Virus:Raccourcis internet & dossiers disparus
Vanvan75
Messages postés
4
Statut
Membre
-
juju666 Messages postés 38404 Statut Contributeur sécurité -
juju666 Messages postés 38404 Statut Contributeur sécurité -
Bonjour,
Suite au virus Windows Recovery, nettoyé avec Roguekiller et Malwarebytes' Anti-Malware, je ne vois plus mes raccourcis internet ni mes icones de dossiers. Ils existent car ils sont toujours dans C:/Documents and Settings/profil/favoris.
Précision :
Si j'ouvre un Explorer/Options/Affichage/Affichier les fichiers et dossiers cachés, je vois les icones sur le bureau en transparents et mes raccourcis internet sont toujours absents.
Qui peut m'aider svp ?
Merci d'avance...
Suite au virus Windows Recovery, nettoyé avec Roguekiller et Malwarebytes' Anti-Malware, je ne vois plus mes raccourcis internet ni mes icones de dossiers. Ils existent car ils sont toujours dans C:/Documents and Settings/profil/favoris.
Précision :
Si j'ouvre un Explorer/Options/Affichage/Affichier les fichiers et dossiers cachés, je vois les icones sur le bureau en transparents et mes raccourcis internet sont toujours absents.
Qui peut m'aider svp ?
Merci d'avance...
A voir également:
- Virus:Raccourcis internet & dossiers disparus
- Virus mcafee - Accueil - Piratage
- Virus facebook demande d'amis - Accueil - Facebook
- Undisclosed-recipients virus - Guide
- Panda anti virus gratuit - Télécharger - Antivirus & Antimalwares
- Virus informatique - Guide
8 réponses
Systeme d'exploitation: Windows XP (5.1.2600 Service Pack 3) 32 bits version
Demarrage : Mode normal
Utilisateur: XXX [Droits d'admin]
Mode: Suppression -- Date : 16/04/2011 15:51:15
Processus malicieux: 2
[APPDT/TMP/DESKTOP] SQYJBiKnjSxs.exe -- c:\documents and settings\all users\application data\sqyjbiknjsxs.exe -> KILLED
[ROGUE ST] 18472756.exe -- c:\documents and settings\all users\application data\18472756.exe -> KILLED
Entrees de registre: 5
[APPDT/TMP/DESKTOP] HKCU\[...]\Run : SQYJBiKnjSxs (C:\Documents and Settings\All Users\Application Data\SQYJBiKnjSxs.exe) -> DELETED
[HJPOL] HKCU\[...]\System : DisableTaskMgr (1) -> DELETED
[HJPOL] HKLM\[...]\System : DisableTaskMgr (1) -> DELETED
[HJ] HKCU\[...]\ActiveDesktop : NoChangingWallPaper (1) -> REPLACED (0)
[WallPP] HKCU\[...]\Desktop : Wallpaper () -> REPLACED (C:\Documents and Settings\XXX\Local Settings\Application Data\Microsoft\Wallpaper1.bmp)
Fichier HOSTS:
127.0.0.1 localhost
127.0.0.1 www.007guard.com
127.0.0.1 007guard.com
127.0.0.1 008i.com
127.0.0.1 www.008k.com
127.0.0.1 008k.com
127.0.0.1 www.00hq.com
127.0.0.1 00hq.com
127.0.0.1 010402.com
127.0.0.1 www.032439.com
127.0.0.1 032439.com
127.0.0.1 www.1001-search.info
127.0.0.1 1001-search.info
127.0.0.1 www.100888290cs.com
127.0.0.1 100888290cs.com
127.0.0.1 www.100sexlinks.com
127.0.0.1 100sexlinks.com
127.0.0.1 www.10sek.com
127.0.0.1 10sek.com
127.0.0.1 www.123topsearch.com
[...]
Termine : << RKreport[1].txt >>
RKreport[1].txt
Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org
Version de la base de données: 6381
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702
17/04/2011 10:49:46
mbam-log-2011-04-17 (10-49-46).txt
Type d'examen: Examen complet (C:\|D:\|)
Elément(s) analysé(s): 343489
Temps écoulé: 3 heure(s), 44 minute(s), 57 seconde(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 0
Valeur(s) du Registre infectée(s): 20
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 7
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE16F.exe (Trojan.Agent) -> Value: VIE16F.exe -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE170.exe (Trojan.Agent) -> Value: VIE170.exe -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE171.exe (Trojan.Agent) -> Value: VIE171.exe -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE172.exe (Trojan.Agent) -> Value: VIE172.exe -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Antivirus (Rogue.AntiVirus) -> Value: Antivirus -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE1.exe (Trojan.Agent) -> Value: VIE1.exe -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE2.exe (Trojan.Agent) -> Value: VIE2.exe -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE3.exe (Trojan.Agent) -> Value: VIE3.exe -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE4.exe (Trojan.Agent) -> Value: VIE4.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE16F.exe (Trojan.Agent) -> Value: VIE16F.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE170.exe (Trojan.Agent) -> Value: VIE170.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE171.exe (Trojan.Agent) -> Value: VIE171.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE172.exe (Trojan.Agent) -> Value: VIE172.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Antivirus (Rogue.AntiVirus) -> Value: Antivirus -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE1.exe (Trojan.Agent) -> Value: VIE1.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE2.exe (Trojan.Agent) -> Value: VIE2.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE3.exe (Trojan.Agent) -> Value: VIE3.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE4.exe (Trojan.Agent) -> Value: VIE4.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\xrdwbfgn (Trojan.FakeAlert) -> Value: xrdwbfgn -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\dgksvbpn (Trojan.FakeAlert) -> Value: dgksvbpn -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
c:\documents and settings\all users\application data\sqyjbiknjsxs.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\XXX\Bureau\rk_quarantine\sqyjbiknjsxs.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\XXX\local settings\temporary internet files\Content.IE5\JQDC0H3J\about[1].exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\system volume information\_restore{a6fbaa43-4b2e-46d8-9a6b-63cc476aec1c}\rp756\a0732549.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\tgl0bescript\dll\nHTMLn.dll (Trojan.Agent) -> Quarantined and deleted successfully.
c:\tgl0bescript\Scripts\MSNmIRC\dll\nHTMLn.dll (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\XXX\application data\tmprecenticons\ms antivirus.lnk (Rogue.Link) -> Quarantined and deleted successfully.
Demarrage : Mode normal
Utilisateur: XXX [Droits d'admin]
Mode: Suppression -- Date : 16/04/2011 15:51:15
Processus malicieux: 2
[APPDT/TMP/DESKTOP] SQYJBiKnjSxs.exe -- c:\documents and settings\all users\application data\sqyjbiknjsxs.exe -> KILLED
[ROGUE ST] 18472756.exe -- c:\documents and settings\all users\application data\18472756.exe -> KILLED
Entrees de registre: 5
[APPDT/TMP/DESKTOP] HKCU\[...]\Run : SQYJBiKnjSxs (C:\Documents and Settings\All Users\Application Data\SQYJBiKnjSxs.exe) -> DELETED
[HJPOL] HKCU\[...]\System : DisableTaskMgr (1) -> DELETED
[HJPOL] HKLM\[...]\System : DisableTaskMgr (1) -> DELETED
[HJ] HKCU\[...]\ActiveDesktop : NoChangingWallPaper (1) -> REPLACED (0)
[WallPP] HKCU\[...]\Desktop : Wallpaper () -> REPLACED (C:\Documents and Settings\XXX\Local Settings\Application Data\Microsoft\Wallpaper1.bmp)
Fichier HOSTS:
127.0.0.1 localhost
127.0.0.1 www.007guard.com
127.0.0.1 007guard.com
127.0.0.1 008i.com
127.0.0.1 www.008k.com
127.0.0.1 008k.com
127.0.0.1 www.00hq.com
127.0.0.1 00hq.com
127.0.0.1 010402.com
127.0.0.1 www.032439.com
127.0.0.1 032439.com
127.0.0.1 www.1001-search.info
127.0.0.1 1001-search.info
127.0.0.1 www.100888290cs.com
127.0.0.1 100888290cs.com
127.0.0.1 www.100sexlinks.com
127.0.0.1 100sexlinks.com
127.0.0.1 www.10sek.com
127.0.0.1 10sek.com
127.0.0.1 www.123topsearch.com
[...]
Termine : << RKreport[1].txt >>
RKreport[1].txt
Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org
Version de la base de données: 6381
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702
17/04/2011 10:49:46
mbam-log-2011-04-17 (10-49-46).txt
Type d'examen: Examen complet (C:\|D:\|)
Elément(s) analysé(s): 343489
Temps écoulé: 3 heure(s), 44 minute(s), 57 seconde(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 0
Valeur(s) du Registre infectée(s): 20
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 7
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE16F.exe (Trojan.Agent) -> Value: VIE16F.exe -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE170.exe (Trojan.Agent) -> Value: VIE170.exe -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE171.exe (Trojan.Agent) -> Value: VIE171.exe -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE172.exe (Trojan.Agent) -> Value: VIE172.exe -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Antivirus (Rogue.AntiVirus) -> Value: Antivirus -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE1.exe (Trojan.Agent) -> Value: VIE1.exe -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE2.exe (Trojan.Agent) -> Value: VIE2.exe -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE3.exe (Trojan.Agent) -> Value: VIE3.exe -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE4.exe (Trojan.Agent) -> Value: VIE4.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE16F.exe (Trojan.Agent) -> Value: VIE16F.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE170.exe (Trojan.Agent) -> Value: VIE170.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE171.exe (Trojan.Agent) -> Value: VIE171.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE172.exe (Trojan.Agent) -> Value: VIE172.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Antivirus (Rogue.AntiVirus) -> Value: Antivirus -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE1.exe (Trojan.Agent) -> Value: VIE1.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE2.exe (Trojan.Agent) -> Value: VIE2.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE3.exe (Trojan.Agent) -> Value: VIE3.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\VIE4.exe (Trojan.Agent) -> Value: VIE4.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\xrdwbfgn (Trojan.FakeAlert) -> Value: xrdwbfgn -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\dgksvbpn (Trojan.FakeAlert) -> Value: dgksvbpn -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
c:\documents and settings\all users\application data\sqyjbiknjsxs.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\XXX\Bureau\rk_quarantine\sqyjbiknjsxs.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\XXX\local settings\temporary internet files\Content.IE5\JQDC0H3J\about[1].exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\system volume information\_restore{a6fbaa43-4b2e-46d8-9a6b-63cc476aec1c}\rp756\a0732549.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\tgl0bescript\dll\nHTMLn.dll (Trojan.Agent) -> Quarantined and deleted successfully.
c:\tgl0bescript\Scripts\MSNmIRC\dll\nHTMLn.dll (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\XXX\application data\tmprecenticons\ms antivirus.lnk (Rogue.Link) -> Quarantined and deleted successfully.
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
Systeme d'exploitation: Windows XP (5.1.2600 Service Pack 3) 32 bits version
Demarrage : Mode normal
Utilisateur: XXX [Droits d'admin]
Mode: Raccourcis RAZ -- Date : 18/04/2011 22:24:18
Processus malicieux: 0
Attributs de fichiers restaures:
Bureau: Success 26257 / Fail 0
Lancement rapide: Success 7 / Fail 0
Programmes: Success 208 / Fail 0
Menu demarrer: Success 41 / Fail 0
Dossier utilisateur: Success 3563 / Fail 0
Mes documents: Success 0 / Fail 0
Mes favoris: Success 489 / Fail 0
Mes images: Success 0 / Fail 0
Ma musique: Success 0 / Fail 0
Mes videos: Success 0 / Fail 0
Disques locaux: Success 81413 / Fail 0
Termine : << RKreport[3].txt >>
Demarrage : Mode normal
Utilisateur: XXX [Droits d'admin]
Mode: Raccourcis RAZ -- Date : 18/04/2011 22:24:18
Processus malicieux: 0
Attributs de fichiers restaures:
Bureau: Success 26257 / Fail 0
Lancement rapide: Success 7 / Fail 0
Programmes: Success 208 / Fail 0
Menu demarrer: Success 41 / Fail 0
Dossier utilisateur: Success 3563 / Fail 0
Mes documents: Success 0 / Fail 0
Mes favoris: Success 489 / Fail 0
Mes images: Success 0 / Fail 0
Ma musique: Success 0 / Fail 0
Mes videos: Success 0 / Fail 0
Disques locaux: Success 81413 / Fail 0
Termine : << RKreport[3].txt >>
eh ben voilà rebonjour tes doc :p
▶ Tu peux suivre les indications de cette page pour t'aider : https://www.malekal.com/tutorial-otl/
▶ Télécharge http://www.geekstogo.com/forum/files/file/398-otl-oldtimers-list-it/ sur ton bureau.
(Sous Vista/Win7, il faut cliquer droit sur OTL et choisir Exécuter en tant qu'administrateur)
▶ Lance OTL
▶ Sous Personnalisation, copie-colle ce qu'il y a dans le cadre ci-dessous :
▶ Clique sur le bouton Analyse.
▶ Quand le scan est fini, utilise le site http://pjjoint.malekal.com/ pour envoyer les rapports.
Donnes le liens pjjoint ici ensuite pour pouvoir être consultés.
▶ Tu peux suivre les indications de cette page pour t'aider : https://www.malekal.com/tutorial-otl/
▶ Télécharge http://www.geekstogo.com/forum/files/file/398-otl-oldtimers-list-it/ sur ton bureau.
(Sous Vista/Win7, il faut cliquer droit sur OTL et choisir Exécuter en tant qu'administrateur)
▶ Lance OTL
▶ Sous Personnalisation, copie-colle ce qu'il y a dans le cadre ci-dessous :
netsvcs msconfig safebootminimal safebootnetwork activex drivers32 %ALLUSERSPROFILE%\Application Data\*. %ALLUSERSPROFILE%\Application Data\*.exe /s %APPDATA%\*. %APPDATA%\*.exe /s %temp%\.exe /s %SYSTEMDRIVE%\*.exe %systemroot%\*. /mp /s %systemroot%\system32\*.dll /lockedfiles %systemroot%\Tasks\*.job /lockedfiles %systemroot%\system32\drivers\*.sys /lockedfiles %systemroot%\System32\config\*.sav /md5start explorer.exe winlogon.exe wininit.exe /md5stop CREATERESTOREPOINT nslookup www.google.fr /c
▶ Clique sur le bouton Analyse.
▶ Quand le scan est fini, utilise le site http://pjjoint.malekal.com/ pour envoyer les rapports.
Donnes le liens pjjoint ici ensuite pour pouvoir être consultés.
Bonne fin de soirée.