Aller au contenu
  • Pas encore inscrit ?

    Pourquoi ne pas vous inscrire ? C'est simple, rapide et gratuit.
    Pour en savoir plus, lisez Les avantages de l'inscription... et la Charte de Zébulon.
    De plus, les messages que vous postez en tant qu'invité restent invisibles tant qu'un modérateur ne les a pas validés. Inscrivez-vous, ce sera un gain de temps pour tout le monde, vous, les helpeurs et les modérateurs ! :wink:

Messages recommandés

Posté(e)

bonjour et au secours

je me retrouve avec un virus impossible a supprimer : vundo.gen.g

c'est quoi cette bestiole???????????? :P

je ne retrouve plus mon disque C :P

qqu'n peut il m'aider?????? merci d'avance et bon week end

marie Agnes

Posté(e)

Bonjour,

 

Téléchargez Malwarebytes' Anti-Malware (MBAM)

 

* Double cliquez sur l'icône Download_mbam-setup.exe pour lancer le processus d'installation.

Enregistrez le sur le bureau .

Fermer toutes les fenêtres et programmes

Suivez les indications (en particulier le choix de la langue et l'autorisation d'accession à Internet)

N'apportez aucune modification aux réglages par défaut et, en fin d'installation,

Vérifiez que les options Update Malwarebytes' Anti-Malware et Launch Malwarebytes' Anti-Malware sont cochées

MBAM démarrera automatiquement et enverra un message demandant à mettre à jour le programme avant de lancer une analyse.

cliquer sur OK pour fermer la boîte de dialogue..

* Dans l'onglet "mise à jour", cliquez sur le bouton Recherche de mise à jour:

Si le pare-feu demande l'autorisation à MBAM de se connecter, acceptez.

* Une fois la mise à jour terminée, allez dans l'onglet Recherche.

* Sélectionnez "Exécuter un examen complet"

* Cliquez sur "Rechercher"

* .L' analyse prendra un certain temps, soyez patient !

* A la fin , un message affichera :

L'examen s'est terminé normalement.

 

*Si MBAM n'a rien trouvé, il le dira aussi.

Cliquez sur "Ok" pour poursuivre.

*Fermez les navigateurs.

Cliquez sur Afficher les résultats .

 

*Sélectionnez tout et cliquez sur Supprimer la sélection,

MBAM va détruire les fichiers et clés de registre et en mettre une copie dans la quarantaine.

puis ouvrir le Bloc-notes et y copier le rapport d'analyse qui peut être retrouvé sous l'onglet Rapports/logs.

* Copiez-collez ce rapport dans la prochaine réponse.

 

Télécharger Antivir

NB : le choix d'Antivir comme antivirus à utiliser dans le cadre de cette procédure, a reposé sur les critères suivants :

--- failles de votre antivirus qui a laissé passer des malwares

--- En mode sans échec ,seuls les processus systèmes sont lancés.Il est donc plus facile de supprimer les infections

--- Antivir peut-être installé et désinstallé facilement

--- Antivir est reconnu pour son efficacité en mode sans échec

 

Paramètres conseillés

Clic droit sur le parapluie->Configure

Cliquer Expert mode->Scan:

Cocher: All files

Additionnal Settings:tout cocher

Clic sur scan +

Action for concerning files:

Cocher

copie file to quarantine before action

Primary action...................: repair => au cas ou ce serait un fichier système corrompu

Secondary action.................: delete => s'il y a détection, autant supprimer. une sauvegarde sera dans la quarantaine

 

Désactivez votre antivirus actuel

Redémarrez en mode sans échec.

Lancez le scan

Postez le rapport

Posté(e)

MERCI BCP DE VOTRE AIDE

9A Y EST MON PC EST REDEVENU PERFORMANT

VOICI LE RAPPORT QUE VOUS M4AVEZ DEMANDER D4ENVOYER

BIEN AMICALEMENT

MARIE AGNES

 

 

 

 

 

Malwarebytes' Anti-Malware 1.24

Version de la base de données: 1022

Windows 5.1.2600 Service Pack 2

 

16:04:48 04/08/2008

mbam-log-8-4-2008 (16-04-48).txt

 

Type de recherche: Examen complet (C:\|E:\|)

Eléments examinés: 83942

Temps écoulé: 48 minute(s), 47 second(s)

 

Processus mémoire infecté(s): 0

Module(s) mémoire infecté(s): 3

Clé(s) du Registre infectée(s): 34

Valeur(s) du Registre infectée(s): 17

Elément(s) de données du Registre infecté(s): 52

Dossier(s) infecté(s): 12

Fichier(s) infecté(s): 115

 

Processus mémoire infecté(s):

(Aucun élément nuisible détecté)

 

Module(s) mémoire infecté(s):

C:\WINDOWS\system32\ctvloqsv.dll (Trojan.Vundo) -> Delete on reboot.

C:\WINDOWS\system32\dwewty.dll (Trojan.Vundo) -> Delete on reboot.

C:\WINDOWS\system32\byXRhgFU.dll (Trojan.Vundo) -> Delete on reboot.

 

Clé(s) du Registre infectée(s):

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{68ff5032-f33a-4a44-b6f4-bd47dcd7b5c3} (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{68ff5032-f33a-4a44-b6f4-bd47dcd7b5c3} (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b4b0866e-92d3-4d1c-aab5-0d34fa6aabcc} (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{b4b0866e-92d3-4d1c-aab5-0d34fa6aabcc} (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c1b9d7f9-6b21-44b2-be34-ddb11c5c75d9} (Trojan.BHO) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{c1b9d7f9-6b21-44b2-be34-ddb11c5c75d9} (Trojan.BHO) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{f7d09218-46d7-4d3d-9b7f-315204cd0836} (Trojan.BHO) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{9034a523-d068-4be8-a284-9df278be776e} (Trojan.Zlob) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{daed9266-8c28-4c1c-8b58-5c66eff1d302} (Search.Hijack) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{139c109e-08c6-4b60-9142-860b8cd5d000} (Rogue.Virus.Ranger) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{679b00b5-0783-4de4-a478-7227fdd50825} (Rogue.Multiple) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{90b5a95a-afd5-4d11-b9bd-a69d53d22226} (Adware.Hotbar) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{8109fd3d-d891-4f80-8339-50a4913ace6f} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{85e06077-c824-43d0-a8dc-5efb17bc348a} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Typelib\{5937cd7f-1c0b-41e1-9075-60ebdf3c7d34} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\mailskinner (Adware.EGDAccess) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\antivirus 2008 pro (Rogue.Antivirus2008) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Software Notifier (Rogue.Multiple) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\byxrhgfu (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\webvideo (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_FMTR (Rogue.Multiple) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_FOPF (Rogue.AVSystemShield) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Purchased Products\AntiVirus (Rogue.Multiple) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\aoprndtws (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Purchased Products (Rogue.Multiple) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\multimediaControls.chl (Trojan.Zlob) -> Quarantined and deleted successfully.

 

Valeur(s) du Registre infectée(s):

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\38c28ea3 (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{636f6360-35ba-4603-b7b8-847380eaac76} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{8b87dcc7-9b89-4205-aa82-076b2a1edfe0} (Trojan.Zlob) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Salestart (Rogue.Multiple) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Products\rdomain (Rogue.PCVirusless) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Products\prodname (Rogue.PCVirusless) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Products\compname (Rogue.PCVirusless) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Desktop\General\backupwallpaper (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Desktop\General\wallpaper (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\Control Panel\Desktop\wallpaper (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\Control Panel\Desktop\originalwallpaper (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\Control Panel\Desktop\convertedwallpaper (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\Control Panel\Desktop\scrnsave.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Desktop\Components\0\source (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{c1b9d7f9-6b21-44b2-be34-ddb11c5c75d9} (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow\*.securewebinfo.com (Trojan.Zlob) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow\*.safetyincludes.com (Trojan.Zlob) -> Quarantined and deleted successfully.

 

Elément(s) de données du Registre infecté(s):

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.124 85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{1a08da7d-91ca-464c-b703-da4416b1005b}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{3b1d8187-9e4c-4fe4-a60f-982498a84ac8}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{3b1d8187-9e4c-4fe4-a60f-982498a84ac8}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{3beac7b8-88a5-4a60-8420-d2764005af54}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{641054a7-5b0b-47df-8f18-2403dcf865d1}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{641054a7-5b0b-47df-8f18-2403dcf865d1}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{7d0985bd-3d12-4ef8-9a92-1bb234323d25}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{7d0985bd-3d12-4ef8-9a92-1bb234323d25}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{d8c2e78d-6b9b-464f-b25d-7a4595645097}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{f6421814-8a1e-47f9-ba4b-879eec883604}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{f6421814-8a1e-47f9-ba4b-879eec883604}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.124 85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{1a08da7d-91ca-464c-b703-da4416b1005b}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{3b1d8187-9e4c-4fe4-a60f-982498a84ac8}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{3b1d8187-9e4c-4fe4-a60f-982498a84ac8}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{3beac7b8-88a5-4a60-8420-d2764005af54}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{641054a7-5b0b-47df-8f18-2403dcf865d1}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{641054a7-5b0b-47df-8f18-2403dcf865d1}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{7d0985bd-3d12-4ef8-9a92-1bb234323d25}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{7d0985bd-3d12-4ef8-9a92-1bb234323d25}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{d8c2e78d-6b9b-464f-b25d-7a4595645097}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{f6421814-8a1e-47f9-ba4b-879eec883604}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{f6421814-8a1e-47f9-ba4b-879eec883604}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.124 85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces\{1a08da7d-91ca-464c-b703-da4416b1005b}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces\{3b1d8187-9e4c-4fe4-a60f-982498a84ac8}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces\{3b1d8187-9e4c-4fe4-a60f-982498a84ac8}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces\{3beac7b8-88a5-4a60-8420-d2764005af54}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces\{641054a7-5b0b-47df-8f18-2403dcf865d1}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces\{641054a7-5b0b-47df-8f18-2403dcf865d1}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces\{7d0985bd-3d12-4ef8-9a92-1bb234323d25}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces\{7d0985bd-3d12-4ef8-9a92-1bb234323d25}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces\{d8c2e78d-6b9b-464f-b25d-7a4595645097}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces\{f6421814-8a1e-47f9-ba4b-879eec883604}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces\{f6421814-8a1e-47f9-ba4b-879eec883604}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.124,85.255.112.165 -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page (Hijack.Homepage) -> Bad: (http://softwarereferral.com/jump.php?wmid=6010&mid=MjI6Ojg5&lid=2) Good: (http://www.google.com/) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProductId (Trojan.FakeAlert) -> Bad: (VIRUS ALERT!) Good: (76412-OEM-0067582-93382) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\Control Panel\International\sTimeFormat (Trojan.FakeAlert) -> Bad: (HH:mm: VIRUS ALERT!) Good: (HH:mm:ss) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowControlPanel (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowRun (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowSearch (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowHelp (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowMyDocs (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowMyComputer (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoStartMenuMorePrograms (Hijack.StartMenu) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\StartMenuLogOff (Hijack.StartMenu) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDrives (Hijack.Drives) -> Bad: (12) Good: (0) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoToolbarCustomize (Hijack.Explorer) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetFolders (Hijack.Explorer) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoDispCPL (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

 

Dossier(s) infecté(s):

C:\Program Files\VirusRanger (Rogue.Virus.Ranger) -> Quarantined and deleted successfully.

C:\WINDOWS\privacy_danger (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\WINDOWS\privacy_danger\images (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\Program Files\MailSkinner (Adware.EGDAccess) -> Quarantined and deleted successfully.

C:\WINDOWS\msskinner (Adware.EGDAccess) -> Quarantined and deleted successfully.

C:\Program Files\Helper (Adware.BHO) -> Quarantined and deleted successfully.

C:\Program Files\ISecurity (Rouge.ISecurity) -> Quarantined and deleted successfully.

C:\Program Files\Antivirus 2008 PRO (Rogue.Antivirus2008) -> Quarantined and deleted successfully.

C:\Program Files\Antivirus 2008 PRO\Infected (Rogue.Antivirus2008) -> Quarantined and deleted successfully.

C:\Program Files\Antivirus 2008 PRO\Suspicious (Rogue.Antivirus2008) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SalesMonitor (Rogue.Multiple) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SalesMonitor\Data (Rogue.Multiple) -> Quarantined and deleted successfully.

 

Fichier(s) infecté(s):

C:\WINDOWS\system32\dwewty.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\jkkLEVll.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\llVELkkj.ini (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\llVELkkj.ini2 (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ctvloqsv.dll (Trojan.Vundo) -> Delete on reboot.

C:\WINDOWS\system32\vsqolvtc.ini (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\byXRhgFU.dll (Trojan.BHO) -> Delete on reboot.

C:\Documents and Settings\André\Local Settings\Temporary Internet Files\Content.IE5\1J89THIU\ico[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\André\Local Settings\Temporary Internet Files\Content.IE5\CTNRQ8Q2\ico[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\André\Local Settings\Temporary Internet Files\Content.IE5\CTNRQ8Q2\ico[2] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP1\A0000003.scr (Trojan.Agent) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP10\A0014069.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP10\A0014070.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP10\A0014339.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP10\A0014340.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP10\A0014341.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP10\A0014342.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP10\A0014343.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP10\A0014344.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP10\A0014400.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP10\A0014401.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP10\A0014399.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP4\A0002024.scr (Trojan.Agent) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP4\A0003030.scr (Trojan.Agent) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP5\A0003128.scr (Trojan.Agent) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP5\A0003131.dll (Trojan.BHO) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP6\A0003194.exe (Rogue.Installer) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP6\A0003155.exe (Rogue.Installer) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP6\A0003156.cpl (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP6\A0003158.dll (Trojan.BHO) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP6\A0003159.exe (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP6\A0003162.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP6\A0003163.scr (Trojan.Agent) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP6\A0003175.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP6\A0003179.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP6\A0003180.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP6\A0003181.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP6\A0003182.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP6\A0003183.dll (Trojan.Clicker) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP6\A0003201.scr (Trojan.Agent) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP6\A0003216.scr (Trojan.Agent) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP7\A0004211.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP7\A0004218.scr (Trojan.Agent) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP7\A0004234.scr (Trojan.Agent) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP7\A0004247.scr (Trojan.Agent) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP7\A0005310.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP7\A0008472.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP7\A0008530.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP7\A0008571.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP7\A0008622.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP7\A0009647.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP7\A0011709.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP7\A0011734.exe (Rogue.Installer) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP7\A0011764.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP8\A0012949.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP9\A0012970.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP9\A0014021.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{5683FB91-A644-4C5F-9B0B-C9B7EB41B90C}\RP9\A0014042.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\oxqxyk.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\blackster.scr (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\iSecurity(2).cpl (Rogue.ISecurity) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\mivcwiyg.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\pupahuls.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Program Files\VirusRanger\result.lst (Rogue.Virus.Ranger) -> Quarantined and deleted successfully.

C:\Program Files\VirusRanger\sdebug.log (Rogue.Virus.Ranger) -> Quarantined and deleted successfully.

C:\Program Files\VirusRanger\updater.plb (Rogue.Virus.Ranger) -> Quarantined and deleted successfully.

C:\WINDOWS\privacy_danger\index.htm (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\WINDOWS\privacy_danger\images\capt.gif (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\WINDOWS\privacy_danger\images\danger.jpg (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\WINDOWS\privacy_danger\images\down.gif (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\WINDOWS\privacy_danger\images\spacer.gif (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\Program Files\MailSkinner\uninst.exe (Adware.EGDAccess) -> Quarantined and deleted successfully.

C:\WINDOWS\msskinner\msbackup.dat (Adware.EGDAccess) -> Quarantined and deleted successfully.

C:\Program Files\ISecurity\axpdefender.bmp (Rouge.ISecurity) -> Quarantined and deleted successfully.

C:\Program Files\ISecurity\axpdefenderi.bmp (Rouge.ISecurity) -> Quarantined and deleted successfully.

C:\Program Files\ISecurity\axpfixer.bmp (Rouge.ISecurity) -> Quarantined and deleted successfully.

C:\Program Files\ISecurity\axpfixeri.bmp (Rouge.ISecurity) -> Quarantined and deleted successfully.

C:\Program Files\ISecurity\iSecurity.dat (Rouge.ISecurity) -> Quarantined and deleted successfully.

C:\Program Files\ISecurity\iSecurity.html (Rouge.ISecurity) -> Quarantined and deleted successfully.

C:\Program Files\ISecurity\systemdefender.bmp (Rouge.ISecurity) -> Quarantined and deleted successfully.

C:\Program Files\ISecurity\systemdefenderi.bmp (Rouge.ISecurity) -> Quarantined and deleted successfully.

C:\Program Files\Antivirus 2008 PRO\vscan.tsi (Rogue.Antivirus2008) -> Quarantined and deleted successfully.

C:\Program Files\Antivirus 2008 PRO\zlib.dll (Rogue.Antivirus2008) -> Quarantined and deleted successfully.

C:\Program Files\Fichiers communs\ProtectionAssuree\stmon.exe (Rogue.Multiple) -> Delete on reboot.

C:\Documents and Settings\André\Application Data\Microsoft\Internet Explorer\Quick Launch\Antivirus-2008pro.lnk (Rogue.Antivirus2008) -> Quarantined and deleted successfully.

C:\WINDOWS\cookies.ini (Malware.Trace) -> Quarantined and deleted successfully.

C:\WINDOWS\Fonts\48ways.zip (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\WINDOWS\Fonts\amandine.zip (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\WINDOWS\Fonts\bonnet.zip (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\WINDOWS\Fonts\champagne.zip (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\WINDOWS\Fonts\cocksure.zip (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\WINDOWS\Fonts\comix_cuties.zip (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\WINDOWS\Fonts\exmouth.zip (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\WINDOWS\Fonts\fantasy_clipart.zip (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\WINDOWS\Fonts\mythologicals_one.zip (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\WINDOWS\Fonts\pf_snowman.zip (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\WINDOWS\Fonts\psuedo_saudi.zip (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\WINDOWS\Fonts\that_luvin_feelin.zip (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\WINDOWS\Fonts\vintage_erotique.zip (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ljJAPJYq.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\clkcnt.txt (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\xmpstean.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ctfmonb.bmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\nvs2.inf (Adware.EGDAccess) -> Quarantined and deleted successfully.

C:\Documents and Settings\Cécile\Bureau\Spyware&Malware Protection.url (Rogue.Link) -> Quarantined and deleted successfully.

C:\Documents and Settings\André\Bureau\Spyware&Malware Protection.url (Rogue.Link) -> Quarantined and deleted successfully.

C:\Documents and Settings\André\Bureau\Privacy Protector.url (Rogue.Link) -> Quarantined and deleted successfully.

C:\Documents and Settings\Cécile\Bureau\Error Cleaner.url (Rogue.Link) -> Quarantined and deleted successfully.

C:\Documents and Settings\André\Bureau\Error Cleaner.url (Rogue.Link) -> Quarantined and deleted successfully.

C:\Documents and Settings\Cécile\Favoris\Error Cleaner.url (Rogue.Link) -> Quarantined and deleted successfully.

C:\Documents and Settings\André\Favoris\Error Cleaner.url (Rogue.Link) -> Quarantined and deleted successfully.

C:\Documents and Settings\Cécile\Favoris\Privacy Protector.url (Rogue.Link) -> Quarantined and deleted successfully.

C:\Documents and Settings\André\Favoris\Privacy Protector.url (Rogue.Link) -> Quarantined and deleted successfully.

C:\Documents and Settings\Cécile\Favoris\Spyware&Malware Protection.url (Rogue.Link) -> Quarantined and deleted successfully.

C:\Documents and Settings\André\Favoris\Spyware&Malware Protection.url (Rogue.Link) -> Quarantined and deleted successfully.

Posté(e)

Bonjour,

 

MON PC EST REDEVENU PERFORMANT

 

Tant mieux, mais ce n'est pas fini.

 

la restauration Système est polluée:

 

Désinstallez la Restauration Système.

 

Poste de Travail->Propriétés->Restauration Système.

Cocher la case "Désactiver la Restauration sur tous les lecteurs".

Vous la décocherez ensuite.

Un nouveau point de restauration sera créé.

 

Pour contrôle:

 

*

Téléchargez Hijackthis de TrendMicro.

* Décompressez le dans un dossier à la racine du disque dur

Mais jamais dans un dossier temporaire

renommer ce dossier par exemple Karcher

Sous Vista,,il faut faire clic-droit >> "Exécuter en tant qu'Administrateur" sur Hijackthis.exe sinon HJT tourne mais ne fixe rien.

* Lancer le fichier Hijackthis.exe

* Cliquer sur Do a system scan and save a log file

* Copier-coller le rapport dans un nouveau message ici

 

par sécurité:

 

Télécharger Antivir

NB : le choix d'Antivir comme antivirus à utiliser dans le cadre de cette procédure, a reposé sur les critères suivants :

--- failles de votre antivirus qui a laissé passer des malwares

--- En mode sans échec ,seuls les processus systèmes sont lancés.Il est donc plus facile de supprimer les infections

--- Antivir peut-être installé et désinstallé facilement

--- Antivir est reconnu pour son efficacité en mode sans échec

 

Paramètres conseillés

Clic droit sur le parapluie->Configure

Cliquer Expert mode->Scan:

Cocher: All files

Additionnal Settings:tout cocher

Clic sur scan +

Action for concerning files:

Cocher

copie file to quarantine before action

Primary action...................: repair => au cas ou ce serait un fichier système corrompu

Secondary action.................: delete => s'il y a détection, autant supprimer. une sauvegarde sera dans la quarantaine

 

Désactivez votre antivirus actuel

Redémarrez en mode sans échec.

Lancez le scan

Postez le rapport

  • 2 semaines après...

Rejoindre la conversation

Vous pouvez publier maintenant et vous inscrire plus tard. Si vous avez un compte, connectez-vous maintenant pour publier avec votre compte.
Remarque : votre message nécessitera l’approbation d’un modérateur avant de pouvoir être visible.

Invité
Répondre à ce sujet…

×   Collé en tant que texte enrichi.   Coller en tant que texte brut à la place

  Seulement 75 émoticônes maximum sont autorisées.

×   Votre lien a été automatiquement intégré.   Afficher plutôt comme un lien

×   Votre contenu précédent a été rétabli.   Vider l’éditeur

×   Vous ne pouvez pas directement coller des images. Envoyez-les depuis votre ordinateur ou insérez-les depuis une URL.

  • En ligne récemment   0 membre est en ligne

    • Aucun utilisateur enregistré regarde cette page.
×
×
  • Créer...