RogueKiller V8.4.4 [Feb 1 2013] par Tigzy
mail : tigzyRK<at>gmail<dot>com
Remontees : http://www.sur-la-toile.com/discussion-193725-1--RogueKiller-Remontees.html
Site Web : http://www.sur-la-toile.com/RogueKiller/
Blog : http://tigzyrk.blogspot.com/

Systeme d'exploitation : Windows Vista (6.0.6002 Service Pack 2) 32 bits version
Demarrage : Mode normal
Utilisateur : Marina [Droits d'admin]
Mode : Recherche -- Date : 01/02/2013 21:18:08
| ARK || MBR |

¤¤¤ Processus malicieux : 0 ¤¤¤

¤¤¤ Entrees de registre : 0 ¤¤¤

¤¤¤ Fichiers / Dossiers particuliers: ¤¤¤

¤¤¤ Driver : [CHARGE] ¤¤¤
SSDT[75] : NtCreateSection @ 0x81E43E35 -> HOOKED (Unknown @ 0x8B950E4E)
SSDT[276] : NtRequestWaitReplyPort @ 0x81E55FE0 -> HOOKED (Unknown @ 0x8B950E58)
SSDT[289] : NtSetContextThread @ 0x81EA510B -> HOOKED (Unknown @ 0x8B950E53)
SSDT[314] : NtSetSecurityObject @ 0x81DD203C -> HOOKED (Unknown @ 0x8B950E5D)
SSDT[332] : NtSystemDebugControl @ 0x81E0AEF1 -> HOOKED (Unknown @ 0x8B950E62)
SSDT[334] : NtTerminateProcess @ 0x81E03173 -> HOOKED (Unknown @ 0x8B950DEF)
S_SSDT[573] : NtUserSetWindowsHookEx -> HOOKED (Unknown @ 0x8B950E76)
S_SSDT[576] : NtUserSetWinEventHook -> HOOKED (Unknown @ 0x8B950E7B)

¤¤¤ Fichier HOSTS: ¤¤¤
--> C:\Windows\system32\drivers\etc\hosts

127.0.0.1 localhost
::1 localhost


¤¤¤ MBR Verif: ¤¤¤

+++++ PhysicalDrive0: +++++
--- User ---
[MBR] a81f32cb306340cce1d9a72c16207035
[BSP] f38582cb8fa493e99ef3cf6315a112df : Windows Vista MBR Code
Partition table:
0 - [XXXXXX] ACER (0x27) [VISIBLE] Offset (sectors): 63 | Size: 6997 Mo
1 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 14329980 | Size: 72990 Mo
2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 163814805 | Size: 72637 Mo
User = LL1 ... OK!
User = LL2 ... OK!

Termine : << RKreport[3]_S_01022013_211808.txt >>
RKreport[1]_S_31012013_203748.txt ; RKreport[2]_D_31012013_204302.txt ; RKreport[3]_S_01022013_211808.txt