WARNING!Internet Explorer is currently out of date.Please update
Résolu
TheBlackDream
Messages postés
85
Date d'inscription
Statut
Membre
Dernière intervention
-
Malekal_morte- Messages postés 180304 Date d'inscription Statut Modérateur, Contributeur sécurité Dernière intervention -
Malekal_morte- Messages postés 180304 Date d'inscription Statut Modérateur, Contributeur sécurité Dernière intervention -
Bonsoir tout le monde ,
Alors voilà;cela fait quelques jours que j'ai un problème avec mes deux navigateurs ( Mozilla & Chrome) dés que je veux accéder à une page ça m'affiche ça
WARNING!Internet Explorer is currently out of date.Please update to continue & on m'affiche Outdated Browser Detected
You are currently using Firefox 29 which is now outdated Please update the latest version of internet explorer ( Recommended)
je vais essayer de poster les screens pour être plus claire , si j'arrive à hébérger les images.
j'espère que quelqu'un pourra m'aider , merci .
Alors voilà;cela fait quelques jours que j'ai un problème avec mes deux navigateurs ( Mozilla & Chrome) dés que je veux accéder à une page ça m'affiche ça
WARNING!Internet Explorer is currently out of date.Please update to continue & on m'affiche Outdated Browser Detected
You are currently using Firefox 29 which is now outdated Please update the latest version of internet explorer ( Recommended)
je vais essayer de poster les screens pour être plus claire , si j'arrive à hébérger les images.
j'espère que quelqu'un pourra m'aider , merci .
A voir également:
- WARNING!Internet Explorer is currently out of date.Please update
- What is my movie français - Télécharger - Divers TV & Vidéo
- Internet explorer 11 - Télécharger - Navigateurs
- Internet explorer 8 - Télécharger - Navigateurs
- Internet explorer 10 - Télécharger - Navigateurs
- Internet explorer - Guide
18 réponses
Voici les 2 screens :
http://nsa34.casimages.com/img/2014/05/16/14051608215429075.jpg
http://nsa33.casimages.com/img/2014/05/16/140516082240563018.jpg
http://nsa34.casimages.com/img/2014/05/16/14051608215429075.jpg
http://nsa33.casimages.com/img/2014/05/16/140516082240563018.jpg
N'importe la quelle , par exemple si je veux faire une recherche sur google ou bien ouvrir Facebook ect ...
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
Télécharge https://www.malekal.com/adwcleaner-supprimer-virus-adwares-pup/?t=33839&start= AdwCleaner ( d'Xplode ) sur ton bureau.
Sur la page d'AdwCleaner, à droite, clic sur la disquette grise avec la flèche verte pour lancer le téléchargement.
Lance AdwCleaner, clique sur [Scanner].
Le scan peux durer plusieurs minutes, patienter.
Une fois le scan terminé, clique sur [Nettoyer]
Une fois le nettoyage terminé, un rapport s'ouvrira. Copie/colle le contenu du rapport dans ta prochaine réponse par un copier/coller.
Si cela ne fonctionne pas, utilise le site http://pjjoint.malekal.com pour héberger le rapport, donne le lien du rapport dans un nouveau message.
Note : Le rapport est également sauvegardé sous C:\AdwCleaner[S1].txt
puis réinitialise tes navigateurs:
==================================
Réinitialise tes navigateurs et ou manuellement reparamètre tes navigateurs WEB (page de démarrage, moteur de recherche etc) mais aussi supprimer/désactiver les extensions inutiles/parasites :
* Internet Explorer et modules complémentaires / moteurs de recherche : https://forum.malekal.com/viewtopic.php?t=41399&start=
* Firefox : https://www.malekal.com/reparer-firefox/?t=36057&start=
* Google Chrome : https://www.malekal.com/reparer-google-chrome/?t=35837&start=
Sur la page d'AdwCleaner, à droite, clic sur la disquette grise avec la flèche verte pour lancer le téléchargement.
Lance AdwCleaner, clique sur [Scanner].
Le scan peux durer plusieurs minutes, patienter.
Une fois le scan terminé, clique sur [Nettoyer]
Une fois le nettoyage terminé, un rapport s'ouvrira. Copie/colle le contenu du rapport dans ta prochaine réponse par un copier/coller.
Si cela ne fonctionne pas, utilise le site http://pjjoint.malekal.com pour héberger le rapport, donne le lien du rapport dans un nouveau message.
Note : Le rapport est également sauvegardé sous C:\AdwCleaner[S1].txt
puis réinitialise tes navigateurs:
==================================
Réinitialise tes navigateurs et ou manuellement reparamètre tes navigateurs WEB (page de démarrage, moteur de recherche etc) mais aussi supprimer/désactiver les extensions inutiles/parasites :
* Internet Explorer et modules complémentaires / moteurs de recherche : https://forum.malekal.com/viewtopic.php?t=41399&start=
* Firefox : https://www.malekal.com/reparer-firefox/?t=36057&start=
* Google Chrome : https://www.malekal.com/reparer-google-chrome/?t=35837&start=
# AdwCleaner v3.208 - Rapport créé le 16/05/2014 à 19:55:02
# Mis à jour le 11/05/2014 par Xplode
# Système d'exploitation : Windows 7 Ultimate Service Pack 1 (64 bits)
# Nom d'utilisateur : HP - HP-PC
# Exécuté depuis : C:\Users\HP\Downloads\adwcleaner_3.208.exe
# Option : Nettoyer
***** [ Services ] *****
***** [ Fichiers / Dossiers ] *****
Dossier Supprimé : C:\Users\HP\AppData\Roaming\eCyber
***** [ Raccourcis ] *****
***** [ Registre ] *****
***** [ Navigateurs ] *****
-\\ Internet Explorer v11.0.9600.17041
-\\ Mozilla Firefox v29.0.1 (ru)
[ Fichier : C:\Users\HP\AppData\Roaming\Mozilla\Firefox\Profiles\ls2l8bdn.default\prefs.js ]
-\\ Google Chrome v
[ Fichier : C:\Users\HP\AppData\Local\Google\Chrome\User Data\Default\preferences ]
*************************
AdwCleaner[R0].txt - [966 octets] - [16/05/2014 19:29:04]
AdwCleaner[R1].txt - [1025 octets] - [16/05/2014 19:34:41]
AdwCleaner[R2].txt - [1146 octets] - [16/05/2014 19:45:29]
AdwCleaner[S0].txt - [1088 octets] - [16/05/2014 19:42:30]
AdwCleaner[S1].txt - [1069 octets] - [16/05/2014 19:55:02]
########## EOF - C:\AdwCleaner\AdwCleaner[S1].txt - [1129 octets] ##########
# Mis à jour le 11/05/2014 par Xplode
# Système d'exploitation : Windows 7 Ultimate Service Pack 1 (64 bits)
# Nom d'utilisateur : HP - HP-PC
# Exécuté depuis : C:\Users\HP\Downloads\adwcleaner_3.208.exe
# Option : Nettoyer
***** [ Services ] *****
***** [ Fichiers / Dossiers ] *****
Dossier Supprimé : C:\Users\HP\AppData\Roaming\eCyber
***** [ Raccourcis ] *****
***** [ Registre ] *****
***** [ Navigateurs ] *****
-\\ Internet Explorer v11.0.9600.17041
-\\ Mozilla Firefox v29.0.1 (ru)
[ Fichier : C:\Users\HP\AppData\Roaming\Mozilla\Firefox\Profiles\ls2l8bdn.default\prefs.js ]
-\\ Google Chrome v
[ Fichier : C:\Users\HP\AppData\Local\Google\Chrome\User Data\Default\preferences ]
*************************
AdwCleaner[R0].txt - [966 octets] - [16/05/2014 19:29:04]
AdwCleaner[R1].txt - [1025 octets] - [16/05/2014 19:34:41]
AdwCleaner[R2].txt - [1146 octets] - [16/05/2014 19:45:29]
AdwCleaner[S0].txt - [1088 octets] - [16/05/2014 19:42:30]
AdwCleaner[S1].txt - [1069 octets] - [16/05/2014 19:55:02]
########## EOF - C:\AdwCleaner\AdwCleaner[S1].txt - [1129 octets] ##########
Faire un Scan OTL - Temps : Environ 40min
=====================
OTL permet de diagnostiquer les programmes qui tournent et déceler des infections - Le programme va générer deux rapports OTL.txt et Extras.txt
Fournir les deux rapports :
Tu peux suivre les indications de cette page pour t'aider : https://www.malekal.com/tutorial-otl/
* Télécharge http://www.geekstogo.com/forum/files/file/398-otl-oldtimers-list-it/ sur ton bureau.
(Sous Vista/Win7, il faut cliquer droit sur OTL et choisir Exécuter en tant qu'administrateur)
Dans le cas d'Avast!, ne pas lancer le programme dans la Sandbox (voir lien d'aide ci-dessus).
* Lance OTL
* En haut à droite de Analyse rapide, coche "tous les utilisateurs"
* Sur OTL, sous Personnalisation, copie-colle le script ci-dessous :
netsvcs
msconfig
safebootminimal
safebootnetwork
activex
drivers32
%ALLUSERSPROFILE%\Application Data\*.
%ALLUSERSPROFILE%\Application Data\*.exe /s
%ALLUSERSPROFILE%\Application Data\*.dll /s
%APPDATA%\*.
%APPDATA%\*.exe /s
%temp%\*.exe /s
%SYSTEMDRIVE%\*.exe
%systemroot%\*. /mp /s
%systemroot%\system32\consrv.dll
%systemroot%\system32\*.dll /lockedfiles
%windir%\Tasks\*.job /lockedfiles
%systemroot%\system32\drivers\*.sys /lockedfiles
%systemroot%\System32\config\*.sav
/md5start
explorer.exe
winlogon.exe
services.exe
wininit.exe
/md5stop
HKEY_CLASSES_ROOT\CLSID\{F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1}\InprocServer32 /s
HKEY_LOCAL_MACHINE\SYSTEM\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters /s
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\SubSystems /s
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\AppCertDlls /s
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList /s
HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor /s
HKEY_CURRENT_USER\Software\Microsoft\Command Processor /s
CREATERESTOREPOINT
nslookup www.google.fr /c
ping www.google.fr /c
ipconfig /all /c
SAVEMBR:0
hklm\software\clients\startmenuinternet|command /rs
hklm\software\clients\startmenuinternet|command /64 /rs
* Clique sur le bouton Analyse.
**** Si durant le scan - OTL ne répond pas, ne touche à rien et laisse le scan se poursuivre ****
* Quand le scan est fini, utilise le site http://pjjoint.malekal.com/ pour envoyer le rapport OTL.txt (et Extra.txt si présent).
Donne le ou les liens pjjoint qui pointent vers ces rapports ici dans une réponse.
Je répète : donne le lien du rapport pjjoint ici en réponse.
NE PAS COPIER/COLLER LE RAPPORT ICI - DONNER LE LIEN PJJOINT DANS UN NOUVEAU MESSAGE
=====================
OTL permet de diagnostiquer les programmes qui tournent et déceler des infections - Le programme va générer deux rapports OTL.txt et Extras.txt
Fournir les deux rapports :
Tu peux suivre les indications de cette page pour t'aider : https://www.malekal.com/tutorial-otl/
* Télécharge http://www.geekstogo.com/forum/files/file/398-otl-oldtimers-list-it/ sur ton bureau.
(Sous Vista/Win7, il faut cliquer droit sur OTL et choisir Exécuter en tant qu'administrateur)
Dans le cas d'Avast!, ne pas lancer le programme dans la Sandbox (voir lien d'aide ci-dessus).
* Lance OTL
* En haut à droite de Analyse rapide, coche "tous les utilisateurs"
* Sur OTL, sous Personnalisation, copie-colle le script ci-dessous :
netsvcs
msconfig
safebootminimal
safebootnetwork
activex
drivers32
%ALLUSERSPROFILE%\Application Data\*.
%ALLUSERSPROFILE%\Application Data\*.exe /s
%ALLUSERSPROFILE%\Application Data\*.dll /s
%APPDATA%\*.
%APPDATA%\*.exe /s
%temp%\*.exe /s
%SYSTEMDRIVE%\*.exe
%systemroot%\*. /mp /s
%systemroot%\system32\consrv.dll
%systemroot%\system32\*.dll /lockedfiles
%windir%\Tasks\*.job /lockedfiles
%systemroot%\system32\drivers\*.sys /lockedfiles
%systemroot%\System32\config\*.sav
/md5start
explorer.exe
winlogon.exe
services.exe
wininit.exe
/md5stop
HKEY_CLASSES_ROOT\CLSID\{F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1}\InprocServer32 /s
HKEY_LOCAL_MACHINE\SYSTEM\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters /s
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\SubSystems /s
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\AppCertDlls /s
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList /s
HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor /s
HKEY_CURRENT_USER\Software\Microsoft\Command Processor /s
CREATERESTOREPOINT
nslookup www.google.fr /c
ping www.google.fr /c
ipconfig /all /c
SAVEMBR:0
hklm\software\clients\startmenuinternet|command /rs
hklm\software\clients\startmenuinternet|command /64 /rs
* Clique sur le bouton Analyse.
**** Si durant le scan - OTL ne répond pas, ne touche à rien et laisse le scan se poursuivre ****
* Quand le scan est fini, utilise le site http://pjjoint.malekal.com/ pour envoyer le rapport OTL.txt (et Extra.txt si présent).
Donne le ou les liens pjjoint qui pointent vers ces rapports ici dans une réponse.
Je répète : donne le lien du rapport pjjoint ici en réponse.
NE PAS COPIER/COLLER LE RAPPORT ICI - DONNER LE LIEN PJJOINT DANS UN NOUVEAU MESSAGE
voilà
http://pjjoint.malekal.com/files.php?id=20140516_n11d14h11m7k9
http://pjjoint.malekal.com/files.php?id=20140516_u8l14w7r11s14
http://pjjoint.malekal.com/files.php?id=20140516_n11d14h11m7k9
http://pjjoint.malekal.com/files.php?id=20140516_u8l14w7r11s14
Lance ça : https://forum.malekal.com/viewtopic.php?t=29444&start=
Fais un DNS RAZ à droite.
Tu as quoi comme routeur ?
Fais un DNS RAZ à droite.
Tu as quoi comme routeur ?
RogueKiller V8.8.15 _x64_ [Mar 27 2014] par Adlice Software
mail : https://www.adlice.com/contact/
Remontees : https://forum.adlice.com/
Site Web : http://www.surlatoile.org/RogueKiller/
Blog : https://www.adlice.com/
Systeme d'exploitation : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Demarrage : Mode normal
Utilisateur : HP [Droits d'admin]
Mode : Suppression -- Date : 05/16/2014 22:56:17
| ARK || FAK || MBR |
¤¤¤ Processus malicieux : 1 ¤¤¤
[SUSP PATH] ouc.exe -- C:\ProgramData\MobiConnect\OnlineUpdate\ouc.exe [7] -> TUÉ [TermProc]
¤¤¤ Entrees de registre : 2 ¤¤¤
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REMPLACÉ (0)
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REMPLACÉ (0)
¤¤¤ Tâches planifiées : 0 ¤¤¤
¤¤¤ Entrées Startup : 0 ¤¤¤
¤¤¤ Navigateurs web : 0 ¤¤¤
¤¤¤ Addons navigateur : 0 ¤¤¤
¤¤¤ Fichiers / Dossiers particuliers: ¤¤¤
¤¤¤ Driver : [NON CHARGE 0x0] ¤¤¤
[Address] EAT @explorer.exe (DllCanUnloadNow) : msxml6.dll -> HOOKED (C:\Windows\system32\wpdshserviceobj.dll @ 0xFA633D60)
[Address] EAT @explorer.exe (DllGetClassObject) : msxml6.dll -> HOOKED (C:\Windows\system32\wpdshserviceobj.dll @ 0xFA631A74)
[Address] EAT @explorer.exe (DllRegisterServer) : msxml6.dll -> HOOKED (C:\Windows\system32\wpdshserviceobj.dll @ 0xFA636070)
[Address] EAT @explorer.exe (DllUnregisterServer) : msxml6.dll -> HOOKED (C:\Windows\system32\wpdshserviceobj.dll @ 0xFA636278)
[Address] EAT @firefox.exe (BeginBufferedAnimation) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7DF38)
[Address] EAT @firefox.exe (BeginBufferedPaint) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7B741)
[Address] EAT @firefox.exe (BeginPanningFeedback) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B976AF)
[Address] EAT @firefox.exe (BufferedPaintClear) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7BBDB)
[Address] EAT @firefox.exe (BufferedPaintInit) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7B8D4)
[Address] EAT @firefox.exe (BufferedPaintRenderAnimation) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7DE83)
[Address] EAT @firefox.exe (BufferedPaintSetAlpha) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9CE19)
[Address] EAT @firefox.exe (BufferedPaintStopAllAnimations) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7E428)
[Address] EAT @firefox.exe (BufferedPaintUnInit) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B87525)
[Address] EAT @firefox.exe (CloseThemeData) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B71FA1)
[Address] EAT @firefox.exe (DrawThemeBackground) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7D464)
[Address] EAT @firefox.exe (DrawThemeBackgroundEx) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B8436D)
[Address] EAT @firefox.exe (DrawThemeEdge) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9C01C)
[Address] EAT @firefox.exe (DrawThemeIcon) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9D123)
[Address] EAT @firefox.exe (DrawThemeParentBackground) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7E776)
[Address] EAT @firefox.exe (DrawThemeParentBackgroundEx) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7E5C5)
[Address] EAT @firefox.exe (DrawThemeText) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7DB21)
[Address] EAT @firefox.exe (DrawThemeTextEx) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7A70C)
[Address] EAT @firefox.exe (EnableThemeDialogTexture) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B8786D)
[Address] EAT @firefox.exe (EnableTheming) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9C9FF)
[Address] EAT @firefox.exe (EndBufferedAnimation) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7ACE8)
[Address] EAT @firefox.exe (EndBufferedPaint) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7ACE8)
[Address] EAT @firefox.exe (EndPanningFeedback) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9762C)
[Address] EAT @firefox.exe (GetBufferedPaintBits) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7CF26)
[Address] EAT @firefox.exe (GetBufferedPaintDC) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9CDCF)
[Address] EAT @firefox.exe (GetBufferedPaintTargetDC) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9CD86)
[Address] EAT @firefox.exe (GetBufferedPaintTargetRect) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9C893)
[Address] EAT @firefox.exe (GetCurrentThemeName) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B863AE)
[Address] EAT @firefox.exe (GetThemeAppProperties) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7EBD6)
[Address] EAT @firefox.exe (GetThemeBackgroundContentRect) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7DA9E)
[Address] EAT @firefox.exe (GetThemeBackgroundExtent) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B87155)
[Address] EAT @firefox.exe (GetThemeBackgroundRegion) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B80190)
[Address] EAT @firefox.exe (GetThemeBitmap) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B74B9C)
[Address] EAT @firefox.exe (GetThemeBool) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B76651)
[Address] EAT @firefox.exe (GetThemeColor) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B727C0)
[Address] EAT @firefox.exe (GetThemeDocumentationProperty) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9C346)
[Address] EAT @firefox.exe (GetThemeEnumValue) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B727C0)
[Address] EAT @firefox.exe (GetThemeFilename) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9B997)
[Address] EAT @firefox.exe (GetThemeFont) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B876A2)
[Address] EAT @firefox.exe (GetThemeInt) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B727C0)
[Address] EAT @firefox.exe (GetThemeIntList) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9B86E)
[Address] EAT @firefox.exe (GetThemeMargins) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B72F97)
[Address] EAT @firefox.exe (GetThemeMetric) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B855B4)
[Address] EAT @firefox.exe (GetThemePartSize) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7289F)
[Address] EAT @firefox.exe (GetThemePosition) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9B80D)
[Address] EAT @firefox.exe (GetThemePropertyOrigin) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B80923)
[Address] EAT @firefox.exe (GetThemeRect) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9B936)
[Address] EAT @firefox.exe (GetThemeStream) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9B8CF)
[Address] EAT @firefox.exe (GetThemeString) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9B7A1)
[Address] EAT @firefox.exe (GetThemeSysBool) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9CB86)
[Address] EAT @firefox.exe (GetThemeSysColor) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B85530)
[Address] EAT @firefox.exe (GetThemeSysColorBrush) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9CA32)
[Address] EAT @firefox.exe (GetThemeSysFont) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9C3D8)
[Address] EAT @firefox.exe (GetThemeSysInt) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9C5E7)
[Address] EAT @firefox.exe (GetThemeSysSize) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9CC61)
[Address] EAT @firefox.exe (GetThemeSysString) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9C553)
[Address] EAT @firefox.exe (GetThemeTextExtent) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B789FE)
[Address] EAT @firefox.exe (GetThemeTextMetrics) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B8778C)
[Address] EAT @firefox.exe (GetThemeTransitionDuration) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7E1A1)
[Address] EAT @firefox.exe (GetWindowTheme) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B8535B)
[Address] EAT @firefox.exe (HitTestThemeBackground) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B82DC1)
[Address] EAT @firefox.exe (IsAppThemed) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B87009)
[Address] EAT @firefox.exe (IsCompositionActive) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B765DF)
[Address] EAT @firefox.exe (IsThemeActive) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B86F36)
[Address] EAT @firefox.exe (IsThemeBackgroundPartiallyTransparent) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7281C)
[Address] EAT @firefox.exe (IsThemeDialogTextureEnabled) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9CB3F)
[Address] EAT @firefox.exe (IsThemePartDefined) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B730CF)
[Address] EAT @firefox.exe (OpenThemeData) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B75F29)
[Address] EAT @firefox.exe (OpenThemeDataEx) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B806FE)
[Address] EAT @firefox.exe (SetThemeAppProperties) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9CCEC)
[Address] EAT @firefox.exe (SetWindowTheme) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B87AFC)
[Address] EAT @firefox.exe (SetWindowThemeAttribute) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B79E39)
[Address] EAT @firefox.exe (ThemeInitApiHook) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B74571)
[Address] EAT @firefox.exe (UpdatePanningFeedback) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B975ED)
¤¤¤ Ruches Externes: ¤¤¤
¤¤¤ Infection : ¤¤¤
¤¤¤ Fichier HOSTS: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts
¤¤¤ MBR Verif: ¤¤¤
+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) Hitachi HTS547575A9E384 ATA Device +++++
--- User ---
[MBR] 2e005040f72e9038722baa39b0261248
[BSP] 5e99046e3d34a905bde1704a9c0c24c4 : Windows 7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 MB
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 175303 MB
2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 359227392 | Size: 539999 MB
User = LL1 ... OK!
User = LL2 ... OK!
Termine : << RKreport[0]_D_05162014_225617.txt >>
RKreport[0]_S_05162014_225519.txt
mail : https://www.adlice.com/contact/
Remontees : https://forum.adlice.com/
Site Web : http://www.surlatoile.org/RogueKiller/
Blog : https://www.adlice.com/
Systeme d'exploitation : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Demarrage : Mode normal
Utilisateur : HP [Droits d'admin]
Mode : Suppression -- Date : 05/16/2014 22:56:17
| ARK || FAK || MBR |
¤¤¤ Processus malicieux : 1 ¤¤¤
[SUSP PATH] ouc.exe -- C:\ProgramData\MobiConnect\OnlineUpdate\ouc.exe [7] -> TUÉ [TermProc]
¤¤¤ Entrees de registre : 2 ¤¤¤
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REMPLACÉ (0)
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REMPLACÉ (0)
¤¤¤ Tâches planifiées : 0 ¤¤¤
¤¤¤ Entrées Startup : 0 ¤¤¤
¤¤¤ Navigateurs web : 0 ¤¤¤
¤¤¤ Addons navigateur : 0 ¤¤¤
¤¤¤ Fichiers / Dossiers particuliers: ¤¤¤
¤¤¤ Driver : [NON CHARGE 0x0] ¤¤¤
[Address] EAT @explorer.exe (DllCanUnloadNow) : msxml6.dll -> HOOKED (C:\Windows\system32\wpdshserviceobj.dll @ 0xFA633D60)
[Address] EAT @explorer.exe (DllGetClassObject) : msxml6.dll -> HOOKED (C:\Windows\system32\wpdshserviceobj.dll @ 0xFA631A74)
[Address] EAT @explorer.exe (DllRegisterServer) : msxml6.dll -> HOOKED (C:\Windows\system32\wpdshserviceobj.dll @ 0xFA636070)
[Address] EAT @explorer.exe (DllUnregisterServer) : msxml6.dll -> HOOKED (C:\Windows\system32\wpdshserviceobj.dll @ 0xFA636278)
[Address] EAT @firefox.exe (BeginBufferedAnimation) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7DF38)
[Address] EAT @firefox.exe (BeginBufferedPaint) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7B741)
[Address] EAT @firefox.exe (BeginPanningFeedback) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B976AF)
[Address] EAT @firefox.exe (BufferedPaintClear) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7BBDB)
[Address] EAT @firefox.exe (BufferedPaintInit) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7B8D4)
[Address] EAT @firefox.exe (BufferedPaintRenderAnimation) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7DE83)
[Address] EAT @firefox.exe (BufferedPaintSetAlpha) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9CE19)
[Address] EAT @firefox.exe (BufferedPaintStopAllAnimations) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7E428)
[Address] EAT @firefox.exe (BufferedPaintUnInit) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B87525)
[Address] EAT @firefox.exe (CloseThemeData) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B71FA1)
[Address] EAT @firefox.exe (DrawThemeBackground) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7D464)
[Address] EAT @firefox.exe (DrawThemeBackgroundEx) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B8436D)
[Address] EAT @firefox.exe (DrawThemeEdge) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9C01C)
[Address] EAT @firefox.exe (DrawThemeIcon) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9D123)
[Address] EAT @firefox.exe (DrawThemeParentBackground) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7E776)
[Address] EAT @firefox.exe (DrawThemeParentBackgroundEx) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7E5C5)
[Address] EAT @firefox.exe (DrawThemeText) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7DB21)
[Address] EAT @firefox.exe (DrawThemeTextEx) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7A70C)
[Address] EAT @firefox.exe (EnableThemeDialogTexture) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B8786D)
[Address] EAT @firefox.exe (EnableTheming) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9C9FF)
[Address] EAT @firefox.exe (EndBufferedAnimation) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7ACE8)
[Address] EAT @firefox.exe (EndBufferedPaint) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7ACE8)
[Address] EAT @firefox.exe (EndPanningFeedback) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9762C)
[Address] EAT @firefox.exe (GetBufferedPaintBits) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7CF26)
[Address] EAT @firefox.exe (GetBufferedPaintDC) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9CDCF)
[Address] EAT @firefox.exe (GetBufferedPaintTargetDC) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9CD86)
[Address] EAT @firefox.exe (GetBufferedPaintTargetRect) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9C893)
[Address] EAT @firefox.exe (GetCurrentThemeName) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B863AE)
[Address] EAT @firefox.exe (GetThemeAppProperties) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7EBD6)
[Address] EAT @firefox.exe (GetThemeBackgroundContentRect) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7DA9E)
[Address] EAT @firefox.exe (GetThemeBackgroundExtent) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B87155)
[Address] EAT @firefox.exe (GetThemeBackgroundRegion) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B80190)
[Address] EAT @firefox.exe (GetThemeBitmap) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B74B9C)
[Address] EAT @firefox.exe (GetThemeBool) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B76651)
[Address] EAT @firefox.exe (GetThemeColor) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B727C0)
[Address] EAT @firefox.exe (GetThemeDocumentationProperty) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9C346)
[Address] EAT @firefox.exe (GetThemeEnumValue) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B727C0)
[Address] EAT @firefox.exe (GetThemeFilename) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9B997)
[Address] EAT @firefox.exe (GetThemeFont) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B876A2)
[Address] EAT @firefox.exe (GetThemeInt) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B727C0)
[Address] EAT @firefox.exe (GetThemeIntList) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9B86E)
[Address] EAT @firefox.exe (GetThemeMargins) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B72F97)
[Address] EAT @firefox.exe (GetThemeMetric) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B855B4)
[Address] EAT @firefox.exe (GetThemePartSize) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7289F)
[Address] EAT @firefox.exe (GetThemePosition) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9B80D)
[Address] EAT @firefox.exe (GetThemePropertyOrigin) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B80923)
[Address] EAT @firefox.exe (GetThemeRect) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9B936)
[Address] EAT @firefox.exe (GetThemeStream) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9B8CF)
[Address] EAT @firefox.exe (GetThemeString) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9B7A1)
[Address] EAT @firefox.exe (GetThemeSysBool) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9CB86)
[Address] EAT @firefox.exe (GetThemeSysColor) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B85530)
[Address] EAT @firefox.exe (GetThemeSysColorBrush) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9CA32)
[Address] EAT @firefox.exe (GetThemeSysFont) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9C3D8)
[Address] EAT @firefox.exe (GetThemeSysInt) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9C5E7)
[Address] EAT @firefox.exe (GetThemeSysSize) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9CC61)
[Address] EAT @firefox.exe (GetThemeSysString) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9C553)
[Address] EAT @firefox.exe (GetThemeTextExtent) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B789FE)
[Address] EAT @firefox.exe (GetThemeTextMetrics) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B8778C)
[Address] EAT @firefox.exe (GetThemeTransitionDuration) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7E1A1)
[Address] EAT @firefox.exe (GetWindowTheme) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B8535B)
[Address] EAT @firefox.exe (HitTestThemeBackground) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B82DC1)
[Address] EAT @firefox.exe (IsAppThemed) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B87009)
[Address] EAT @firefox.exe (IsCompositionActive) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B765DF)
[Address] EAT @firefox.exe (IsThemeActive) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B86F36)
[Address] EAT @firefox.exe (IsThemeBackgroundPartiallyTransparent) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B7281C)
[Address] EAT @firefox.exe (IsThemeDialogTextureEnabled) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9CB3F)
[Address] EAT @firefox.exe (IsThemePartDefined) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B730CF)
[Address] EAT @firefox.exe (OpenThemeData) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B75F29)
[Address] EAT @firefox.exe (OpenThemeDataEx) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B806FE)
[Address] EAT @firefox.exe (SetThemeAppProperties) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B9CCEC)
[Address] EAT @firefox.exe (SetWindowTheme) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B87AFC)
[Address] EAT @firefox.exe (SetWindowThemeAttribute) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B79E39)
[Address] EAT @firefox.exe (ThemeInitApiHook) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B74571)
[Address] EAT @firefox.exe (UpdatePanningFeedback) : comctl32.dll -> HOOKED (C:\Windows\SysWOW64\UxTheme.dll @ 0x71B975ED)
¤¤¤ Ruches Externes: ¤¤¤
¤¤¤ Infection : ¤¤¤
¤¤¤ Fichier HOSTS: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts
¤¤¤ MBR Verif: ¤¤¤
+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) Hitachi HTS547575A9E384 ATA Device +++++
--- User ---
[MBR] 2e005040f72e9038722baa39b0261248
[BSP] 5e99046e3d34a905bde1704a9c0c24c4 : Windows 7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 MB
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 175303 MB
2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 359227392 | Size: 539999 MB
User = LL1 ... OK!
User = LL2 ... OK!
Termine : << RKreport[0]_D_05162014_225617.txt >>
RKreport[0]_S_05162014_225519.txt
Euh Voilà
Remontees : https://forum.adlice.com/
Site Web : http://www.surlatoile.org/RogueKiller/
Blog : https://www.adlice.com/
Systeme d'exploitation : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Demarrage : Mode normal
Utilisateur : HP [Droits d'admin]
Mode : DNS RAZ -- Date : 05/17/2014 10:53:21
| ARK || FAK || MBR |
¤¤¤ Processus malicieux : 1 ¤¤¤
[SUSP PATH] ouc.exe -- C:\ProgramData\MobiConnect\OnlineUpdate\ouc.exe [7] -> TUÉ [TermProc]
¤¤¤ Entrees de registre : 6 ¤¤¤
[DNS][PUM] HKLM\[...]\CCSet\[...]\{10C527D6-F6FA-407C-AEF2-DBC2A6890694} : NameServer (8.8.8.8 0.0.0.0 [UNITED STATES (US) - (Private Address) (XX)]) -> REMPLACÉ ()
[DNS][PUM] HKLM\[...]\CCSet\[...]\{611ADFFD-B261-4B02-B627-83E657AB9666} : NameServer (8.8.8.8 193.251.169.165 [UNITED STATES (US) - ALGERIA (DZ)]) -> REMPLACÉ ()
[DNS][PUM] HKLM\[...]\CS001\[...]\{10C527D6-F6FA-407C-AEF2-DBC2A6890694} : NameServer (8.8.8.8 0.0.0.0 [UNITED STATES (US) - (Private Address) (XX)]) -> REMPLACÉ ()
[DNS][PUM] HKLM\[...]\CS001\[...]\{611ADFFD-B261-4B02-B627-83E657AB9666} : NameServer (8.8.8.8 193.251.169.165 [UNITED STATES (US) - ALGERIA (DZ)]) -> REMPLACÉ ()
[DNS][PUM] HKLM\[...]\CS002\[...]\{10C527D6-F6FA-407C-AEF2-DBC2A6890694} : NameServer (8.8.8.8 0.0.0.0 [UNITED STATES (US) - (Private Address) (XX)]) -> REMPLACÉ ()
[DNS][PUM] HKLM\[...]\CS002\[...]\{611ADFFD-B261-4B02-B627-83E657AB9666} : NameServer (8.8.8.8 193.251.169.165 [UNITED STATES (US) - ALGERIA (DZ)]) -> REMPLACÉ ()
¤¤¤ Driver : [NON CHARGE 0x0] ¤¤¤
¤¤¤ Ruches Externes: ¤¤¤
¤¤¤ Infection : ¤¤¤
Termine : << RKreport[0]_DN_05172014_105321.txt >>
RKreport[0]_D_05162014_225617.txt;RKreport[0]_S_05162014_225519.txt;RKreport[0]_S_05172014_105212.txt
Remontees : https://forum.adlice.com/
Site Web : http://www.surlatoile.org/RogueKiller/
Blog : https://www.adlice.com/
Systeme d'exploitation : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Demarrage : Mode normal
Utilisateur : HP [Droits d'admin]
Mode : DNS RAZ -- Date : 05/17/2014 10:53:21
| ARK || FAK || MBR |
¤¤¤ Processus malicieux : 1 ¤¤¤
[SUSP PATH] ouc.exe -- C:\ProgramData\MobiConnect\OnlineUpdate\ouc.exe [7] -> TUÉ [TermProc]
¤¤¤ Entrees de registre : 6 ¤¤¤
[DNS][PUM] HKLM\[...]\CCSet\[...]\{10C527D6-F6FA-407C-AEF2-DBC2A6890694} : NameServer (8.8.8.8 0.0.0.0 [UNITED STATES (US) - (Private Address) (XX)]) -> REMPLACÉ ()
[DNS][PUM] HKLM\[...]\CCSet\[...]\{611ADFFD-B261-4B02-B627-83E657AB9666} : NameServer (8.8.8.8 193.251.169.165 [UNITED STATES (US) - ALGERIA (DZ)]) -> REMPLACÉ ()
[DNS][PUM] HKLM\[...]\CS001\[...]\{10C527D6-F6FA-407C-AEF2-DBC2A6890694} : NameServer (8.8.8.8 0.0.0.0 [UNITED STATES (US) - (Private Address) (XX)]) -> REMPLACÉ ()
[DNS][PUM] HKLM\[...]\CS001\[...]\{611ADFFD-B261-4B02-B627-83E657AB9666} : NameServer (8.8.8.8 193.251.169.165 [UNITED STATES (US) - ALGERIA (DZ)]) -> REMPLACÉ ()
[DNS][PUM] HKLM\[...]\CS002\[...]\{10C527D6-F6FA-407C-AEF2-DBC2A6890694} : NameServer (8.8.8.8 0.0.0.0 [UNITED STATES (US) - (Private Address) (XX)]) -> REMPLACÉ ()
[DNS][PUM] HKLM\[...]\CS002\[...]\{611ADFFD-B261-4B02-B627-83E657AB9666} : NameServer (8.8.8.8 193.251.169.165 [UNITED STATES (US) - ALGERIA (DZ)]) -> REMPLACÉ ()
¤¤¤ Driver : [NON CHARGE 0x0] ¤¤¤
¤¤¤ Ruches Externes: ¤¤¤
¤¤¤ Infection : ¤¤¤
Termine : << RKreport[0]_DN_05172014_105321.txt >>
RKreport[0]_D_05162014_225617.txt;RKreport[0]_S_05162014_225519.txt;RKreport[0]_S_05172014_105212.txt
ok, regarde ce que cela donne.
Y a des vulnéabilités qui permettent le hack de ces routeurs.
Faudrait faire un reset hard et installer le dernier firmware: https://www.tp-link.com/en/home-networking/dsl-modem-router/td-w8101g/#qrcode#down
Plus globalement : https://forum.malekal.com/viewtopic.php?t=47046&start=
Like the angel you are, you laugh creating a lightness in my chest,
Your eyes they penetrate me,
(Your answer's always 'maybe')
That's when I got up and left
Faudrait faire un reset hard et installer le dernier firmware: https://www.tp-link.com/en/home-networking/dsl-modem-router/td-w8101g/#qrcode#down
Plus globalement : https://forum.malekal.com/viewtopic.php?t=47046&start=
Like the angel you are, you laugh creating a lightness in my chest,
Your eyes they penetrate me,
(Your answer's always 'maybe')
That's when I got up and left
hum je vais lire tout ça & le faire ! merci
j'aurai une question à te poser , j'ai le même problème sur mon 2éme ordinateur , est-ce que je peux procéder de la même manière pour résoudre le problème ?
y'a une liste de Firmware le quel dois-je télécharger ? https://www.tp-link.com/en/support/download/?model=TD-W8101G&version=V2#tbl_j
j'aurai une question à te poser , j'ai le même problème sur mon 2éme ordinateur , est-ce que je peux procéder de la même manière pour résoudre le problème ?
y'a une liste de Firmware le quel dois-je télécharger ? https://www.tp-link.com/en/support/download/?model=TD-W8101G&version=V2#tbl_j
oui fais un DNS RAZ dessus
Reset hard du routeur, remettre les paramètres de connexion
charger le dernier firmware.
non celui là je pense : https://www.tp-link.com/en/support/download/?model=TD-W8101G&version=V3#tbl_j
Au passage : Do NOT upgrade the firmware through wireless connection unless the device only has wireless connection;
Faut le faire avec une connexion filiaire.
Reset hard du routeur, remettre les paramètres de connexion
charger le dernier firmware.
non celui là je pense : https://www.tp-link.com/en/support/download/?model=TD-W8101G&version=V3#tbl_j
Au passage : Do NOT upgrade the firmware through wireless connection unless the device only has wireless connection;
Faut le faire avec une connexion filiaire.
Re, c'est encore moi.
concernant le 2eme PC j'ai scanné & supprimé avec AdwCleaner
Maintenant quel script je dois C/c sur OTL
Le rapport : https://pjjoint.malekal.com/files.php?id=20140518_c7e11e9m1313
concernant le 2eme PC j'ai scanné & supprimé avec AdwCleaner
Maintenant quel script je dois C/c sur OTL
Le rapport : https://pjjoint.malekal.com/files.php?id=20140518_c7e11e9m1313
Bonjour , je m'excuse pour cette absence , j'avais quelques soucis avec ma connexion Internet .
Voici le rapport https://pjjoint.malekal.com/files.php?id=20140523_d9i15f8u14f12
Voici le rapport https://pjjoint.malekal.com/files.php?id=20140523_d9i15f8u14f12
pas de souci :)
Pour ne plus te faire avoir.
A lire - Programmes parasites / PUPs : https://www.malekal.com/adwares-pup-protection/
Pour ne plus te faire avoir.
A lire - Programmes parasites / PUPs : https://www.malekal.com/adwares-pup-protection/