cjoint

Publicité


Publicité

Format du document : text/plain

Prévisualisation

RogueKiller V12.3.0.0 (x64) [May 22 2016] (Gratuit) par Adlice Software
email : http://www.adlice.com/contact/
Remontées : http://forum.adlice.com
Site web : http://www.adlice.com/fr/logiciels/roguekiller/
Blog : http://www.adlice.com

Système d'exploitation : Windows 10 (10.0.10586) 64 bits version
Démarré en : Mode normal
Utilisateur : perli_0n1lb8s [Administrateur]
Démarré depuis : C:\Program Files\RogueKiller\RogueKiller64.exe
Mode : Scan -- Date : 05/24/2016 19:54:43

¤¤¤ Processus : 5 ¤¤¤
[Suspicious.Path|VT.PUP.Optional.VBates] Gooffo.exe(2440) -- C:\Users\perli_0n1lb8s\AppData\Roaming\Gooffo\Gooffo.exe[x] -> Trouvé(e)
[Suspicious.Path|VT.Trojan.Win64.Agent.fze] Onetx.exe(4780) -- C:\Users\perli_0n1lb8s\AppData\Roaming\Gooffo\Onetx.exe[x] -> Trouvé(e)
[Suspicious.Path|VT.Generic_r.BDA] Khdibfho.exe(4804) -- C:\Users\perli_0n1lb8s\AppData\Roaming\Gooffo\Khdibfho.exe[x] -> Trouvé(e)
[Suspicious.Path|VT.Generic_r.INC] Onetx.dll(4584) -- C:\Users\perli_0n1lb8s\AppData\Roaming\Gooffo\Onetx.dll[x] -> Trouvé(e)
[Suspicious.Path|VT.PUP.Optional.VBates] (SVC) Potyon -- "C:\Users\perli_0n1lb8s\AppData\Roaming\Gooffo\Gooffo.exe" -cms[x] -> Trouvé(e)

¤¤¤ Registre : 6 ¤¤¤
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\catchme (\??\C:\Users\PERLI_~2\AppData\Local\Temp\catchme.sys) -> Trouvé(e)
[Suspicious.Path|VT.PUP.Optional.VBates] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Potyon ("C:\Users\perli_0n1lb8s\AppData\Roaming\Gooffo\Gooffo.exe" -cms) -> Trouvé(e)
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\catchme (\??\C:\Users\PERLI_~2\AppData\Local\Temp\catchme.sys) -> Trouvé(e)
[Suspicious.Path|VT.PUP.Optional.VBates] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Potyon ("C:\Users\perli_0n1lb8s\AppData\Roaming\Gooffo\Gooffo.exe" -cms) -> Trouvé(e)
[PUM.Proxy] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NlaSvc\Parameters\Internet\ManualProxies | (default) : -> Trouvé(e)
[PUM.Proxy] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\NlaSvc\Parameters\Internet\ManualProxies | (default) : -> Trouvé(e)

¤¤¤ Tâches : 0 ¤¤¤

¤¤¤ Fichiers : 0 ¤¤¤

¤¤¤ Fichier Hosts : 0 ¤¤¤

¤¤¤ Antirootkit : 0 (Driver: Chargé) ¤¤¤

¤¤¤ Navigateurs web : 0 ¤¤¤

¤¤¤ Vérification MBR : ¤¤¤
+++++ PhysicalDrive0: WDC WD10JPVX-22JC3T0 +++++
--- User ---
[MBR] 4fd4631d8bc904fad114d8337a9f4e0a
[BSP] df4f83c1f72e36823a12b0dfc7617313 : Empty MBR Code
Partition table:
0 - EFI system partition | Offset (sectors): 2048 | Size: 100 MB
1 - Microsoft reserved partition | Offset (sectors): 206848 | Size: 128 MB
2 - Basic data partition | Offset (sectors): 468992 | Size: 477705 MB
3 - [SYSTEM] | Offset (sectors): 1501120512 | Size: 450 MB
4 - [SYSTEM] | Offset (sectors): 1502042112 | Size: 450 MB
5 - Basic data partition | Offset (sectors): 1502963712 | Size: 39999 MB
6 - Basic data partition | Offset (sectors): 1584883712 | Size: 89999 MB
7 - Basic data partition | Offset (sectors): 1769203712 | Size: 89999 MB
User = LL1 ... OK
User = LL2 ... OK

+++++ PhysicalDrive1: Generic- Multi-Card USB Device +++++
Error reading User MBR! ([15] Le périphérique n?est pas prêt. )
Error reading LL1 MBR! NOT VALID!
Error reading LL2 MBR! ([32] Cette demande n?est pas prise en charge. )


Publicité


Signaler le contenu de ce document

Publicité