cjoint

Publicité


Publicité

Format du document : text/plain

Prévisualisation

RogueKiller V8.7.1 [Oct 3 2013] par Tigzy
mail : tigzyRKgmailcom
Remontees : http://www.adlice.com/forum/
Site Web : http://www.sur-la-toile.com/RogueKiller/
Blog : http://tigzyrk.blogspot.com/

Systeme d'exploitation : Windows Vista (6.0.6002 Service Pack 2) 32 bits version
Demarrage : Mode normal
Utilisateur : Mon PC [Droits d'admin]
Mode : Recherche -- Date : 10/09/2013 08:43:58
| ARK || FAK || MBR |

¤¤¤ Processus malicieux : 0 ¤¤¤

¤¤¤ Entrees de registre : 7 ¤¤¤
[DNS][PUM] HKLM\[...]\CCSet\[...]\{650E8E9D-8E32-49D8-8AB1-E9680577CBFE} : NameServer (178.33.41.181,88.191.223.122) -> TROUVÉ
[DNS][PUM] HKLM\[...]\CS001\[...]\{650E8E9D-8E32-49D8-8AB1-E9680577CBFE} : NameServer (178.33.41.181,88.191.223.122) -> TROUVÉ
[DNS][PUM] HKLM\[...]\CS003\[...]\{650E8E9D-8E32-49D8-8AB1-E9680577CBFE} : NameServer (178.33.41.181,88.191.223.122) -> TROUVÉ
[HJ DESK][PUM] HKCU\[...]\ClassicStartMenu : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> TROUVÉ
[HJ DESK][PUM] HKCU\[...]\ClassicStartMenu : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> TROUVÉ
[HJ DESK][PUM] HKCU\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> TROUVÉ
[HJ DESK][PUM] HKCU\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> TROUVÉ

¤¤¤ Tâches planifiées : 0 ¤¤¤

¤¤¤ Entrées Startup : 0 ¤¤¤

¤¤¤ Navigateurs web : 0 ¤¤¤

¤¤¤ Fichiers / Dossiers particuliers: ¤¤¤

¤¤¤ Driver : [CHARGE] ¤¤¤
[Inline] EAT @explorer.exe (FwDoNothingOnObject) : FirewallAPI.dll -> HOOKED (Unknown @ 0x366D2466)
[Inline] EAT @explorer.exe (FwEnableMemTracing) : FirewallAPI.dll -> HOOKED (Unknown @ 0x366D2466)
[Inline] EAT @explorer.exe (FwSetMemLeakPolicy) : FirewallAPI.dll -> HOOKED (Unknown @ 0x366D2466)
[Inline] EAT @explorer.exe (??_7CWbemInstance@@6BCClassPartContainer@@@) : fastprox.dll -> HOOKED (Unknown @ 0xE77D80FD)

¤¤¤ Ruches Externes: ¤¤¤

¤¤¤ Infection : ¤¤¤

¤¤¤ Fichier HOSTS: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts


127.0.0.1 localhost


¤¤¤ MBR Verif: ¤¤¤

+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) (Lecteurs de disque standard) - SAMSUNG HD321KJ ATA Device +++++
--- User ---
[MBR] e4a8037a84657cc20e314a341a004094
[BSP] 4cac2c5e93260ada96655c5b05da9ba0 : Windows Vista MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 152681 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 312692736 | Size: 152562 Mo
User = LL1 ... OK!
User = LL2 ... OK!

Termine : << RKreport[0]_S_10092013_084358.txt >>





Publicité


Signaler le contenu de ce document

Publicité