RogueKiller V12.9.9.0 (x64) [Feb 27 2017] (Gratuit) par Adlice Software email : http://www.adlice.com/contact/ Remontées : http://forum.adlice.com Site web : http://www.adlice.com/fr/download/roguekiller/ Blog : http://www.adlice.com Système d'exploitation : Windows 7 (6.1.7601 Service Pack 1) 64 bits version Démarré en : Mode normal Utilisateur : Jessica [Administrateur] Démarré depuis : C:\Program Files\RogueKiller\RogueKiller64.exe Mode : Scan -- Date : 03/06/2017 15:49:11 (Durée : 00:39:19) ¤¤¤ Processus : 0 ¤¤¤ ¤¤¤ Registre : 8 ¤¤¤ [PUM.HomePage] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Start Page : https://www.bing.com/search?FORM=INCOH1&PC=IC05&PTAG=ICO-523b521f -> Trouvé(e) [PUM.HomePage] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Start Page : https://www.bing.com/search?FORM=INCOH1&PC=IC05&PTAG=ICO-523b521f -> Trouvé(e) [PUM.HomePage] (X64) HKEY_USERS\S-1-5-21-2190523299-1361868321-529431404-1000\Software\Microsoft\Internet Explorer\Main | Start Page : https://www.bing.com/search?FORM=INCOH1&PC=IC05&PTAG=ICO-523b521f -> Trouvé(e) [PUM.HomePage] (X86) HKEY_USERS\S-1-5-21-2190523299-1361868321-529431404-1000\Software\Microsoft\Internet Explorer\Main | Start Page : https://www.bing.com/search?FORM=INCOH1&PC=IC05&PTAG=ICO-523b521f -> Trouvé(e) [PUM.Policies] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | ConsentPromptBehaviorAdmin : 0 -> Trouvé(e) [PUM.Policies] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | ConsentPromptBehaviorAdmin : 0 -> Trouvé(e) [PUM.StartMenu] (X64) HKEY_USERS\S-1-5-21-2190523299-1361868321-529431404-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowMyGames : 0 -> Trouvé(e) [PUM.StartMenu] (X86) HKEY_USERS\S-1-5-21-2190523299-1361868321-529431404-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowMyGames : 0 -> Trouvé(e) ¤¤¤ Tâches : 2 ¤¤¤ [Suspicious.Path] %WINDIR%\Tasks\{0DF7BA46-102D-EC41-623D-2A5BBA6CAE9C}.job -- C:\Users\Jessica\AppData\Roaming\UPDATE~1\SYNCVE~1.EXE (/Check) -> Trouvé(e) [Suspicious.Path] \{0DF7BA46-102D-EC41-623D-2A5BBA6CAE9C} -- C:\Users\Jessica\AppData\Roaming\UPDATE~1\SYNCVE~1.EXE (/Check) -> Trouvé(e) ¤¤¤ Fichiers : 0 ¤¤¤ ¤¤¤ WMI : 0 ¤¤¤ ¤¤¤ Fichier Hosts : 0 ¤¤¤ ¤¤¤ Antirootkit : 0 (Driver: Chargé) ¤¤¤ ¤¤¤ Navigateurs web : 2 ¤¤¤ [PUM.SearchEngine][Firefox:Config] vbszo3fy.default : user_pref("browser.search.selectedEngine", "Bing Search Engine"); -> Trouvé(e) [PUM.SearchEngine][Firefox:Config] vbszo3fy.default : user_pref("browser.search.defaultenginename", "Bing Search Engine"); -> Trouvé(e) ¤¤¤ Vérification MBR : ¤¤¤ +++++ PhysicalDrive0: WDC WD7500BPVT-80HXZ SCSI Disk Device +++++ --- User --- [MBR] b5f8662705ce79891b303ddc74103abd [BSP] 3970bee866958bddab39ccf302ad98a2 : Windows Vista/7/8|VT.Unknown MBR Code Partition table: 0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 100 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader] 1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 206848 | Size: 249900 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader] 2 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 512002048 | Size: 465402 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader] User = LL1 ... OK User = LL2 ... OK