Infecté par personal pro shield...help

Fermé
mapuce13 Messages postés 8 Date d'inscription mardi 27 septembre 2011 Statut Membre Dernière intervention 27 novembre 2011 - 27 sept. 2011 à 17:03
 Utilisateur anonyme - 15 oct. 2011 à 22:15
Bonjour,
depuis qq jours je suis infecté par pers pro shield version 2.0,et com tous ceux qui le sont,bloquage de programme,beug......je veux pas faire de sauvegarde pour ne pas infecter usb,disk dur ext....comment faire pas a pas car suis plus ou moins debutant dans la desinfection de virus,sachant que je peux travailler en parallele sur un autre pc pas infecté.
Ps.Nous sommes un cpl du 13 et si qqun du 13 pres de fos peut meme venir chez nous,c avec plaisir car en plus,le pc n'est pas a mettre entre toutes les mains...lol.
merci par avance


A voir également:

52 réponses

Utilisateur anonyme
27 sept. 2011 à 17:14
bonjour,

* Télécharge en enregistre sur le bureau RogueKiller (par tigzy)
https://www.luanagames.com/index.fr.html
* Quitte tous tes programmes en cours
* Lance RogueKiller.exe.
* Sous Vista/Seven, clique droit, lancer en tant qu'administrateur
tu n'as qu'à cliquer dessus ou les lancer!
* Quitte tous tes programmes en cours
* Lance RogueKiller.exe.
* Lorsque demandé, tape 2 et valide

* puis l'option 4

* Un rapport (RKreport.txt) a du se créer à côté de l'exécutable, colle son contenu dans la réponse
* Si le programme a été bloqué, ne pas hésiter a essayer plusieurs fois. *
==>S'il ne passe pas, change son nom en Winlogon.exe.<==
0
mapuce13 Messages postés 8 Date d'inscription mardi 27 septembre 2011 Statut Membre Dernière intervention 27 novembre 2011
27 sept. 2011 à 18:23
jarriv pas fair grand chose avec le pc,par contre jen ai un autre portable ou je peux bosser dessus,je telecharg le prog sur une clé usb et je le telecharg sur le pc infecté?
0
Utilisateur anonyme
27 sept. 2011 à 18:32
oui, normalement, après le pasage de Roguekiller, 'infection sera neutralisée en partie, tu pourras te connecter à internet, puis on poursuit le nettoyage directement depuis le pc :D

0
help help,tjrs pas arrivé
0
RogueKiller V6.1.2 [07/10/2011] par Tigzy
contact sur http://www.sur-la-toile.com
mail: tigzyRK<at>gmail<dot>com
Remontees: http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.html

Systeme d'exploitation: Windows XP (5.1.2600 Service Pack 3) 32 bits version
Demarrage : Mode normal
Utilisateur: puce [Droits d'admin]
Mode: Suppression -- Date : 08/10/2011 12:00:29

Processus malicieux: 0

Entrees de registre: 0

Fichiers / Dossiers particuliers:

Driver: [NOT LOADED]

Fichier HOSTS:


Termine : << RKreport[1].txt >>
RKreport[1].txt
0

Vous n’avez pas trouvé la réponse que vous recherchez ?

Posez votre question
RogueKiller V6.1.2 [07/10/2011] par Tigzy
contact sur http://www.sur-la-toile.com
mail: tigzyRK<at>gmail<dot>com
Remontees: http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.html

Systeme d'exploitation: Windows XP (5.1.2600 Service Pack 3) 32 bits version
Demarrage : Mode normal
Utilisateur: puce [Droits d'admin]
Mode: Proxy RAZ -- Date : 08/10/2011 12:00:51

Processus malicieux: 0

Driver: [LOADED]

Entrees de registre: 0

Termine : << RKreport[2].txt >>
RKreport[1].txt ; RKreport[2].txt
0
aidez moi svp help help help lol
0
Utilisateur anonyme
8 oct. 2011 à 12:19
salut je suis dans le 13 à Lascours ^^

mais attends ton helper il est qualifié pour t'aider :)

ca va aller ne t'affole pas ^^

(ps : salut elec' ^^)
0
merci
0
Utilisateur anonyme
8 oct. 2011 à 12:38
oui apparemment il t'a perdu en route :)
0
j'ai pas ete aussi tres reactif,j'etais pas la pendant quelques jours,si qqun d'autre aussi peut m'aider..
0
Utilisateur anonyme
8 oct. 2011 à 13:00
bonjour,
je ne perds personne en route :D

mais si tu mets 6 mois pour répondre, je passe à autre chose :D


as tu redemarré ton pc depuis le temps ou tu as passé Roguekiller ?

si oui,

relance roguekiller en option 2 et 4, poste ses rapports,

puis passe à ceci :


Télécharge Malwarebytes' Anti-Malware et enregistre le sur ton bureau:
https://www.malekal.com/tutoriel-malwarebyte-anti-malware/

ou ici :
https://www.commentcamarche.net/telecharger/securite/14361-malwarebytes-anti-malware/


. Double cliques sur le fichier téléchargé pour lancer le processus d'installation.
. Dans l'onglet "mise à jour", cliques sur le bouton Recherche de mise à jour
. si le pare-feu demande l'autorisation de se connecter pour malwarebytes, acceptes
. Une fois la mise à jour terminé
. rend-toi dans l'onglet, Recherche
. Sélectionnes Exécuter un examen complet
. Cliques sur Rechercher
. Le scan démarre.
. A la fin de l'analyse, un message s'affiche : L'examen s'est terminé normalement. Clique sur 'Afficher les résultats' pour afficher tous les objets trouvés.
. Cliques sur Ok pour poursuivre.
. Si des malwares ont été détectés, cliques sur Afficher les résultats
. Sélectionnes tout (ou laisses cochés) et cliques sur Supprimer la sélection Malwarebytes va détruire les fichiers et clés de registre et en mettre une copie dans la quarantaine.

. Malwarebytes va ouvrir le bloc-notes et y copier le rapport d'analyse.
. rends toi dans l'onglet rapport/log
. tu cliques dessus pour l'afficher une fois affiché
. tu cliques sur edition en haut du boc notes,et puis sur sélectionner tous
. tu recliques sur edition et puis sur copier et tu reviens sur le forum et dans ta réponse
. Tu cliques droit dans le cadre de la réponse et coller
. À la fin du scan, il se peut que MBAM ait besoin de redémarrer le pc pour finaliser la suppression, donc pas de panique, redémarre ton pc !!!

Si tu as besoin d'aide regarde ce tutoriel :
https://www.malekal.com/tutoriel-malwarebyte-anti-malware/



0
merci elec,je viens de poster les rapports just plus haut,g f la manip ce matin avec rogue et je viens de poster les rapports,mais la,le pc viens de planter,obligé de couper par l'alim,je garde le contact c ar suis sur pc portable a coté
0
je suis en train de scan avec malwar..c pas fini,deja un sujet infecté et une petite fenetre bloquage de logiciel malveillant par malwarbytes est apparu
0
Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Version de la base de données: 7900

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

08/10/2011 19:41:04
mbam-log-2011-10-08 (19-41-04).txt

Type d'examen: Examen complet (C:\|D:\|)
Elément(s) analysé(s): 331412
Temps écoulé: 1 heure(s), 47 minute(s), 24 seconde(s)

Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 1
Valeur(s) du Registre infectée(s): 0
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 8
Fichier(s) infecté(s): 110

Processus mémoire infecté(s):
(Aucun élément nuisible détecté)

Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)

Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\EoRezo (Rogue.Eorezo) -> Quarantined and deleted successfully.

Valeur(s) du Registre infectée(s):
(Aucun élément nuisible détecté)

Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)

Dossier(s) infecté(s):
c:\documents and settings\de freitas\application data\EoRezo (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\db (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eodesktop (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoStats (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo (Adware.EoRezo) -> Quarantined and deleted successfully.

Fichier(s) infecté(s):
c:\system volume information\_restore{da1684a3-4776-45c8-851d-dd8a56ff2753}\RP1733\A0247741.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\WINDOWS\Temp\amixyz.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\WINDOWS\Temp\ioofvy5o.exe (Heuristics.Shuriken) -> Quarantined and deleted successfully.
c:\documents and settings\puce\application data\Sun\Java\deployment\cache\6.0\4\70740304-778af3c1 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\puce\local settings\temporary internet files\Content.IE5\C502CJGC\upx[2].exe (Heuristics.Shuriken) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\nvs2.inf (Adware.EGDAccess) -> Quarantined and deleted successfully.
c:\WINDOWS\Temp\0.5462379723138076.exe (Exploit.Drop.2) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\Adobe\shed\thr1.chm (Malware.Trace) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\Adobe\plugs\mmc233.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\Adobe\plugs\mmc55.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\cmhost.cyp (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\confmedia.cyp (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather.cfg (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\host.cyp (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\towns.cfg (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\user.cyp (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\db\cat.cyp (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eodesktop\config.xml (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eodesktop\eodesktop.html (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eodesktop\userconfig.xml (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoStats\eoStats.txt (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\eoweather.cfg (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\eoweatherval_02ec282.cfg (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\background_1.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\earth.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\67_day.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\67_night.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\69_day.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\69_night.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\70_day.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\70_night.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\78_day.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\78_night.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\82_day.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\82_night.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\83_day.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\83_night.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\84_day.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\84_night.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\85_day.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\85_night.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\89_day.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\89_night.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\back.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\background.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\fonds_écran.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\help.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\helppressed.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\minimise.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\minimisepressed.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\next.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\nextpressed.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\option.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\optionpressed.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\reflet_ecran.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\small_background.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\Thumbs.db (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\background_1days.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\background_2days.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\background_7days.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\backpressed.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\band.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\band_small.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\close.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\closepressed.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\dayprevisionbackground.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_classic\dayprevisionclose.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\67_day.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\67_night.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\69_day.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\69_night.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\70_day.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\70_night.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\78_day.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\78_night.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\82_day.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\82_night.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\83_day.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\83_night.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\84_day.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\84_night.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\85_day.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\85_night.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\89_day.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\89_night.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\about.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\back.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\background.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\background_1.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\background_1days.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\background_2days.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\background_7days.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\backpressed.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\close.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\closepressed.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\dayprevisionbackground.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\dayprevisionclose.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\earth.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\fonds_écran.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\help.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\helppressed.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\minimise.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\minimisepressed.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\next.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\nextpressed.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\option.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\optionpressed.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\reflet_ecran.png (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\Thumbs.db (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\documents and settings\de freitas\application data\EoRezo\eoweather\images_station_meteo\txt_14x13.png (Adware.EoRezo) -> Quarantined and deleted successfully.
0
voila electricien69,c fait par contre une petite fenetre de malware me dit assez souvent qu'un blocage est fait d'un site malveillant avec un numero et marqué a la fin "sortant",c normal ou tjrs infecté?
0
ce qui est marqué exactement est "blocage reussi de l'acces a un site web potentiellement malveillant 46.251.237.165 type:sortant
0
relance MBAM, vide sa quarantaine,

tu es victime de Eorezo = Pc4Tuto = Tutopc = Agance exclisif .....

à lire :

http://rue-du-montceau.pagesperso-orange.fr/tutol_tuto4pc.html

si tu veix montrer ton mécontentement, il faut aller sur le site de diffusuer qui n'est autre que 01net ou Telecharger.com !



* Télécharge de AD-Remover sur ton Bureau. (Merci à l'équipe TeamXscript)
http://www.teamxscript.org/adremoverTelechargement.html
( Lien officiel )

https://www.androidworld.fr/
( Miroir )
/!\ Ferme toutes applications en cours /!\

- Double-clique sur l'icône Ad-remover située sur ton Bureau.
- Sur la page, clique sur le bouton « Nettoyer »
- Confirme lancement du scan
- Laisse travailler l'outil.
- Poste le rapport qui apparaît à la fin.

(Le rapport est sauvegardé aussi sous C:\Ad-report(Scan/clean).Txt)

(CTRL+A pour tout sélectionner, CTRL+C pour copier et CTRL+V pour coller)


O.o°*??? Membre, Contributeur sécurité CCMo°.Oø¤º°'°º¤ø

O.o°* ??? Réspire à fond, Rédige ton message en bon français et de manière claire.Ca va bien se passer, tu verras, enfin on essaie !!! o°.Oø¤º°'°º¤ø
0
mapuce13 Messages postés 8 Date d'inscription mardi 27 septembre 2011 Statut Membre Dernière intervention 27 novembre 2011
8 oct. 2011 à 23:10
======= RAPPORT D'AD-REMOVER 2.0.0.2,G | UNIQUEMENT XP/VISTA/7 =======

Mis à jour par TeamXscript le 12/04/11
Contact: AdRemover[DOT]contact[AT]gmail[DOT]com
Site web: http://www.teamxscript.org

C:\Program Files\Ad-Remover\main.exe (CLEAN [1]) -> Lancé à 22:42:59 le 08/10/2011, Mode normal

Microsoft Windows XP Édition familiale Service Pack 3 (X86)
puce@ACER-73356C3771 ( )

============== ACTION(S) ==============


Fichier supprimé: C:\WINDOWS\pack.epk
Fichier supprimé: C:\WINDOWS\Tasks\Scheduled Update for Ask Toolbar.job
Fichier supprimé: C:\WINDOWS\Temp\msksetup.log
Dossier supprimé: C:\Documents and Settings\DE FREITAS\Application Data\Mozilla\FireFox\Profiles\o5t0x6cm.default\extensions\toolbar@ask.com
Dossier supprimé: C:\Documents and Settings\puce\Local Settings\Application Data\AskToolbar
Dossier supprimé: C:\Program Files\ItsLabel

(!) -- Fichiers temporaires supprimés.


-- Fichier ouvert: C:\Documents and Settings\DE FREITAS\Application Data\Mozilla\FireFox\Profiles\o5t0x6cm.default\Prefs.js --
Ligne supprimée: user_pref("extensions.asktb.cbid", "UG");
Ligne supprimée: user_pref("extensions.asktb.default-channel-url-mask", "hxxp://fr.ask.com/web?q={query}&qsrc={qsrc}&...
Ligne supprimée: user_pref("extensions.asktb.fresh-install", false);
Ligne supprimée: user_pref("extensions.asktb.l", "dis");
Ligne supprimée: user_pref("extensions.asktb.last-config-req", "1272306935111");
Ligne supprimée: user_pref("extensions.asktb.locale", "fr_FR");
Ligne supprimée: user_pref("extensions.asktb.o", "15158");
Ligne supprimée: user_pref("extensions.asktb.overlay-reloaded-using-restart", true);
Ligne supprimée: user_pref("extensions.asktb.qsrc", "2871");
Ligne supprimée: user_pref("extensions.asktb.r", "2");
Ligne supprimée: user_pref("extensions.enabledItems", "toolbar@ask.com:3.5.1.110,{3112ca9c-de6d-4884-a869-9855de68056...
-- Fichier Fermé --


Clé supprimée: HKLM\Software\Classes\CLSID\{64F56FC1-1272-44CD-BA6E-39723696E350}
Clé supprimée: HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{64F56FC1-1272-44CD-BA6E-39723696E350}
Clé supprimée: HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{64F56FC1-1272-44CD-BA6E-39723696E350}
Clé supprimée: HKLM\Software\Classes\CLSID\{D4027C7F-154A-4066-A1AD-4243D8127440}
Clé supprimée: HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D4027C7F-154A-4066-A1AD-4243D8127440}
Clé supprimée: HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{D4027C7F-154A-4066-A1AD-4243D8127440}
Clé supprimée: HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D4027C7F-154A-4066-A1AD-4243D8127440}
Clé supprimée: HKLM\Software\Classes\Interface\{6C434537-053E-486D-B62A-160059D9D456}
Clé supprimée: HKLM\Software\Classes\Interface\{91CF619A-4686-4CA4-9232-3B2E6B63AA92}
Clé supprimée: HKLM\Software\Classes\Interface\{AC71B60E-94C9-4EDE-BA46-E146747BB67E}
Clé supprimée: HKLM\Software\Classes\Interface\{B0D071A1-36B3-4757-A126-14C89C56013A}
Clé supprimée: HKLM\Software\Classes\TypeLib\{2996F0E7-292B-4CAE-893F-47B8B1C05B56}
Clé supprimée: HKLM\Software\Classes\TypeLib\{B4C656C9-F2E9-4E77-B3F4-443DF2BD778F}
Clé supprimée: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\weuwwei
Clé supprimée: HKLM\Software\Classes\EoRezoBHO.EoBho
Clé supprimée: HKLM\Software\Classes\EoRezoBHO.EoBho.1
Clé supprimée: HKLM\Software\Classes\GenericAskToolbar.ToolbarWnd
Clé supprimée: HKLM\Software\Classes\GenericAskToolbar.ToolbarWnd.1
Clé supprimée: HKLM\Software\Classes\AppID\GenericAskToolbar.DLL
Clé supprimée: HKLM\Software\Classes\AppID\{9B0CB95C-933A-4B8C-B6D4-EDCD19A43874}
Clé supprimée: HKLM\Software\ItsLabel
Clé supprimée: HKCU\Software\AskToolbar
Clé supprimée: HKLM\Software\Classes\Installer\Products\A28B4D68DEBAA244EB686953B7074FEF
Clé supprimée: HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\Userdata\S-1-5-18\Products\A28B4D68DEBAA244EB686953B7074FEF
Clé supprimée: HKLM\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A5AA24EA-11B8-4113-95AE-9ED71DEAF12A}
Clé supprimée: HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\{86D4B82A-ABED-442A-BE86-96357B70F4FE}

Valeur supprimée: HKLM\Software\Microsoft\Windows\CurrentVersion\Run|Eoengine
Valeur supprimée: HKLM\Software\Microsoft\Internet Explorer\Toolbar|{D4027C7F-154A-4066-A1AD-4243D8127440}
Valeur supprimée: HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser|{D4027C7F-154A-4066-A1AD-4243D8127440}


============== SCAN ADDITIONNEL ==============

**** Mozilla Firefox Version [3.0.19 (fr)] ****

Plugins\NPSWF32.dll (?)
HKLM_MozillaPlugins\@macromedia.com/FlashPlayer8 (x)
Components\aboutRights.js
Components\aboutRobots.js
Components\nsPostUpdateWin.js
HKLM_Extensions|{3112ca9c-de6d-4884-a869-9855de68056c} - C:\Documents and Settings\All Users\Application Data\Google\Toolbar for Firefox\{3112ca9c-de6d-4884-a869-9855de68056c}

-- C:\Documents and Settings\puce\Application Data\Mozilla\FireFox\Profiles\c1o0pjfa.default --
Extensions\{3112ca9c-de6d-4884-a869-9855de68056c} (Google Toolbar for Firefox)
Prefs.js - browser.search.defaultenginename, Google
Prefs.js - browser.search.defaulturl, hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q=
Prefs.js - browser.search.selectedEngine, Google
Prefs.js - browser.startup.homepage_override.mstone, rv:1.9.0.19

-- C:\Documents and Settings\DE FREITAS\Application Data\Mozilla\FireFox\Profiles\o5t0x6cm.default --
Extensions\{3112ca9c-de6d-4884-a869-9855de68056c} (Google Toolbar for Firefox)
Extensions\{3112ca9c-de6d-4884-a869-9855de68056c}(2) (Google Toolbar for Firefox)
Extensions\{9f08cb5a-76b1-4bcf-aff9-90e1a5d60b1e} (Noia 2.0 (eXtreme))
Prefs.js - browser.download.lastDir, C:\\Documents and Settings\\DE FREITAS\\Mes documents
Prefs.js - browser.search.defaultenginename, Google
Prefs.js - browser.search.defaulturl, hxxp://www.bing.com/search?FORM=IEFM1&q=
Prefs.js - browser.search.selectedEngine, Google
Prefs.js - browser.startup.homepage, hxxp://go.microsoft.com/fwlink/?LinkId=69157
Prefs.js - browser.startup.homepage_override.mstone, rv:1.9.0.19
Prefs.js - keyword.URL, hxxp://www.google.com/search?sourceid=navclient&hl=fr&q=

========================================

**** Internet Explorer Version [8.0.6001.18702] ****

HKCU_Main|Default_Page_URL - hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
HKCU_Main|Default_Search_URL - hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
HKCU_Main|Search bar - hxxp://go.microsoft.com/fwlink/?linkid=54896
HKCU_Main|Start Page - hxxp://fr.msn.com/
HKLM_Main|Default_Page_URL - hxxp://go.microsoft.com/fwlink/?LinkId=54896
HKLM_Main|Default_Search_URL - hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
HKLM_Main|Search bar - hxxp://search.msn.com/spbasic.htm
HKLM_Main|Search Page - hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
HKLM_Main|Start Page - hxxp://fr.msn.com/
HKCU_Toolbar\ShellBrowser|{42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} (x)
HKLM_ElevationPolicy\{74351F14-5437-4d87-805B-04D409B09976} - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe (Google)
HKLM_Extensions\{08B0E5C0-4FCB-11CF-AAA5-00401C608501} - "?" (?)
HKLM_Extensions\{2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - "Create Mobile Favorite" (C:\PROGRA~1\MI3AA1~1\INetRepl.dll,210)
HKLM_Extensions\{2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - "?" (?)
HKLM_Extensions\{e2e2dd38-d088-4134-82b7-f2ba38496583} - "?" (?)
BHO\{5C255C8A-E604-49b4-9D64-90988571CECB} (?)
BHO\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - "SSVHelper Class" (C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll)

========================================

C:\Program Files\Ad-Remover\Quarantine: 148 Fichier(s)
C:\Program Files\Ad-Remover\Backup: 13 Fichier(s)

C:\Ad-Report-CLEAN[1].txt - 08/10/2011 22:43:21 (7105 Octet(s))

Fin à: 22:44:31, 08/10/2011

============== E.O.F ==============
0
mapuce13 Messages postés 8 Date d'inscription mardi 27 septembre 2011 Statut Membre Dernière intervention 27 novembre 2011
8 oct. 2011 à 23:16
on va sen sortir,jy crois lol et merci pour tout encore electricien69
0
mapuce13 Messages postés 8 Date d'inscription mardi 27 septembre 2011 Statut Membre Dernière intervention 27 novembre 2011
8 oct. 2011 à 23:19
tjrs la meme fenetre qui revient
0
electricien69 sauveur reveillé?lol
0
juju666 Messages postés 35446 Date d'inscription jeudi 18 décembre 2008 Statut Contributeur sécurité Dernière intervention 21 avril 2024 4 796
9 oct. 2011 à 09:53
T'inquiètes c'est l'heure qu'il arrive sur ccm :D
0
Utilisateur anonyme
9 oct. 2011 à 16:20
salut padawan :D

bonjour,

j'avais quelques trucs à régler :D


relance ADR, clique sur désinstaller ,


* Télécharge ZHPDiag sur ton bureau :


https://www.zebulon.fr/telechargements/securite/systeme/zhpdiag.html
ou
http://www.premiumorange.com/zeb-help-process/zhpdiag.html
ou
https://www.commentcamarche.net/telecharger/utilitaires/24803-zhpdiag/

* Laisse toi guider lors de l'installation, il se lancera automatiquement à la fin.

/!\Utilisateur de Vista et Seven : Clique droit sur le logo de ZHPdiag, « exécuter en tant qu'Administrateur »

* Clique sur l'icône représentant une loupe (« Lancer le diagnostic »)
* Enregistre le rapport sur ton Bureau à l'aide de l'icône représentant une disquette
* Héberge le rapport ZHPDiag.txt sur Cijoint, puis copie/colle le lien fourni dans ta prochaine réponse sur le forum :
http://www.cijoint.fr/
ou :
http://dl.free.fr
ou :
http://ww38.toofiles.com/fr/documents-upload.html
ou :
https://www.terafiles.net/


tuto zhpdiag :

http://www.premiumorange.com/zeb-help-process/zhpdiag.html

0
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-10-09 18:06:42
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden services & system hive ...

scanning hidden registry entries ...

scanning hidden files ...

scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0
0