cjoint

Publicité


Publicité

Format du document : text/x-log

Prévisualisation

RogueKiller V9.2.8.0 [Jul 11 2014] par Adlice Software
Mail : http://www.adlice.com/contact/
Remontées : http://forum.adlice.com
Site Web : http://www.surlatoile.org/RogueKiller/
Blog : http://www.adlice.com

Système d'exploitation : Windows XP (5.1.2600 Service Pack 3) 32 bits version
Démarrage : Mode normal
Utilisateur : moi jean paul [Droits d'admin]
Mode : Recherche -- Date : 08/23/2014 20:53:35

¤¤¤ Processus malicieux : 0 ¤¤¤

¤¤¤ Entrées de registre : 10 ¤¤¤
[PUM.Proxy] HKEY_USERS\S-1-5-21-1964260855-4170968377-3688177798-1007\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:56847 -> TROUVÉ
[PUM.StartMenu] HKEY_USERS\S-1-5-21-1964260855-4170968377-3688177798-1007\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowMyDocs : 2 -> TROUVÉ
[PUM.StartMenu] HKEY_USERS\S-1-5-21-1964260855-4170968377-3688177798-1007\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowMyMusic : 2 -> TROUVÉ
[PUM.StartMenu] HKEY_USERS\S-1-5-21-1964260855-4170968377-3688177798-1007\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowMyPics : 2 -> TROUVÉ
[PUM.StartMenu] HKEY_USERS\S-1-5-21-1964260855-4170968377-3688177798-1007\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowRecentDocs : 2 -> TROUVÉ
[PUM.StartMenu] HKEY_USERS\S-1-5-21-1964260855-4170968377-3688177798-1007\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowSetProgramAccessAndDefaults : 0 -> TROUVÉ
[PUM.DesktopIcons] HKEY_USERS\S-1-5-21-1964260855-4170968377-3688177798-1007\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\ClassicStartMenu | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> TROUVÉ
[PUM.DesktopIcons] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> TROUVÉ
[PUM.DesktopIcons] HKEY_USERS\S-1-5-21-1964260855-4170968377-3688177798-1007\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> TROUVÉ
[PUM.HomePage] HKEY_USERS\S-1-5-21-1964260855-4170968377-3688177798-1007\Software\Microsoft\Internet Explorer\Main | Start Page : www.google.com -> TROUVÉ

¤¤¤ Tâches planifiées : 1 ¤¤¤
[Suspicious.Path] temp_media enhance-enabler.job -- C:\DOCUME~1\MOIJEA~1\LOCALS~1\Temp\nsr1DC.tmp\media enhance-enabler.exe (/removebhoenableinfo /agentregpath='media enhance' /appid=44150 /srcid='000555' /subid='verticals-ads,shopping,intext,pops' /zdata='0/' /bic=3220EB06A37B4CEDA99B59A588B53FCBIE /verifier=ad2ed8318a1277e4bed5d5a6b445a11e /installerversion=1_34_3_2 /statsdomain=http://stats.srvstatsdata.com /errorsdomain=http://errors.srvstatsdata.com /bhoguid=11111111-1111-1111-1111-110411411150 /defbro=ch /runfrom=uninstaller /externallog='C:\DOCUME~1\MOIJEA~1\LOCALS~1\Temp\media enhanceUninstaller_1394187629.log') -> TROUVÉ

¤¤¤ Fichiers : 0 ¤¤¤

¤¤¤ Fichier HOSTS : 27 ¤¤¤
[C:\WINDOWS\System32\drivers\etc\hosts] 127.0.0.1 localhost
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 boxore.com
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 www.boxore.com
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 boxore.org
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 www.boxore.org
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 boxore.net
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 www.boxore.net
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 dlmanager.com
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 www.dlmanager.com
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 dlmanager.org
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 www.dlmanager.org
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 dlmanager.net
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 www.dlmanager.net
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 eorezo.com
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 www.eorezo.com
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 dist.eorezo.com
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 file.eorezo.com
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 log.eorezo.com
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 ads.eorezo.com
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 prof.eorezo.com
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 soft.eorezo.com
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 upd.eorezo.com
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 dfr.eorezo.com
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 lollipop-network.com
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 www.lollipop-network.com
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 download.lollipop-network.com
[C:\WINDOWS\System32\drivers\etc\hosts] 0.0.0.0 offers.lollipop-network.com

¤¤¤ Antirootkit : 0 (Driver: CHARGE) ¤¤¤

¤¤¤ Navigateurs web : 1 ¤¤¤
[PUP][FIREFX:Addon] ynl4f5bx.default-1398717855568 : FrameFox [{D6F4FFAF-E3C9-4f3d-AD5B-F78CD969D7BF}] -> TROUVÉ

¤¤¤ MBR Verif : ¤¤¤
+++++ PhysicalDrive0: WDC WD800BEVS-22RST0 +++++
--- User ---
[MBR] db18fd59a8e9d02a0c902cadad1d669d
[BSP] 4def23d062cd5346d592297d751520d3 : Windows XP MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 63 | Size: 62848 MB
1 - [XXXXXX] FAT32-LBA (0xc) [VISIBLE] Offset (sectors): 128712780 | Size: 13468 MB
User = LL1 ... OK
User = LL2 ... OK


Publicité


Signaler le contenu de ce document

Publicité