Virus qui a effacer mes document ou cacher...
Résolu/Fermé
A voir également:
- Virus qui a effacer mes document ou cacher...
- Signer un document word - Guide
- Comment effacer une page sur word - Guide
- Cacher conversation whatsapp - Guide
- Effacer les cookies - Guide
- Logiciel retouche document gratuit - Guide
3 réponses
Utilisateur anonyme
18 mars 2012 à 17:50
18 mars 2012 à 17:50
Bonsoir
[*] Télécharger sur le bureau https://www.luanagames.com/index.fr.html (by tigzy)
[*] Quitter tous les programmes
[*] Lancer RogueKiller.exe.
[*] Attendre que le Prescan ait fini ...
[*] Cliquer sur Scan. Cliquer sur Rapport et copier coller le contenu du rapport
@+
[*] Télécharger sur le bureau https://www.luanagames.com/index.fr.html (by tigzy)
[*] Quitter tous les programmes
[*] Lancer RogueKiller.exe.
[*] Attendre que le Prescan ait fini ...
[*] Cliquer sur Scan. Cliquer sur Rapport et copier coller le contenu du rapport
@+
Utilisateur anonyme
18 mars 2012 à 18:21
18 mars 2012 à 18:21
Re
Relance Roguekiller option Racc. RAZ.
Poste moi ensuite son rapport;merci.
@+
Relance Roguekiller option Racc. RAZ.
Poste moi ensuite son rapport;merci.
@+
voila
[EXISTS] c:\programdata\microsoft\windows\start menu\Programs\Sony\Vegas Pro 11.0
c:\users\famille maillo\appdata\local\temp\smtmp\1\Programs\Sony\Vegas Pro 11.0\* --> c:\programdata\microsoft\windows\start menu\Programs\Sony\Vegas Pro 11.0
[EXISTS] c:\programdata\microsoft\windows\start menu\Programs\Startup
c:\users\famille maillo\appdata\local\temp\smtmp\1\Programs\Startup\* --> c:\programdata\microsoft\windows\start menu\Programs\Startup
[EXISTS] c:\programdata\microsoft\windows\start menu\Programs\Tablet PC
c:\users\famille maillo\appdata\local\temp\smtmp\1\Programs\Tablet PC\* --> c:\programdata\microsoft\windows\start menu\Programs\Tablet PC
--- Bureau ---
DIR: dorno -> Attributes restored
DIR: redbullsuzukitesttrack -> Attributes restored
DIR: SUMX nat -> Attributes restored
DIR: sx123 -> Attributes restored
DIR: TLD2012 -> Attributes restored
DIR: ore -> Attributes restored
DIR: c:\users\public\desktop -> Attributes restored
--- Lancement rapide ---
DIR: User Pinned -> Attributes restored
--- Programmes ---
DIR: cache -> Attributes restored
DIR: Workspaces -> Attributes restored
DIR: Workspaces -> Attributes restored
DIR: .cache -> Attributes restored
DIR: InstallShield Installation Information -> Attributes restored
[EXISTS] c:\programdata\microsoft\windows\start menu\Programs\Sony\Vegas Pro 11.0
c:\users\famille maillo\appdata\local\temp\smtmp\1\Programs\Sony\Vegas Pro 11.0\* --> c:\programdata\microsoft\windows\start menu\Programs\Sony\Vegas Pro 11.0
[EXISTS] c:\programdata\microsoft\windows\start menu\Programs\Startup
c:\users\famille maillo\appdata\local\temp\smtmp\1\Programs\Startup\* --> c:\programdata\microsoft\windows\start menu\Programs\Startup
[EXISTS] c:\programdata\microsoft\windows\start menu\Programs\Tablet PC
c:\users\famille maillo\appdata\local\temp\smtmp\1\Programs\Tablet PC\* --> c:\programdata\microsoft\windows\start menu\Programs\Tablet PC
--- Bureau ---
DIR: dorno -> Attributes restored
DIR: redbullsuzukitesttrack -> Attributes restored
DIR: SUMX nat -> Attributes restored
DIR: sx123 -> Attributes restored
DIR: TLD2012 -> Attributes restored
DIR: ore -> Attributes restored
DIR: c:\users\public\desktop -> Attributes restored
--- Lancement rapide ---
DIR: User Pinned -> Attributes restored
--- Programmes ---
DIR: cache -> Attributes restored
DIR: Workspaces -> Attributes restored
DIR: Workspaces -> Attributes restored
DIR: .cache -> Attributes restored
DIR: InstallShield Installation Information -> Attributes restored
il etai pas terminer desoler voila
RogueKiller V7.3.1 [10/03/2012] par Tigzy
mail: tigzyRK<at>gmail<dot>com
Remontees: http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.html
Blog: http://tigzyrk.blogspot.com
Systeme d'exploitation: Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Demarrage : Mode normal
Utilisateur: famille maillo [Droits d'admin]
Mode: Raccourcis RAZ -- Date: 18/03/2012 18:53:41
¤¤¤ Processus malicieux: 0 ¤¤¤
¤¤¤ Driver: [NON CHARGE] ¤¤¤
¤¤¤ Attributs de fichiers restaures: ¤¤¤
Bureau: Success 274 / Fail 0
Lancement rapide: Success 1 / Fail 0
Programmes: Success 10292 / Fail 0
Menu demarrer: Success 3 / Fail 0
Dossier utilisateur: Success 8011 / Fail 0
Mes documents: Success 6 / Fail 0
Mes favoris: Success 150 / Fail 0
Mes images: Success 684 / Fail 0
Ma musique: Success 15 / Fail 0
Mes videos: Success 76 / Fail 0
Disques locaux: Success 15457 / Fail 0
Sauvegarde: [FOUND] Success 2 / Fail 0
Lecteurs:
[C:] \Device\HarddiskVolume3 -- 0x3 --> Restored
[D:] \Device\CdRom0 -- 0x5 --> Skipped
[E:] \Device\HarddiskVolume4 -- 0x2 --> Restored
[F:] \Device\HarddiskVolume5 -- 0x2 --> Restored
[G:] \Device\HarddiskVolume6 -- 0x2 --> Restored
[H:] \Device\HarddiskVolume7 -- 0x2 --> Restored
¤¤¤ Infection : Rogue.FakeHDD ¤¤¤
Termine : << RKreport[2].txt >>
RKreport[1].txt ; RKreport[2].txt
RogueKiller V7.3.1 [10/03/2012] par Tigzy
mail: tigzyRK<at>gmail<dot>com
Remontees: http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.html
Blog: http://tigzyrk.blogspot.com
Systeme d'exploitation: Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Demarrage : Mode normal
Utilisateur: famille maillo [Droits d'admin]
Mode: Raccourcis RAZ -- Date: 18/03/2012 18:53:41
¤¤¤ Processus malicieux: 0 ¤¤¤
¤¤¤ Driver: [NON CHARGE] ¤¤¤
¤¤¤ Attributs de fichiers restaures: ¤¤¤
Bureau: Success 274 / Fail 0
Lancement rapide: Success 1 / Fail 0
Programmes: Success 10292 / Fail 0
Menu demarrer: Success 3 / Fail 0
Dossier utilisateur: Success 8011 / Fail 0
Mes documents: Success 6 / Fail 0
Mes favoris: Success 150 / Fail 0
Mes images: Success 684 / Fail 0
Ma musique: Success 15 / Fail 0
Mes videos: Success 76 / Fail 0
Disques locaux: Success 15457 / Fail 0
Sauvegarde: [FOUND] Success 2 / Fail 0
Lecteurs:
[C:] \Device\HarddiskVolume3 -- 0x3 --> Restored
[D:] \Device\CdRom0 -- 0x5 --> Skipped
[E:] \Device\HarddiskVolume4 -- 0x2 --> Restored
[F:] \Device\HarddiskVolume5 -- 0x2 --> Restored
[G:] \Device\HarddiskVolume6 -- 0x2 --> Restored
[H:] \Device\HarddiskVolume7 -- 0x2 --> Restored
¤¤¤ Infection : Rogue.FakeHDD ¤¤¤
Termine : << RKreport[2].txt >>
RKreport[1].txt ; RKreport[2].txt
18 mars 2012 à 18:05
RogueKiller V7.3.1 [10/03/2012] par Tigzy
mail: tigzyRK<at>gmail<dot>com
Remontees: http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.html
Blog: http://tigzyrk.blogspot.com
Systeme d'exploitation: Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Demarrage : Mode normal
Utilisateur: famille maillo [Droits d'admin]
Mode: Recherche -- Date: 18/03/2012 18:03:30
¤¤¤ Processus malicieux: 0 ¤¤¤
¤¤¤ Entrees de registre: 2 ¤¤¤
[HJ] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
[HJ] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
¤¤¤ Fichiers / Dossiers particuliers: ¤¤¤
¤¤¤ Driver: [NON CHARGE] ¤¤¤
¤¤¤ Infection : ¤¤¤
¤¤¤ Fichier HOSTS: ¤¤¤
127.0.0.1 activate.adobe.com
127.0.0.1 practivate.adobe.com
127.0.0.1 ereg.adobe.com
127.0.0.1 activate.wip3.adobe.com
127.0.0.1 wip3.adobe.com
127.0.0.1 3dns-3.adobe.com
127.0.0.1 3dns-2.adobe.com
127.0.0.1 adobe-dns.adobe.com
127.0.0.1 adobe-dns-2.adobe.com
127.0.0.1 adobe-dns-3.adobe.com
127.0.0.1 ereg.wip3.adobe.com
127.0.0.1 activate-sea.adobe.com
127.0.0.1 wwis-dubc1-vip60.adobe.com
127.0.0.1 activate-sjc0.adobe.com
¤¤¤ MBR Verif: ¤¤¤
+++++ PhysicalDrive0: ST31000524AS ATA Device +++++
--- User ---
[MBR] 854effefdaa0984926f1a8d3e4813941
[BSP] d695b62de0375c538da31935cc823f13 : Windows 7 MBR Code
Partition table:
0 - [XXXXXX] DELL-UTIL (0xde) [VISIBLE] Offset (sectors): 63 | Size: 180 Mo
1 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 370688 | Size: 14142 Mo
2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 29333504 | Size: 939545 Mo
User = LL1 ... OK!
User = LL2 ... OK!
Termine : << RKreport[1].txt >>
RKreport[1].txt