8e72] Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (t.facebook.net #107.178.255.88 www.goo), Remplacé,[d617071c2c6e00364eeab1ed7e86817f] Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (#107.178.255.88 www.google-analytics.com), Remplacé,[737a1a09396175c11524edb1a460748c] Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (analytics.com #107.178.255.88 www.), Remplacé,[0ce1190a504ae94de752fca215efc937] Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (ogle-analytics.com #107.178.25), Remplacé,[19d4fd2657435ed8c376a2fcf60e57a9] Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (w.google-analytics.com #107.178.255.88 ), Remplacé,[539ab37049516ec890a9910d64a033cd] Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (analytics.com #107.178.255.88 www.statcount), Remplacé,[1dd0b86b7c1e092d7cbd5b4390745ba5] Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (ytics.com #107.178.255.88 www.statc), Remplacé,[8b6253d08f0b51e53108306efc0807f9] Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Bon : (), Mauvais : (ter.com #107.178.255.88 ssl.google-anal), Remplacé,[1ad334eff8a21c1a6bce702e05ffea16] Secteurs physiques: 0 (Aucun élément malveillant détecté) (end)