Aller au contenu

estelle19

Membres
  • Compteur de contenus

    7
  • Inscription

  • Dernière visite

Autres informations

  • Mes langues
    français

estelle19's Achievements

Junior Member

Junior Member (3/12)

0

Réputation sur la communauté

  1. Tout est redevenu normal je vous remercie pour votre aide; Bonne soirée, encore un grand merci
  2. Malwarebytes' Anti-Malware 1.46 www.malwarebytes.org Version de la base de données: 6267 Windows 6.0.6002 Service Pack 2 Internet Explorer 8.0.6001.19019 04/04/2011 18:36:35 mbam-log-2011-04-04 (18-36-35).txt Type d'examen: Examen complet (C:\|D:\|) Elément(s) analysé(s): 318875 Temps écoulé: 57 minute(s), 38 seconde(s) Processus mémoire infecté(s): 0 Module(s) mémoire infecté(s): 0 Clé(s) du Registre infectée(s): 6 Valeur(s) du Registre infectée(s): 0 Elément(s) de données du Registre infecté(s): 1 Dossier(s) infecté(s): 7 Fichier(s) infecté(s): 23 Processus mémoire infecté(s): (Aucun élément nuisible détecté) Module(s) mémoire infecté(s): (Aucun élément nuisible détecté) Clé(s) du Registre infectée(s): HKEY_CURRENT_USER\SOFTWARE\Cognac (Rogue.Multiple) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\CrucialSoft Ltd (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\fcn (Rogue.Residue) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\Winsudate (Adware.GibMedia) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\MSFox (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Windows Tribute Service (Trojan.Agent) -> Quarantined and deleted successfully. Valeur(s) du Registre infectée(s): (Aucun élément nuisible détecté) Elément(s) de données du Registre infecté(s): HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.114.103 85.255.112.151 -> Quarantined and deleted successfully. Dossier(s) infecté(s): C:\ProgramData\CrucialSoft Ltd\MS AntiSpyware 2009 (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. C:\ProgramData\CrucialSoft Ltd\MS AntiSpyware 2009\BASE (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. C:\ProgramData\CrucialSoft Ltd\MS AntiSpyware 2009\DELETED (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. C:\ProgramData\CrucialSoft Ltd\MS AntiSpyware 2009\LOG (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. C:\ProgramData\CrucialSoft Ltd\MS AntiSpyware 2009\SAVED (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. C:\ProgramData\CrucialSoft Ltd (Rogue.AV2009) -> Quarantined and deleted successfully. C:\Users\Crozes\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\MS AntiSpyware 2009 (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. Fichier(s) infecté(s): C:\ProgramData\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20081221154707120.log (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. C:\ProgramData\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20081221175626643.log (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. C:\ProgramData\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20081221210206983.log (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. C:\ProgramData\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20081222081204155.log (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. C:\ProgramData\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20081222104239755.log (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. C:\ProgramData\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20081223093141919.log (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. C:\ProgramData\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20081223101615553.log (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. C:\ProgramData\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20081223174703255.log (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. C:\ProgramData\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20081224170629156.log (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. C:\ProgramData\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20081224173208881.log (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. C:\ProgramData\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20081224190627377.log (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. C:\ProgramData\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20081225000311421.log (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. C:\ProgramData\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20081225091712733.log (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. C:\ProgramData\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20081225130539561.log (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. C:\ProgramData\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20081225142035800.log (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. C:\ProgramData\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20081225172931257.log (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. C:\ProgramData\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20081225180619000.log (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. C:\ProgramData\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20081225182914508.log (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. C:\Users\Crozes\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\MS AntiSpyware 2009\MS AntiSpyware 2009.lnk (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully. C:\Users\Crozes\AppData\Roaming\Icones\icones_pa.ico (Adware.GibMedia) -> Quarantined and deleted successfully. C:\Windows\System32\nvs2.inf (Adware.EGDAccess) -> Quarantined and deleted successfully. C:\Users\Crozes\Local Settings\Application Data\pkenh_nav.dat (Adware.NaviPromo) -> Quarantined and deleted successfully. C:\Users\Crozes\Local Settings\Application Data\pkenh_navps.dat (Adware.NaviPromo) -> Quarantined and deleted successfully.
  3. RogueKiller V4.3.6 par Tigzy contact sur Forum Sciences / Forum Informatique - Sur la Toile (SLT) mail: tigzyRK<at>gmail<dot>com Remontees: [RogueKiller] Remontées (1/14) Systeme d'exploitation: Windows Vista (6.0.6002 Service Pack 2) 32 bits version Demarrage : Mode normal Utilisateur: Crozes [Droits d'admin] Mode: Raccourcis RAZ -- Date : 04/04/2011 17:01:10 Processus malicieux: 0 Attributs de fichiers restaures: Bureau: Success 0 / Fail 0 Lancement rapide: Success 0 / Fail 0 Programmes: Success 1 / Fail 0 Menu demarrer: Success 1 / Fail 0 Dossier utilisateur: Success 17 / Fail 0 Mes documents: Success 3 / Fail 0 Mes favoris: Success 0 / Fail 0 Mes images: Success 0 / Fail 0 Ma musique: Success 0 / Fail 0 Mes videos: Success 0 / Fail 0 Disques locaux: Success 82 / Fail 4 Termine : << RKreport[3].txt >> RKreport[1].txt ; RKreport[2].txt ; RKreport[3].txt
  4. RogueKiller V4.3.6 par Tigzy contact sur Forum Sciences / Forum Informatique - Sur la Toile (SLT) mail: tigzyRK<at>gmail<dot>com Remontees: [RogueKiller] Remontées (1/14) Systeme d'exploitation: Windows Vista (6.0.6002 Service Pack 2) 32 bits version Demarrage : Mode normal Utilisateur: Crozes [Droits d'admin] Mode: Recherche -- Date : 04/04/2011 16:51:38 Processus malicieux: 1 [APPDT/TMP/DESKTOP] iOp31001oHlJd31001.exe -- c:\programdata\iop31001ohljd31001\iop31001ohljd31001.exe -> KILLED Entrees de registre: 4 [APPDT/TMP/DESKTOP] HKCU\[...]\RunOnce : iOp31001oHlJd31001 (C:\ProgramData\iOp31001oHlJd31001\iOp31001oHlJd31001.exe) -> FOUND [APPDT/TMP/DESKTOP] HKUS\S-1-5-21-1237770374-576763470-3632406773-1000[...]\RunOnce : iOp31001oHlJd31001 (C:\ProgramData\iOp31001oHlJd31001\iOp31001oHlJd31001.exe) -> FOUND [DNS] HKLM\[...]\ControlSet001\Parameters : NameServer (85.255.114.103 85.255.112.151) -> FOUND [DNS] HKLM\[...]\ControlSet003\Parameters : NameServer (85.255.114.103 85.255.112.151) -> FOUND Fichier HOSTS: ::1 localhost Termine : << RKreport[1].txt >> RKreport[1].txt RogueKiller V4.3.6 par Tigzy contact sur Forum Sciences / Forum Informatique - Sur la Toile (SLT) mail: tigzyRK<at>gmail<dot>com Remontees: [RogueKiller] Remontées (1/14) Systeme d'exploitation: Windows Vista (6.0.6002 Service Pack 2) 32 bits version Demarrage : Mode normal Utilisateur: Crozes [Droits d'admin] Mode: Suppression -- Date : 04/04/2011 16:53:54 Processus malicieux: 0 Entrees de registre: 3 [APPDT/TMP/DESKTOP] HKCU\[...]\RunOnce : iOp31001oHlJd31001 (C:\ProgramData\iOp31001oHlJd31001\iOp31001oHlJd31001.exe) -> DELETED [DNS] HKLM\[...]\ControlSet001\Parameters : NameServer (85.255.114.103 85.255.112.151) -> NOT REMOVED, USE DNSFIX [DNS] HKLM\[...]\ControlSet003\Parameters : NameServer (85.255.114.103 85.255.112.151) -> NOT REMOVED, USE DNSFIX Fichier HOSTS: ::1 localhost Termine : << RKreport[2].txt >> RKreport[1].txt ; RKreport[2].txt
  5. bsr je ne peux pas effectuer la restauration système. SVP aidez moi, merci
  6. Bonsoir, merci de votre réponse, mais la restauration système ne marche pas
  7. bonsoir Mon ordi est infecté depuis ce matin. D'après ce que j'ai pu lire sur internet, c'est un faux anti virus, qui cherche à récupérer mes coordonnées bancaires. L'écran est bleu, chaque minute, on me propose de télécharger MS/Removal Tool. Est ce que quelqu'un peux m'aider à virer ce truc de mon ordi, en sachant que je ne suis pas une pro. Merci beaucoup
×
×
  • Créer...