A voir également:
- Documents perdu
- Code deverouillage telephone perdu - Guide
- Mot de passe bios perdu - Guide
- Mot de passe administrateur perdu windows 10 - Guide
- Code puk perdu - Guide
- Comment enregistrer un mail dans mes documents - Guide
9 réponses
Ca a fonctionné merci beaucoup
RogueKiller V5.2.2 [05/06/2011] par Tigzy
contact sur http://www.sur-la-toile.com
mail: tigzyRK<at>gmail<dot>com
Remontees: http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.html
Systeme d'exploitation: Windows 7 (6.1.7600 ) 64 bits version
Demarrage : Mode normal
Utilisateur: Nico [Droits d'admin]
Mode: Raccourcis RAZ -- Date : 11/06/2011 01:02:02
Processus malicieux: 2
[SUSP PATH] BDd83B1.exe -- c:\windows\temp\bdd83b1.exe -> KILLED
[SUSP PATH] Nqobaa.exe -- c:\windows\nqobaa.exe -> KILLED
Attributs de fichiers restaures:
Bureau: Success 114 / Fail 0
Lancement rapide: Success 18 / Fail 0
Programmes: Success 2522 / Fail 0
Menu demarrer: Success 30 / Fail 0
Dossier utilisateur: Success 6991 / Fail 0
Mes documents: Success 41 / Fail 0
Mes favoris: Success 45 / Fail 0
Mes images: Success 248 / Fail 0
Ma musique: Success 1346 / Fail 0
Mes videos: Success 23 / Fail 0
Disques locaux: Success 1920 / Fail 0
Sauvegarde: [FOUND] Success 176 / Fail 4
Lecteurs:
[C:] \Device\HarddiskVolume3 -- 0x3 --> Restored
[E:] \Device\CdRom0 -- 0x5 --> Skipped
Termine : << RKreport[3].txt >>
RKreport[1].txt ; RKreport[2].txt ; RKreport[3].txt
RogueKiller V5.2.2 [05/06/2011] par Tigzy
contact sur http://www.sur-la-toile.com
mail: tigzyRK<at>gmail<dot>com
Remontees: http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.html
Systeme d'exploitation: Windows 7 (6.1.7600 ) 64 bits version
Demarrage : Mode normal
Utilisateur: Nico [Droits d'admin]
Mode: Raccourcis RAZ -- Date : 11/06/2011 01:02:02
Processus malicieux: 2
[SUSP PATH] BDd83B1.exe -- c:\windows\temp\bdd83b1.exe -> KILLED
[SUSP PATH] Nqobaa.exe -- c:\windows\nqobaa.exe -> KILLED
Attributs de fichiers restaures:
Bureau: Success 114 / Fail 0
Lancement rapide: Success 18 / Fail 0
Programmes: Success 2522 / Fail 0
Menu demarrer: Success 30 / Fail 0
Dossier utilisateur: Success 6991 / Fail 0
Mes documents: Success 41 / Fail 0
Mes favoris: Success 45 / Fail 0
Mes images: Success 248 / Fail 0
Ma musique: Success 1346 / Fail 0
Mes videos: Success 23 / Fail 0
Disques locaux: Success 1920 / Fail 0
Sauvegarde: [FOUND] Success 176 / Fail 4
Lecteurs:
[C:] \Device\HarddiskVolume3 -- 0x3 --> Restored
[E:] \Device\CdRom0 -- 0x5 --> Skipped
Termine : << RKreport[3].txt >>
RKreport[1].txt ; RKreport[2].txt ; RKreport[3].txt
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
RogueKiller V5.2.2 [05/06/2011] par Tigzy
contact sur http://www.sur-la-toile.com
mail: tigzyRK<at>gmail<dot>com
Remontees: http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.html
Systeme d'exploitation: Windows 7 (6.1.7600 ) 64 bits version
Demarrage : Mode sans echec avec prise en charge reseau
Utilisateur: Nico [Droits d'admin]
Mode: Suppression -- Date : 10/06/2011 23:03:17
Processus malicieux: 0
Entrees de registre: 14
[SUSP PATH] HKCU\[...]\Run : hsRITIwubRlhk (C:\ProgramData\hsRITIwubRlhk.exe) -> DELETED
[SUSP PATH] HKCU\[...]\RunOnce : kD28621PhJpB28621 (C:\ProgramData\kD28621PhJpB28621\kD28621PhJpB28621.exe) -> DELETED
[SUSP PATH] {810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job : c:\windows\nqobaa.exe -> DELETED
[WallPP] HKCU\[...]\Desktop : Wallpaper () -> REPLACED (C:\Users\Nico\AppData\Roaming\Microsoft\Windows\Themes\TranscodedWallpaper.jpg)
[HJ] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ] HKCU\[...]\ClassicStartMenu : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ] HKCU\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)
[HJ] HKCU\[...]\ClassicStartMenu : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)
[HJ] HKCU\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)
[HJ] HKCU\[...]\ClassicStartMenu : {645FF040-5081-101B-9F08-00AA002F954E} (1) -> REPLACED (0)
[HJ] HKCU\[...]\NewStartPanel : {645FF040-5081-101B-9F08-00AA002F954E} (1) -> REPLACED (0)
[FILE ASSO] HKLM\[...]Software\Clients\StartMenuInternet\FIREFOX.EXE\shell\open\command : ("C:\Users\Nico\AppData\Local\weq.exe" -a "C:\Program Files (x86)\Mozilla Firefox\firefox.exe") -> REPLACED : ("C:\Program Files (x86)\mozilla firefox\firefox.exe")
[FILE ASSO] HKLM\[...]Software\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command : ("C:\Users\Nico\AppData\Local\weq.exe" -a "C:\Program Files (x86)\Mozilla Firefox\firefox.exe" -safe-mode) -> REPLACED : ("C:\Program Files (x86)\mozilla firefox\firefox.exe" -safe-mode)
Fichier HOSTS:
127.0.0.1 localhost
Termine : << RKreport[2].txt >>
RKreport[1].txt ; RKreport[2].txt
contact sur http://www.sur-la-toile.com
mail: tigzyRK<at>gmail<dot>com
Remontees: http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.html
Systeme d'exploitation: Windows 7 (6.1.7600 ) 64 bits version
Demarrage : Mode sans echec avec prise en charge reseau
Utilisateur: Nico [Droits d'admin]
Mode: Recherche -- Date : 10/06/2011 23:02:54
Processus malicieux: 0
Entrees de registre: 16
[SUSP PATH] HKCU\[...]\Run : hsRITIwubRlhk (C:\ProgramData\hsRITIwubRlhk.exe) -> FOUND
[SUSP PATH] HKUS\S-1-5-21-549925019-612924258-186355609-1001[...]\Run : hsRITIwubRlhk (C:\ProgramData\hsRITIwubRlhk.exe) -> FOUND
[SUSP PATH] HKCU\[...]\RunOnce : kD28621PhJpB28621 (C:\ProgramData\kD28621PhJpB28621\kD28621PhJpB28621.exe) -> FOUND
[SUSP PATH] HKUS\S-1-5-21-549925019-612924258-186355609-1001[...]\RunOnce : kD28621PhJpB28621 (C:\ProgramData\kD28621PhJpB28621\kD28621PhJpB28621.exe) -> FOUND
[SUSP PATH] {810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job : c:\windows\nqobaa.exe -> FOUND
[WallPP] HKCU\[...]\Desktop : Wallpaper () -> FOUND
[HJ] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
[HJ] HKCU\[...]\ClassicStartMenu : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
[HJ] HKCU\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
[HJ] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
[HJ] HKCU\[...]\ClassicStartMenu : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
[HJ] HKCU\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
[HJ] HKCU\[...]\ClassicStartMenu : {645FF040-5081-101B-9F08-00AA002F954E} (1) -> FOUND
[HJ] HKCU\[...]\NewStartPanel : {645FF040-5081-101B-9F08-00AA002F954E} (1) -> FOUND
[FILEASSO] HKLM\[...]Software\Clients\StartMenuInternet\FIREFOX.EXE\shell\open\command : ("C:\Users\Nico\AppData\Local\weq.exe" -a "C:\Program Files (x86)\Mozilla Firefox\firefox.exe") -> FOUND
[FILEASSO] HKLM\[...]Software\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command : ("C:\Users\Nico\AppData\Local\weq.exe" -a "C:\Program Files (x86)\Mozilla Firefox\firefox.exe" -safe-mode) -> FOUND
Fichier HOSTS:
127.0.0.1 localhost