Virus windows repair Smart rapport Rogukiller
jamski06
-
jamski06 -
jamski06 -
Bonjour,
Je suis dans le meme cas que petitmoi2 ( virus windows repair, disparition de toutes mes données, photos musique ...etc) jai telecharger Roguekiller, tapez "2[DELETE], mais ensuite je ne comprend pas pour faire "option 6"
Si tu peux m'aider . Merci d'avance
Je suis dans le meme cas que petitmoi2 ( virus windows repair, disparition de toutes mes données, photos musique ...etc) jai telecharger Roguekiller, tapez "2[DELETE], mais ensuite je ne comprend pas pour faire "option 6"
Si tu peux m'aider . Merci d'avance
A voir également:
- Virus windows repair Smart rapport Rogukiller
- Windows repair - Télécharger - Utilitaires
- Clé windows 8 - Guide
- Montage video windows - Guide
- Fin windows 10 - Guide
- Sfc /scannow repair - Guide
4 réponses
Salut,
Relance Roguekiller et tape 6 et entrée.
Poste le rapport ici.
Ensuite :
Voici la procédure à suivre.
Prière de lire attentivement les instructions pour les suivre correctement.
Bien poster les rapports comme demandés afin de pouvoir les analyser.
ETAPE 2:
Télécharge et installe Malwarebyte : https://www.malekal.com/tutoriel-malwarebyte-anti-malware/
Mets le à jour, fais un scan rapide, supprime tout et poste le rapport ici.
!!! Malwarebyte doit être à jour avant de faire le scan !!!
ETAPE 3:
Tu peux suivre les indications de cette page pour t'aider : https://www.malekal.com/tutorial-otl/
* Télécharge http://www.geekstogo.com/forum/files/file/398-otl-oldtimers-list-it/ sur ton bureau.
(Sous Vista/Win7, il faut cliquer droit sur OTL et choisir Exécuter en tant qu'administrateur)
* Lance OTL
* Sous Peronnalisation, copie-colle ce qu'il y a dans le cadre ci-dessous :
netsvcs
msconfig
safebootminimal
safebootnetwork
activex
drivers32
%ALLUSERSPROFILE%\Application Data\*.
%ALLUSERSPROFILE%\Application Data\*.exe /s
%APPDATA%\*.
%APPDATA%\*.exe /s
%temp%\.exe /s
%SYSTEMDRIVE%\*.exe
%systemroot%\*. /mp /s
%systemroot%\system32\*.dll /lockedfiles
%systemroot%\Tasks\*.job /lockedfiles
%systemroot%\system32\drivers\*.sys /lockedfiles
%systemroot%\System32\config\*.sav
/md5start
explorer.exe
winlogon.exe
wininit.exe
/md5stop
CREATERESTOREPOINT
nslookup www.google.fr /c
* Clique sur le bouton Analyse.
* Quand le scan est fini, utilise le site http://pjjoint.malekal.com/ pour envoyer les rapports.
Donnes le liens pjjoint ici ensuite pour pouvoir être consultés.
Relance Roguekiller et tape 6 et entrée.
Poste le rapport ici.
Ensuite :
Voici la procédure à suivre.
Prière de lire attentivement les instructions pour les suivre correctement.
Bien poster les rapports comme demandés afin de pouvoir les analyser.
ETAPE 2:
Télécharge et installe Malwarebyte : https://www.malekal.com/tutoriel-malwarebyte-anti-malware/
Mets le à jour, fais un scan rapide, supprime tout et poste le rapport ici.
!!! Malwarebyte doit être à jour avant de faire le scan !!!
ETAPE 3:
Tu peux suivre les indications de cette page pour t'aider : https://www.malekal.com/tutorial-otl/
* Télécharge http://www.geekstogo.com/forum/files/file/398-otl-oldtimers-list-it/ sur ton bureau.
(Sous Vista/Win7, il faut cliquer droit sur OTL et choisir Exécuter en tant qu'administrateur)
* Lance OTL
* Sous Peronnalisation, copie-colle ce qu'il y a dans le cadre ci-dessous :
netsvcs
msconfig
safebootminimal
safebootnetwork
activex
drivers32
%ALLUSERSPROFILE%\Application Data\*.
%ALLUSERSPROFILE%\Application Data\*.exe /s
%APPDATA%\*.
%APPDATA%\*.exe /s
%temp%\.exe /s
%SYSTEMDRIVE%\*.exe
%systemroot%\*. /mp /s
%systemroot%\system32\*.dll /lockedfiles
%systemroot%\Tasks\*.job /lockedfiles
%systemroot%\system32\drivers\*.sys /lockedfiles
%systemroot%\System32\config\*.sav
/md5start
explorer.exe
winlogon.exe
wininit.exe
/md5stop
CREATERESTOREPOINT
nslookup www.google.fr /c
* Clique sur le bouton Analyse.
* Quand le scan est fini, utilise le site http://pjjoint.malekal.com/ pour envoyer les rapports.
Donnes le liens pjjoint ici ensuite pour pouvoir être consultés.
RogueKiller V4.3.5 par Tigzy
contact sur http://www.sur-la-toile.com
mail: tigzyRK<at>gmail<dot>com
Remontees: http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.html
Systeme d'exploitation: Windows 7 (6.1.7600 ) 32 bits version
Demarrage : Mode normal
Utilisateur: Administrateur [Droits d'admin]
Mode: Raccourcis RAZ -- Date : 31/03/2011 18:51:17
Processus malicieux: 0
Attributs de fichiers restaures:
Bureau: Success 1350 / Fail 0
Lancement rapide: Success 14 / Fail 0
Programmes: Success 168 / Fail 0
Menu demarrer: Success 34 / Fail 0
Dossier utilisateur: Success 1090 / Fail 0
Mes documents: Success 9642 / Fail 19
Mes favoris: Success 34 / Fail 0
Mes images: Success 1 / Fail 0
Ma musique: Success 1 / Fail 0
Mes videos: Success 1 / Fail 0
Disques locaux: Success 37232 / Fail 0
Termine : << RKreport[2].txt >>
RKreport[1].txt ; RKreport[2].txt
contact sur http://www.sur-la-toile.com
mail: tigzyRK<at>gmail<dot>com
Remontees: http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.html
Systeme d'exploitation: Windows 7 (6.1.7600 ) 32 bits version
Demarrage : Mode normal
Utilisateur: Administrateur [Droits d'admin]
Mode: Raccourcis RAZ -- Date : 31/03/2011 18:51:17
Processus malicieux: 0
Attributs de fichiers restaures:
Bureau: Success 1350 / Fail 0
Lancement rapide: Success 14 / Fail 0
Programmes: Success 168 / Fail 0
Menu demarrer: Success 34 / Fail 0
Dossier utilisateur: Success 1090 / Fail 0
Mes documents: Success 9642 / Fail 19
Mes favoris: Success 34 / Fail 0
Mes images: Success 1 / Fail 0
Ma musique: Success 1 / Fail 0
Mes videos: Success 1 / Fail 0
Disques locaux: Success 37232 / Fail 0
Termine : << RKreport[2].txt >>
RKreport[1].txt ; RKreport[2].txt
Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org
Version de la base de données: 6228
Windows 6.1.7600
Internet Explorer 8.0.7600.16385
31/03/2011 22:23:15
mbam-log-2011-03-31 (22-23-15).txt
Type d'examen: Examen rapide
Elément(s) analysé(s): 155195
Temps écoulé: 9 minute(s), 53 seconde(s)
Processus mémoire infecté(s): 1
Module(s) mémoire infecté(s): 2
Clé(s) du Registre infectée(s): 8
Valeur(s) du Registre infectée(s): 1
Elément(s) de données du Registre infecté(s): 1
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 30
Processus mémoire infecté(s):
c:\Windows\Lpypua.exe (Trojan.Downloader) -> 3200 -> Unloaded process successfully.
Module(s) mémoire infecté(s):
c:\Windows\System32\vakduwrp.dll (Trojan.Boaxxe) -> Delete on reboot.
c:\Users\administrateur\AppData\Local\FRPQAP40.dll (Trojan.Hiloti) -> Delete on reboot.
Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOT\CLSID\{D0828677-8006-DDEA-7610-FB08B38B13E6} (Trojan.Boaxxe) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Qtqoayql (Trojan.Boaxxe) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D0828677-8006-DDEA-7610-FB08B38B13E6} (Trojan.Boaxxe) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{D0828677-8006-DDEA-7610-FB08B38B13E6} (Trojan.Boaxxe) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D0828677-8006-DDEA-7610-FB08B38B13E6} (Trojan.Boaxxe) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\NtWqIVLZEWZU (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\OUU6KC5WPX (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\ (Hijack.Zones) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmayamoheyeva (Trojan.Hiloti) -> Value: Rmayamoheyeva -> Delete on reboot.
Elément(s) de données du Registre infecté(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallPaper (PUM.Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
c:\Windows\System32\vakduwrp.dll (Trojan.Boaxxe) -> Delete on reboot.
c:\Users\administrateur\AppData\Local\FRPQAP40.dll (Trojan.Hiloti) -> Delete on reboot.
c:\Windows\Lpypua.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\programdata\36429576.exe (Rogue.FakeHDD) -> Quarantined and deleted successfully.
c:\programdata\lgxjuggkbgeghq.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lm2.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lm3.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lm4.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lm5.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lm6.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lm7.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lm8.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lm9.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lmw.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lmx.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lmy.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lna.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lnb.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lnd.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lne.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lnf.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lng.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lnh.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\msxaorcwne.exe (Adware.Agent) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\emxwsoancr.exe (Trojan.Hiloti) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\rmwaceosxn.exe (Adware.Agent) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\nxwaoscrem.exe (Trojan.Hiloti.Gen) -> Quarantined and deleted successfully.
c:\Users\administrateur\local settings\application data\FRPQAP40.dll (Trojan.Hiloti) -> Delete on reboot.
c:\Windows\Lpypub.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Windows\Lpypuc.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
www.malwarebytes.org
Version de la base de données: 6228
Windows 6.1.7600
Internet Explorer 8.0.7600.16385
31/03/2011 22:23:15
mbam-log-2011-03-31 (22-23-15).txt
Type d'examen: Examen rapide
Elément(s) analysé(s): 155195
Temps écoulé: 9 minute(s), 53 seconde(s)
Processus mémoire infecté(s): 1
Module(s) mémoire infecté(s): 2
Clé(s) du Registre infectée(s): 8
Valeur(s) du Registre infectée(s): 1
Elément(s) de données du Registre infecté(s): 1
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 30
Processus mémoire infecté(s):
c:\Windows\Lpypua.exe (Trojan.Downloader) -> 3200 -> Unloaded process successfully.
Module(s) mémoire infecté(s):
c:\Windows\System32\vakduwrp.dll (Trojan.Boaxxe) -> Delete on reboot.
c:\Users\administrateur\AppData\Local\FRPQAP40.dll (Trojan.Hiloti) -> Delete on reboot.
Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOT\CLSID\{D0828677-8006-DDEA-7610-FB08B38B13E6} (Trojan.Boaxxe) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Qtqoayql (Trojan.Boaxxe) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D0828677-8006-DDEA-7610-FB08B38B13E6} (Trojan.Boaxxe) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{D0828677-8006-DDEA-7610-FB08B38B13E6} (Trojan.Boaxxe) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D0828677-8006-DDEA-7610-FB08B38B13E6} (Trojan.Boaxxe) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\NtWqIVLZEWZU (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\OUU6KC5WPX (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\ (Hijack.Zones) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmayamoheyeva (Trojan.Hiloti) -> Value: Rmayamoheyeva -> Delete on reboot.
Elément(s) de données du Registre infecté(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallPaper (PUM.Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
c:\Windows\System32\vakduwrp.dll (Trojan.Boaxxe) -> Delete on reboot.
c:\Users\administrateur\AppData\Local\FRPQAP40.dll (Trojan.Hiloti) -> Delete on reboot.
c:\Windows\Lpypua.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\programdata\36429576.exe (Rogue.FakeHDD) -> Quarantined and deleted successfully.
c:\programdata\lgxjuggkbgeghq.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lm2.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lm3.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lm4.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lm5.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lm6.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lm7.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lm8.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lm9.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lmw.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lmx.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lmy.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lna.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lnb.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lnd.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lne.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lnf.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lng.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\Lnh.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\msxaorcwne.exe (Adware.Agent) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\emxwsoancr.exe (Trojan.Hiloti) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\rmwaceosxn.exe (Adware.Agent) -> Quarantined and deleted successfully.
c:\Users\administrateur\AppData\Local\Temp\nxwaoscrem.exe (Trojan.Hiloti.Gen) -> Quarantined and deleted successfully.
c:\Users\administrateur\local settings\application data\FRPQAP40.dll (Trojan.Hiloti) -> Delete on reboot.
c:\Windows\Lpypub.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Windows\Lpypuc.exe (Trojan.Downloader) -> Quarantined and deleted successfully.