Bonsoir,
Voilà les rapports de RogueKiller. Il y a deux rapport a quelques secondes d'intervalles
RAPPORT N°1
RogueKiller V7.4.4 [08/05/2012] par Tigzy
mail: tigzyRK<at>gmail<dot>com
Remontees:
http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.htmlBlog:
http://tigzyrk.blogspot.comSysteme d'exploitation: Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Demarrage : Mode sans echec avec prise en charge reseau
Utilisateur: Pierre [Droits d'admin]
Mode: Recherche -- Date: 17/05/2012 18:50:27
¤¤¤ Processus malicieux: 0 ¤¤¤
¤¤¤ Entrees de registre: 4 ¤¤¤
[SUSP PATH] HKCU\[...]\Run : 724788F5 (C:\Users\Pierre\AppData\Roaming\Ryqtnrbl\FA57DD31724788F553DB.exe) -> FOUND
[SUSP PATH] HKUS\S-1-5-21-2683324738-1878827199-1781712137-1000[...]\Run : 724788F5 (C:\Users\Pierre\AppData\Roaming\Ryqtnrbl\FA57DD31724788F553DB.exe) -> FOUND
[HJ] HKCU\[...]\ClassicStartMenu : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
[HJ] HKCU\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
¤¤¤ Fichiers / Dossiers particuliers: ¤¤¤
¤¤¤ Driver: [NON CHARGE] ¤¤¤
¤¤¤ Infection : ¤¤¤
¤¤¤ Fichier HOSTS: ¤¤¤
127.0.0.1 rad.msn.com
127.0.0.1 rad.live.com
¤¤¤ MBR Verif: ¤¤¤
+++++ PhysicalDrive0: ST332041 8AS SATA Disk Device +++++
--- User ---
[MBR] e6645b39177f84c152214ca2d7809e3f
[BSP] 49243d964cfb8c1bd07b6288c92b10fc : Windows 7 MBR Code
Partition table:
0 - [XXXXXX] FAT32 (0x1b) [HIDDEN!] Offset (sectors): 2048 | Size: 15360 Mo
1 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 31459328 | Size: 81920 Mo
2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 199231488 | Size: 207925 Mo
3 - [XXXXXX] UNKNOWN (0xef) [VISIBLE] Offset (sectors): 625061888 | Size: 39 Mo
User = LL1 ... OK!
User = LL2 ... OK!
Termine : << RKreport[1].txt >>
RKreport[1].txt
RAPPORT N°2
RogueKiller V7.4.4 [08/05/2012] par Tigzy
mail: tigzyRK<at>gmail<dot>com
Remontees:
http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.htmlBlog:
http://tigzyrk.blogspot.comSysteme d'exploitation: Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Demarrage : Mode sans echec avec prise en charge reseau
Utilisateur: Pierre [Droits d'admin]
Mode: Recherche -- Date: 17/05/2012 18:50:27
¤¤¤ Processus malicieux: 0 ¤¤¤
¤¤¤ Entrees de registre: 4 ¤¤¤
[SUSP PATH] HKCU\[...]\Run : 724788F5 (C:\Users\Pierre\AppData\Roaming\Ryqtnrbl\FA57DD31724788F553DB.exe) -> FOUND
[SUSP PATH] HKUS\S-1-5-21-2683324738-1878827199-1781712137-1000[...]\Run : 724788F5 (C:\Users\Pierre\AppData\Roaming\Ryqtnrbl\FA57DD31724788F553DB.exe) -> FOUND
[HJ] HKCU\[...]\ClassicStartMenu : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
[HJ] HKCU\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
¤¤¤ Fichiers / Dossiers particuliers: ¤¤¤
¤¤¤ Driver: [NON CHARGE] ¤¤¤
¤¤¤ Infection : ¤¤¤
¤¤¤ Fichier HOSTS: ¤¤¤
127.0.0.1 rad.msn.com
127.0.0.1 rad.live.com
¤¤¤ MBR Verif: ¤¤¤
+++++ PhysicalDrive0: ST332041 8AS SATA Disk Device +++++
--- User ---
[MBR] e6645b39177f84c152214ca2d7809e3f
[BSP] 49243d964cfb8c1bd07b6288c92b10fc : Windows 7 MBR Code
Partition table:
0 - [XXXXXX] FAT32 (0x1b) [HIDDEN!] Offset (sectors): 2048 | Size: 15360 Mo
1 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 31459328 | Size: 81920 Mo
2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 199231488 | Size: 207925 Mo
3 - [XXXXXX] UNKNOWN (0xef) [VISIBLE] Offset (sectors): 625061888 | Size: 39 Mo
User = LL1 ... OK!
User = LL2 ... OK!
Termine : << RKreport[1].txt >>
RKreport[1].txt