cjoint

Publicité


Publicité

Format du document : application/octet-stream

Prévisualisation

RogueKiller V10.8.2.0 [Jun 9 2015] par Adlice Software
email : http://www.adlice.com/contact/
Remontées : http://forum.adlice.com
Site web : http://www.adlice.com/fr/logiciels/roguekiller/
Blog : http://www.adlice.com

Système d'exploitation : Windows 7 (6.1.7601 Service Pack 1) 32 bits version
Démarré en : Mode normal
Utilisateur : André [Administrateur]
Démarré depuis : C:\Users\André\Downloads\RogueKiller(1).exe
Mode : Scan -- Date : 06/14/2015 23:04:37

¤¤¤ Processus : 0 ¤¤¤

¤¤¤ Registre : 5 ¤¤¤
[Suspicious.Path] HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\catchme (\??\C:\Users\ANDR~1\AppData\Local\Temp\catchmewusq.sys) -> Trouvé(e)
[Suspicious.Path|Hidden.From.SCM] HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\mbr (\??\C:\Users\ANDR~1\AppData\Local\Temp\mbr.sys) -> Trouvé(e)
[Suspicious.Path] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\catchme (\??\C:\Users\ANDR~1\AppData\Local\Temp\catchmewusq.sys) -> Trouvé(e)
[Suspicious.Path] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\mbr (\??\C:\Users\ANDR~1\AppData\Local\Temp\mbr.sys) -> Trouvé(e)
[Suspicious.Path] HKEY_LOCAL_MACHINE\System\ControlSet002\Services\catchme (\??\C:\Users\ANDR~1\AppData\Local\Temp\catchmewusq.sys) -> Trouvé(e)

¤¤¤ Tâches : 0 ¤¤¤

¤¤¤ Fichiers : 0 ¤¤¤

¤¤¤ Fichier Hosts : 1 ¤¤¤
[C:\Windows\System32\drivers\etc\hosts] 127.0.0.1 localhost

¤¤¤ Antirootkit : 88 (Driver: Chargé) ¤¤¤
[IAT:Inl(Hook.IEAT)] (explorer.exe) ADVAPI32.dll - CloseServiceHandle : Unknown @ 0x75002859 (jmp 0xfed0f25d|jmp 0xffffdd32|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ADVAPI32.dll - OpenServiceW : Unknown @ 0x75002431 (jmp 0xfed15a45|jmp 0xffffe15a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ADVAPI32.dll - CryptAcquireContextW : Unknown @ 0x75003699 (jmp 0xfed157e5|jmp 0xffffcef2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ADVAPI32.dll - CryptCreateHash : Unknown @ 0x75003861 (jmp 0xfed15973|jmp 0xffffcd2a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ADVAPI32.dll - CryptHashData : Unknown @ 0x75003a29 (jmp 0xfed15b53|jmp 0xffffcb62|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ADVAPI32.dll - CryptGetHashParam : Unknown @ 0x75003991 (jmp 0xfed15a73|jmp 0xffffcbfa|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) USER32.dll - SetWindowsHookExW : Unknown @ 0x750017b9 (jmp 0xfd9334ad|jmp 0xffffedd2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) USER32.dll - GetMessageW : Unknown @ 0x75004019 (jmp 0xfd927231|jmp 0xffffc572|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) USER32.dll - PostMessageW : Unknown @ 0x75004149 (jmp 0xfd92fcce|jmp 0xffffc442|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) USER32.dll - SetWinEventHook : Unknown @ 0x750021d1 (jmp 0xfd92fcf5|jmp 0xffffe3ba|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ntdll.dll - NtSetInformationProcess : Unknown @ 0x75002be9 (jmp 0xfd29c514|jmp 0xffffd9a2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ntdll.dll - NtOpenProcessToken : Unknown @ 0x75003bf1 (jmp 0xfd29ddfc|jmp 0xffffc99a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ntdll.dll - NtSetSystemInformation : Unknown @ 0x75002d19 (jmp 0xfd29c534|jmp 0xffffd872|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ntdll.dll - NtQueryInformationToken : Unknown @ 0x75003c89 (jmp 0xfd29dbb4|jmp 0xffffc902|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ntdll.dll - NtDuplicateObject : Unknown @ 0x75001ed9 (jmp 0xfd29c5e4|jmp 0xffffe6b2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ntdll.dll - NtTerminateProcess : Unknown @ 0x75002b51 (jmp 0xfd29c22c|jmp 0xffffda3a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ntdll.dll - NtMapViewOfSection : Unknown @ 0x750015f1 (jmp 0xfd29b96c|jmp 0xffffef9a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ntdll.dll - NtUnmapViewOfSection : Unknown @ 0x75001689 (jmp 0xfd29ac74|jmp 0xffffef02|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ntdll.dll - NtSetContextThread : Unknown @ 0x75001d11 (jmp 0xfd29b74c|jmp 0xffffe87a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ntdll.dll - RtlEqualSid : Unknown @ 0x75003d21 (jmp 0xfd2758ed|jmp 0xffffc86a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ntdll.dll - NtOpenProcess : Unknown @ 0x75001da9 (jmp 0xfd29bfc4|jmp 0xffffe7e2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ntdll.dll - NtCreateFile : Unknown @ 0x750033a1 (jmp 0xfd29dd7c|jmp 0xffffd1ea|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ntdll.dll - RtlCreateProcessParametersEx : Unknown @ 0x75002989 (jmp 0xfd27b838|jmp 0xffffdc02|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ntdll.dll - NtWriteVirtualMemory : Unknown @ 0x75001c79 (jmp 0xfd29b184|jmp 0xffffe912|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ntdll.dll - NtSuspendThread : Unknown @ 0x750020a1 (jmp 0xfd29b7ac|jmp 0xffffe4ea|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ntdll.dll - NtQueueApcThread : Unknown @ 0x75001e41 (jmp 0xfd29bb6c|jmp 0xffffe74a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ntdll.dll - NtCreateThreadEx : Unknown @ 0x750018e9 (jmp 0xfd29c164|jmp 0xffffeca2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ntdll.dll - NtAdjustPrivilegesToken : Unknown @ 0x75003309 (jmp 0xfd29e044|jmp 0xffffd282|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) kernel32.dll - CreateToolhelp32Snapshot : Unknown @ 0x75002009 (jmp 0xfd7a21cf|jmp 0xffffe582|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ntdll.dll - NtVdmControl : Unknown @ 0x75003ee9 (jmp 0xfd29d4c4|jmp 0xffffc6a2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) USER32.dll - GetMessageA : Unknown @ 0x75003f81 (jmp 0xfd9326e8|jmp 0xffffc60a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) USER32.dll - PostMessageA : Unknown @ 0x750040b1 (jmp 0xfd938c6b|jmp 0xffffc4da|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) kernel32.dll - MoveFileExW : Unknown @ 0x75003011 (jmp 0xfd79a109|jmp 0xffffd57a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ADVAPI32.dll - CreateServiceW : Unknown @ 0x75002ab9 (jmp 0xfecfb965|jmp 0xffffdad2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ADVAPI32.dll - ChangeServiceConfigW : Unknown @ 0x750027c1 (jmp 0xfecdf3f5|jmp 0xffffddca|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ADVAPI32.dll - DeleteService : Unknown @ 0x75002691 (jmp 0xfecfb50d|jmp 0xffffdefa|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ADVAPI32.dll - ControlService : Unknown @ 0x750025f9 (jmp 0xfecfb48d|jmp 0xffffdf92|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ntdll.dll - NtLoadDriver : Unknown @ 0x75002c81 (jmp 0xfd29d0cc|jmp 0xffffd90a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ADVAPI32.dll - CryptGenKey : Unknown @ 0x75003731 (jmp 0xfed1a8a8|jmp 0xffffce5a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ADVAPI32.dll - CryptExportKey : Unknown @ 0x750038f9 (jmp 0xfed1a773|jmp 0xffffcc92|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ADVAPI32.dll - CryptImportKey : Unknown @ 0x75003ac1 (jmp 0xfed175ef|jmp 0xffffcaca|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (explorer.exe) ADVAPI32.dll - CryptAcquireContextA : Unknown @ 0x75003601 (jmp 0xfed1a488|jmp 0xffffcf8a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ntdll.dll - NtDuplicateObject : Unknown @ 0x75001ed9 (jmp 0xfd29c5e4|jmp 0xffffe6b2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ntdll.dll - NtTerminateProcess : Unknown @ 0x75002ab9 (jmp 0xfd29c194|jmp 0xffffdad2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ntdll.dll - NtMapViewOfSection : Unknown @ 0x750015f1 (jmp 0xfd29b96c|jmp 0xffffef9a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ntdll.dll - NtUnmapViewOfSection : Unknown @ 0x75001689 (jmp 0xfd29ac74|jmp 0xffffef02|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ntdll.dll - NtSetContextThread : Unknown @ 0x75001d11 (jmp 0xfd29b74c|jmp 0xffffe87a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ntdll.dll - NtProtectVirtualMemory : Unknown @ 0x75004609 (jmp 0xfd29e694|jmp 0xffffbf82|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ntdll.dll - NtQueryInformationToken : Unknown @ 0x75003bf1 (jmp 0xfd29db1c|jmp 0xffffc99a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ntdll.dll - RtlEqualSid : Unknown @ 0x75003c89 (jmp 0xfd275855|jmp 0xffffc902|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ntdll.dll - NtOpenProcessToken : Unknown @ 0x75003b59 (jmp 0xfd29dd64|jmp 0xffffca32|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ntdll.dll - NtSetInformationProcess : Unknown @ 0x75002b51 (jmp 0xfd29c47c|jmp 0xffffda3a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ntdll.dll - NtOpenProcess : Unknown @ 0x75001da9 (jmp 0xfd29bfc4|jmp 0xffffe7e2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ntdll.dll - NtSetSystemInformation : Unknown @ 0x75002c81 (jmp 0xfd29c49c|jmp 0xffffd90a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ntdll.dll - NtOpenFile : Unknown @ 0x750041e1 (jmp 0xfd29e4ac|jmp 0xffffc3aa|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ntdll.dll - RtlCreateProcessParametersEx : Unknown @ 0x750028f1 (jmp 0xfd27b7a0|jmp 0xffffdc9a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ntdll.dll - NtWriteVirtualMemory : Unknown @ 0x75001c79 (jmp 0xfd29b184|jmp 0xffffe912|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ntdll.dll - NtSuspendThread : Unknown @ 0x750020a1 (jmp 0xfd29b7ac|jmp 0xffffe4ea|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ntdll.dll - NtQueueApcThread : Unknown @ 0x75001e41 (jmp 0xfd29bb6c|jmp 0xffffe74a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ntdll.dll - NtCreateThreadEx : Unknown @ 0x750018e9 (jmp 0xfd29c164|jmp 0xffffeca2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ntdll.dll - NtAdjustPrivilegesToken : Unknown @ 0x75003271 (jmp 0xfd29dfac|jmp 0xffffd31a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) kernel32.dll - CreateToolhelp32Snapshot : Unknown @ 0x75002009 (jmp 0xfd7a21cf|jmp 0xffffe582|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) kernel32.dll - MoveFileExW : Unknown @ 0x75002f79 (jmp 0xfd79a071|jmp 0xffffd612|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) MSVCR120.dll - fopen : Unknown @ 0x75004ac9 (jmp 0x9ca2d05|jmp 0xffffbac2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) USER32.dll - GetMessageA : Unknown @ 0x75003f81 (jmp 0xfd9326e8|jmp 0xffffc60a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) USER32.dll - PostMessageA : Unknown @ 0x750040b1 (jmp 0xfd938c6b|jmp 0xffffc4da|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) USER32.dll - PostMessageW : Unknown @ 0x75004149 (jmp 0xfd92fcce|jmp 0xffffc442|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ntdll.dll - NtVdmControl : Unknown @ 0x75003e51 (jmp 0xfd29d42c|jmp 0xffffc73a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ntdll.dll - NtLoadDriver : Unknown @ 0x75002be9 (jmp 0xfd29d034|jmp 0xffffd9a2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) USER32.dll - GetMessageW : Unknown @ 0x75004019 (jmp 0xfd927231|jmp 0xffffc572|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) USER32.dll - SetWinEventHook : Unknown @ 0x750021d1 (jmp 0xfd92fcf5|jmp 0xffffe3ba|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) USER32.dll - SetWindowsHookExW : Unknown @ 0x750017b9 (jmp 0xfd9334ad|jmp 0xffffedd2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ADVAPI32.dll - CryptAcquireContextW : Unknown @ 0x75003601 (jmp 0xfed1574d|jmp 0xffffcf8a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ADVAPI32.dll - CryptAcquireContextA : Unknown @ 0x75003569 (jmp 0xfed1a3f0|jmp 0xffffd022|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ADVAPI32.dll - OpenServiceW : Unknown @ 0x75002431 (jmp 0xfed15a45|jmp 0xffffe15a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ADVAPI32.dll - CloseServiceHandle : Unknown @ 0x75002859 (jmp 0xfed0f25d|jmp 0xffffdd32|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) USER32.dll - SetWindowsHookExA : Unknown @ 0x75001721 (jmp 0xfd90aa15|jmp 0xffffee6a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) urlmon.dll - URLDownloadToFileW : Unknown @ 0x75003ee9 (jmp 0xfdcf1779|jmp 0xffffc6a2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) kernel32.dll - GetStartupInfoA : Unknown @ 0x75003db9 (jmp 0xfd7e1fa9|jmp 0xffffc7d2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) WS2_32.dll - WSASend : Unknown @ 0x750043a9 (jmp 0xfef6ffa3|jmp 0xffffc1e2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ADVAPI32.dll - CryptImportKey : Unknown @ 0x75003a29 (jmp 0xfed17557|jmp 0xffffcb62|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ADVAPI32.dll - CryptCreateHash : Unknown @ 0x750037c9 (jmp 0xfed158db|jmp 0xffffcdc2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ADVAPI32.dll - CryptHashData : Unknown @ 0x75003991 (jmp 0xfed15abb|jmp 0xffffcbfa|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ADVAPI32.dll - CryptGetHashParam : Unknown @ 0x750038f9 (jmp 0xfed159db|jmp 0xffffcc92|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ADVAPI32.dll - CreateServiceW : Unknown @ 0x75002a21 (jmp 0xfecfb8cd|jmp 0xffffdb6a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ADVAPI32.dll - ChangeServiceConfigW : Unknown @ 0x750027c1 (jmp 0xfecdf3f5|jmp 0xffffddca|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ADVAPI32.dll - DeleteService : Unknown @ 0x75002691 (jmp 0xfecfb50d|jmp 0xffffdefa|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (firefox.exe) ADVAPI32.dll - ControlService : Unknown @ 0x750025f9 (jmp 0xfecfb48d|jmp 0xffffdf92|call 0x1fe)

¤¤¤ Navigateurs web : 0 ¤¤¤

¤¤¤ Vérification MBR : ¤¤¤
+++++ PhysicalDrive0: WDC WD5000AAJS-22TKA SCSI Disk Device +++++
--- User ---
[MBR] a0dd5729daf2e9c10b40f19bb971fcf9
[BSP] 96545aae4c3a8e5d84fbb99372be0652 : Windows XP MBR Code
Partition table:
0 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 63 | Size: 476929 MB [Windows XP Bootstrap | Unknown Bootloader]
User = LL1 ... OK
User = LL2 ... OK

+++++ PhysicalDrive1: ST500DM0 02-1BD142 SCSI Disk Device +++++
--- User ---
[MBR] 9d7f91b8c3b09665586c8d3e9fe02770
[BSP] 72194db4cc149f72cade6a473736d86e : Windows Vista/7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 100 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 206848 | Size: 476838 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
User = LL1 ... OK
User = LL2 ... OK


============================================
RKreport_SCN_03242015_170047.log - RKreport_DEL_03242015_170325.log - RKreport_DEL_03242015_170348.log - RKreport_SCN_04172015_024530.log
RKreport_SCN_04202015_112958.log - RKreport_DEL_04202015_113711.log - RKreport_DEL_04202015_113819.log - RKreport_DEL_04202015_113853.log
RKreport_DEL_04202015_113916.log - RKreport_DEL_04202015_113937.log - RKreport_DEL_04202015_113951.log - RKreport_DEL_04202015_114021.log
RKreport_DEL_04202015_114055.log - RKreport_SCN_04272015_022337.log - RKreport_SCN_04282015_175912.log - RKreport_DEL_04282015_180048.log
RKreport_DEL_04282015_180157.log - RKreport_DEL_04282015_180225.log - RKreport_SCN_05042015_074218.log - RKreport_DEL_05042015_074843.log
RKreport_DEL_05042015_074905.log - RKreport_SCN_05112015_111050.log - RKreport_DEL_05112015_111229.log - RKreport_SCN_05152015_193803.log
RKreport_DEL_05152015_193907.log - RKreport_DEL_05152015_194027.log - RKreport_DEL_05152015_194058.log - RKreport_SCN_05192015_000803.log
RKreport_DEL_05192015_001139.log - RKreport_DEL_05192015_001253.log - RKreport_SCN_06112015_060436.log - RKreport_DEL_06112015_060956.log
RKreport_DEL_06112015_061011.log - RKreport_SCN_06142015_032005.log - RKreport_DEL_06142015_033647.log

Publicité


Signaler le contenu de ce document

Publicité