Logiciel de hack ... et hack :/
Résolu/Fermé
woodyprod
-
8 janv. 2015 à 15:26
Malekal_morte- Messages postés 180304 Date d'inscription mercredi 17 mai 2006 Statut Modérateur, Contributeur sécurité Dernière intervention 15 décembre 2020 - 8 janv. 2015 à 20:36
Malekal_morte- Messages postés 180304 Date d'inscription mercredi 17 mai 2006 Statut Modérateur, Contributeur sécurité Dernière intervention 15 décembre 2020 - 8 janv. 2015 à 20:36
A voir également:
- Logiciel de hack ... et hack :/
- Money logiciel - Télécharger - Comptabilité & Facturation
- Logiciel de sauvegarde - Guide
- Logiciel montage vidéo gratuit windows 10 - Guide
- Logiciel benchmark - Guide
- Logiciel spss - Télécharger - Outils professionnels
9 réponses
Malekal_morte-
Messages postés
180304
Date d'inscription
mercredi 17 mai 2006
Statut
Modérateur, Contributeur sécurité
Dernière intervention
15 décembre 2020
24 644
8 janv. 2015 à 15:27
8 janv. 2015 à 15:27
Salut,
"J'ai installé un bot"
c'est à dire ?
"J'ai installé un bot"
c'est à dire ?
woodyprod
Messages postés
15
Date d'inscription
jeudi 8 janvier 2015
Statut
Membre
Dernière intervention
8 janvier 2015
8 janv. 2015 à 16:05
8 janv. 2015 à 16:05
Dofus
woodyprod
Messages postés
15
Date d'inscription
jeudi 8 janvier 2015
Statut
Membre
Dernière intervention
8 janvier 2015
8 janv. 2015 à 16:07
8 janv. 2015 à 16:07
Je suis en train de faire un scan avec avast antivirus si jamais vous avez d'autres solution s'il vous plait dites les moi ...
irongege
Messages postés
40847
Date d'inscription
jeudi 1 novembre 2007
Statut
Modérateur
Dernière intervention
29 juin 2023
5 063
>
Utilisateur anonyme
8 janv. 2015 à 16:16
8 janv. 2015 à 16:16
Et pour info, il est illégal d'utiliser des bot dans le jeu Dofus
woodyprod
Messages postés
15
Date d'inscription
jeudi 8 janvier 2015
Statut
Membre
Dernière intervention
8 janvier 2015
>
irongege
Messages postés
40847
Date d'inscription
jeudi 1 novembre 2007
Statut
Modérateur
Dernière intervention
29 juin 2023
8 janv. 2015 à 16:21
8 janv. 2015 à 16:21
Je sais que c'est illegal mais je l'ai pas du tout utilisé installe et desinstalle direct ... parceque je savais pas que le bot cause un banne quand je l'ai su j'ai desinstaller direct
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
Malekal_morte-
Messages postés
180304
Date d'inscription
mercredi 17 mai 2006
Statut
Modérateur, Contributeur sécurité
Dernière intervention
15 décembre 2020
24 644
8 janv. 2015 à 16:16
8 janv. 2015 à 16:16
ha ok, ha oui selon comment, ça a pu installer un RAT.
Est-ce que tu vas sur le forum jeuxvideo.com ?
Suis ce tutoriel FRST: https://www.malekal.com/tutoriel-farbar-recovery-scan-tool-frst/
Cela va générer trois rapports FRST :
* FRST.txt
* Shortcut.txt
* Additionnal.txt
Envoie comme expliqué, ces trois rapports sur le site pjjoint et donne les trois liens pjjoint de ces rapports afin qu'ils puissent être consultés.
Est-ce que tu vas sur le forum jeuxvideo.com ?
Suis ce tutoriel FRST: https://www.malekal.com/tutoriel-farbar-recovery-scan-tool-frst/
Cela va générer trois rapports FRST :
* FRST.txt
* Shortcut.txt
* Additionnal.txt
Envoie comme expliqué, ces trois rapports sur le site pjjoint et donne les trois liens pjjoint de ces rapports afin qu'ils puissent être consultés.
woodyprod
Messages postés
15
Date d'inscription
jeudi 8 janvier 2015
Statut
Membre
Dernière intervention
8 janvier 2015
8 janv. 2015 à 17:02
8 janv. 2015 à 17:02
desolé de te deranger tout cela est bien fait apres je dois faire quoi ( je sais pas trop les truc dans le pc ) :/
voila les lien des scan :
https://pjjoint.malekal.com/files.php?id=20150108_g15t8l13n10t12
https://pjjoint.malekal.com/files.php?id=FRST_20150108_z9r7e14l9k11
https://pjjoint.malekal.com/files.php?id=20150108_v14f8d9p9m15
voila les lien des scan :
https://pjjoint.malekal.com/files.php?id=20150108_g15t8l13n10t12
https://pjjoint.malekal.com/files.php?id=FRST_20150108_z9r7e14l9k11
https://pjjoint.malekal.com/files.php?id=20150108_v14f8d9p9m15
woodyprod
Messages postés
15
Date d'inscription
jeudi 8 janvier 2015
Statut
Membre
Dernière intervention
8 janvier 2015
8 janv. 2015 à 16:22
8 janv. 2015 à 16:22
Non je suis jamais aller sur le forum jeuxvideo.com
Malekal_morte-
Messages postés
180304
Date d'inscription
mercredi 17 mai 2006
Statut
Modérateur, Contributeur sécurité
Dernière intervention
15 décembre 2020
24 644
8 janv. 2015 à 17:34
8 janv. 2015 à 17:34
tes infections se résument à des adwares, pas de RAT, keylogger ou autres apparemment.
Voici la correction à effectuer avec FRST.
Tu peux t'inspirer de cette note explicative avec des captures d'écran pour t'aider: https://www.malekal.com/tutoriel-farbar-recovery-scan-tool-frst/#fix
Ouvre le bloc-notes : Touche Windows + R, dans le champs executer, tape notepad et OK.
Copie/colle dedans ce qui suit :
2015-01-08 15:00 - 2014-08-28 19:12 - 00000000 ____D () C:\ProgramData\pricp
2015-01-08 15:00 - 2014-08-28 18:49 - 00000000 ____D () C:\ProgramData\pRRiceecHHOpp
2015-01-08 14:59 - 2014-11-09 17:13 - 00000000 ____D () C:\ProgramData\GoSave
2015-01-08 14:59 - 2014-08-28 18:52 - 00000000 ____D () C:\ProgramData\IePluginServices
2015-01-08 14:58 - 2014-08-28 18:50 - 00000000 ____D () C:\ProgramData\Adblocker
2015-01-08 13:24 - 2014-08-28 18:50 - 00000000 ____D () C:\Program Files (x86)\Adblocker
CHR Extension: (priCp) - C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdm [2014-08-28]
CHR Extension: (GoSave) - C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\gcejpipihlkdcocgmadbmhodkpkfbdol [2014-11-09]
CHR Extension: (pricp) - C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod [2014-08-28]
HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Search Page = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKU\S-1-5-21-498154490-4218162474-2579822568-1000\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.webpageing.com/?type=hp&ts=1409251896&from=wpc&uid=TOSHIBAXMK3275GSX_Y1S6F042SXXY1S6F042S [Pays US - 69.28.57.22]
SearchScopes: HKLM -> DefaultScope {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKLM -> {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKLM-x32 -> DefaultScope {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} URL = http://websearch.fixsearch.info/?l=1&q={searchTerms}&pid=3765&r=2014/08/28&hid=6859600285867408378&lg=EN&cc=MA&unqvl=61 [Pays DE - 46.165.228.246]
SearchScopes: HKLM-x32 -> {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKLM-x32 -> {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} URL = http://websearch.fixsearch.info/?l=1&q={searchTerms}&pid=3765&r=2014/08/28&hid=6859600285867408378&lg=EN&cc=MA&unqvl=61 [Pays DE - 46.165.228.246]
SearchScopes: HKU\S-1-5-21-498154490-4218162474-2579822568-1000 -> {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKU\S-1-5-21-498154490-4218162474-2579822568-1000 -> {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} URL = http://websearch.fixsearch.info/?l=1&q={searchTerms}&pid=3765&r=2014/08/28&hid=6859600285867408378&lg=EN&cc=MA&unqvl=61 [Pays DE - 46.165.228.246]
BHO: GoSave -> {06ede168-ff52-4e62-9fd6-8fc89d637337} -> C:\Program Files (x86)\GoSave\IF0p0EM6OK0WqM.x64.dll ()
S2 d0e87c27; c:\Program Files (x86)\SW-Booster\AssistantSvc.dll [174928 2014-08-28] () [File not signed]
Une fois, le texte coller dans le bloc-note.
Menu Fichier puis Enregistrer sous.
A gauche, place toi sur le bureau.
Dans le champs en bas, nom du fichier mets : fixlist.txt
Clic sur Enregistrer - cela va créer un fichier fixlist.txt sur le bureau.
Relance FRST et clic sur le bouton Fix
Selon comment un redémarrage est nécessaire (pas obligatoire).
Un fichier texte apparaît, copie/colle le contenu ici dans un nouveau message.
Redémarre l'ordinateur
Suis le tutorial AdwCleaner https://www.malekal.com/adwcleaner-supprimer-virus-adwares-pup/?t=33839&start= ( d'Xplode )
Télécharge le sur ton bureau ou dossier de téléchargement.
Lance AdwCleaner, clique sur [Scanner].
L'analyse peux durer plusieurs minutes, patiente.
Une fois le scan terminé, ne décoche rien, clique sur [Nettoyer]
Une fois le nettoyage terminé, un rapport s'ouvrira. Copie/colle le contenu du rapport dans ta prochaine réponse par un copier/coller.
Si cela ne fonctionne pas, utilise le site http://pjjoint.malekal.com pour héberger le rapport, donne le lien du rapport dans un nouveau message.
Note : Le rapport est également sauvegardé sous C:\AdwCleaner[S1].txt
Voici la correction à effectuer avec FRST.
Tu peux t'inspirer de cette note explicative avec des captures d'écran pour t'aider: https://www.malekal.com/tutoriel-farbar-recovery-scan-tool-frst/#fix
Ouvre le bloc-notes : Touche Windows + R, dans le champs executer, tape notepad et OK.
Copie/colle dedans ce qui suit :
2015-01-08 15:00 - 2014-08-28 19:12 - 00000000 ____D () C:\ProgramData\pricp
2015-01-08 15:00 - 2014-08-28 18:49 - 00000000 ____D () C:\ProgramData\pRRiceecHHOpp
2015-01-08 14:59 - 2014-11-09 17:13 - 00000000 ____D () C:\ProgramData\GoSave
2015-01-08 14:59 - 2014-08-28 18:52 - 00000000 ____D () C:\ProgramData\IePluginServices
2015-01-08 14:58 - 2014-08-28 18:50 - 00000000 ____D () C:\ProgramData\Adblocker
2015-01-08 13:24 - 2014-08-28 18:50 - 00000000 ____D () C:\Program Files (x86)\Adblocker
CHR Extension: (priCp) - C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdm [2014-08-28]
CHR Extension: (GoSave) - C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\gcejpipihlkdcocgmadbmhodkpkfbdol [2014-11-09]
CHR Extension: (pricp) - C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod [2014-08-28]
HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Search Page = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKU\S-1-5-21-498154490-4218162474-2579822568-1000\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.webpageing.com/?type=hp&ts=1409251896&from=wpc&uid=TOSHIBAXMK3275GSX_Y1S6F042SXXY1S6F042S [Pays US - 69.28.57.22]
SearchScopes: HKLM -> DefaultScope {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKLM -> {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKLM-x32 -> DefaultScope {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} URL = http://websearch.fixsearch.info/?l=1&q={searchTerms}&pid=3765&r=2014/08/28&hid=6859600285867408378&lg=EN&cc=MA&unqvl=61 [Pays DE - 46.165.228.246]
SearchScopes: HKLM-x32 -> {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKLM-x32 -> {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} URL = http://websearch.fixsearch.info/?l=1&q={searchTerms}&pid=3765&r=2014/08/28&hid=6859600285867408378&lg=EN&cc=MA&unqvl=61 [Pays DE - 46.165.228.246]
SearchScopes: HKU\S-1-5-21-498154490-4218162474-2579822568-1000 -> {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKU\S-1-5-21-498154490-4218162474-2579822568-1000 -> {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} URL = http://websearch.fixsearch.info/?l=1&q={searchTerms}&pid=3765&r=2014/08/28&hid=6859600285867408378&lg=EN&cc=MA&unqvl=61 [Pays DE - 46.165.228.246]
BHO: GoSave -> {06ede168-ff52-4e62-9fd6-8fc89d637337} -> C:\Program Files (x86)\GoSave\IF0p0EM6OK0WqM.x64.dll ()
S2 d0e87c27; c:\Program Files (x86)\SW-Booster\AssistantSvc.dll [174928 2014-08-28] () [File not signed]
Une fois, le texte coller dans le bloc-note.
Menu Fichier puis Enregistrer sous.
A gauche, place toi sur le bureau.
Dans le champs en bas, nom du fichier mets : fixlist.txt
Clic sur Enregistrer - cela va créer un fichier fixlist.txt sur le bureau.
Relance FRST et clic sur le bouton Fix
Selon comment un redémarrage est nécessaire (pas obligatoire).
Un fichier texte apparaît, copie/colle le contenu ici dans un nouveau message.
Redémarre l'ordinateur
Suis le tutorial AdwCleaner https://www.malekal.com/adwcleaner-supprimer-virus-adwares-pup/?t=33839&start= ( d'Xplode )
Télécharge le sur ton bureau ou dossier de téléchargement.
Lance AdwCleaner, clique sur [Scanner].
L'analyse peux durer plusieurs minutes, patiente.
Une fois le scan terminé, ne décoche rien, clique sur [Nettoyer]
Une fois le nettoyage terminé, un rapport s'ouvrira. Copie/colle le contenu du rapport dans ta prochaine réponse par un copier/coller.
Si cela ne fonctionne pas, utilise le site http://pjjoint.malekal.com pour héberger le rapport, donne le lien du rapport dans un nouveau message.
Note : Le rapport est également sauvegardé sous C:\AdwCleaner[S1].txt
woodyprod
Messages postés
15
Date d'inscription
jeudi 8 janvier 2015
Statut
Membre
Dernière intervention
8 janvier 2015
8 janv. 2015 à 17:45
8 janv. 2015 à 17:45
sa ma cree un fichier fixlog le voila le contenue :
Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 07-01-2015
Ran by ana at 2015-01-08 16:43:15 Run:1
Running from C:\Users\ana\Desktop
Loaded Profile: ana (Available profiles: ana)
Boot Mode: Normal
==============================================
Content of fixlist:
*****************
2015-01-08 15:00 - 2014-08-28 19:12 - 00000000 ____D () C:\ProgramData\pricp
2015-01-08 15:00 - 2014-08-28 18:49 - 00000000 ____D () C:\ProgramData\pRRiceecHHOpp
2015-01-08 14:59 - 2014-11-09 17:13 - 00000000 ____D () C:\ProgramData\GoSave
2015-01-08 14:59 - 2014-08-28 18:52 - 00000000 ____D () C:\ProgramData\IePluginServices
2015-01-08 14:58 - 2014-08-28 18:50 - 00000000 ____D () C:\ProgramData\Adblocker
2015-01-08 13:24 - 2014-08-28 18:50 - 00000000 ____D () C:\Program Files (x86)\Adblocker
CHR Extension: (priCp) - C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdm [2014-08-28]
CHR Extension: (GoSave) - C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\gcejpipihlkdcocgmadbmhodkpkfbdol [2014-11-09]
CHR Extension: (pricp) - C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod [2014-08-28]
HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Search Page = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKU\S-1-5-21-498154490-4218162474-2579822568-1000\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.webpageing.com/?type=hp&ts=1409251896&from=wpc&uid=TOSHIBAXMK3275GSX_Y1S6F042SXXY1S6F042S [Pays US - 69.28.57.22]
SearchScopes: HKLM -> DefaultScope {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKLM -> {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKLM-x32 -> DefaultScope {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} URL = http://websearch.fixsearch.info/?l=1&q={searchTerms}&pid=3765&r=2014/08/28&hid=6859600285867408378&lg=EN&cc=MA&unqvl=61 [Pays DE - 46.165.228.246]
SearchScopes: HKLM-x32 -> {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKLM-x32 -> {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} URL = http://websearch.fixsearch.info/?l=1&q={searchTerms}&pid=3765&r=2014/08/28&hid=6859600285867408378&lg=EN&cc=MA&unqvl=61 [Pays DE - 46.165.228.246]
SearchScopes: HKU\S-1-5-21-498154490-4218162474-2579822568-1000 -> {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKU\S-1-5-21-498154490-4218162474-2579822568-1000 -> {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} URL = http://websearch.fixsearch.info/?l=1&q={searchTerms}&pid=3765&r=2014/08/28&hid=6859600285867408378&lg=EN&cc=MA&unqvl=61 [Pays DE - 46.165.228.246]
BHO: GoSave -> {06ede168-ff52-4e62-9fd6-8fc89d637337} -> C:\Program Files (x86)\GoSave\IF0p0EM6OK0WqM.x64.dll ()
S2 d0e87c27; c:\Program Files (x86)\SW-Booster\AssistantSvc.dll [174928 2014-08-28] () [File not signed]
*****************
"C:\ProgramData\pricp" => File/Directory not found.
C:\ProgramData\pRRiceecHHOpp => Moved successfully.
C:\ProgramData\GoSave => Moved successfully.
C:\ProgramData\IePluginServices => Moved successfully.
C:\ProgramData\Adblocker => Moved successfully.
C:\Program Files (x86)\Adblocker => Moved successfully.
C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdm directory not found.
C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\gcejpipihlkdcocgmadbmhodkpkfbdol => Moved successfully.
C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod => Moved successfully.
HKLM\Software\\Microsoft\Internet Explorer\Main\\Search Page => Value was restored successfully.
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main\\Search Page => Value was restored successfully.
HKLM\Software\\Microsoft\Internet Explorer\Main\\Default_Search_URL => Value was restored successfully.
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main\\Default_Search_URL => Value was restored successfully.
HKU\S-1-5-21-498154490-4218162474-2579822568-1000\Software\Microsoft\Internet Explorer\Main\\Default_Page_URL => Value was restored successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope => Value was restored successfully.
"HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}" => Key deleted successfully.
HKCR\CLSID\{33BB0A4E-99AF-4226-BDF6-49120163DE86} => Key not found.
HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\\DefaultScope => Value was restored successfully.
"HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}" => Key deleted successfully.
HKCR\Wow6432Node\CLSID\{33BB0A4E-99AF-4226-BDF6-49120163DE86} => Key not found.
"HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{BB74DE59-BC4C-4172-9AC4-73315F71CFFE}" => Key deleted successfully.
HKCR\Wow6432Node\CLSID\{BB74DE59-BC4C-4172-9AC4-73315F71CFFE} => Key not found.
"HKU\S-1-5-21-498154490-4218162474-2579822568-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}" => Key deleted successfully.
HKCR\CLSID\{33BB0A4E-99AF-4226-BDF6-49120163DE86} => Key not found.
"HKU\S-1-5-21-498154490-4218162474-2579822568-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{BB74DE59-BC4C-4172-9AC4-73315F71CFFE}" => Key deleted successfully.
HKCR\CLSID\{BB74DE59-BC4C-4172-9AC4-73315F71CFFE} => Key not found.
"HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{06ede168-ff52-4e62-9fd6-8fc89d637337}" => Key deleted successfully.
"HKCR\CLSID\{06ede168-ff52-4e62-9fd6-8fc89d637337}" => Key deleted successfully.
d0e87c27 => Service deleted successfully.
==== End of Fixlog 16:43:17 ====
Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 07-01-2015
Ran by ana at 2015-01-08 16:43:15 Run:1
Running from C:\Users\ana\Desktop
Loaded Profile: ana (Available profiles: ana)
Boot Mode: Normal
==============================================
Content of fixlist:
*****************
2015-01-08 15:00 - 2014-08-28 19:12 - 00000000 ____D () C:\ProgramData\pricp
2015-01-08 15:00 - 2014-08-28 18:49 - 00000000 ____D () C:\ProgramData\pRRiceecHHOpp
2015-01-08 14:59 - 2014-11-09 17:13 - 00000000 ____D () C:\ProgramData\GoSave
2015-01-08 14:59 - 2014-08-28 18:52 - 00000000 ____D () C:\ProgramData\IePluginServices
2015-01-08 14:58 - 2014-08-28 18:50 - 00000000 ____D () C:\ProgramData\Adblocker
2015-01-08 13:24 - 2014-08-28 18:50 - 00000000 ____D () C:\Program Files (x86)\Adblocker
CHR Extension: (priCp) - C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdm [2014-08-28]
CHR Extension: (GoSave) - C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\gcejpipihlkdcocgmadbmhodkpkfbdol [2014-11-09]
CHR Extension: (pricp) - C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod [2014-08-28]
HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Search Page = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKU\S-1-5-21-498154490-4218162474-2579822568-1000\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.webpageing.com/?type=hp&ts=1409251896&from=wpc&uid=TOSHIBAXMK3275GSX_Y1S6F042SXXY1S6F042S [Pays US - 69.28.57.22]
SearchScopes: HKLM -> DefaultScope {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKLM -> {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKLM-x32 -> DefaultScope {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} URL = http://websearch.fixsearch.info/?l=1&q={searchTerms}&pid=3765&r=2014/08/28&hid=6859600285867408378&lg=EN&cc=MA&unqvl=61 [Pays DE - 46.165.228.246]
SearchScopes: HKLM-x32 -> {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKLM-x32 -> {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} URL = http://websearch.fixsearch.info/?l=1&q={searchTerms}&pid=3765&r=2014/08/28&hid=6859600285867408378&lg=EN&cc=MA&unqvl=61 [Pays DE - 46.165.228.246]
SearchScopes: HKU\S-1-5-21-498154490-4218162474-2579822568-1000 -> {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKU\S-1-5-21-498154490-4218162474-2579822568-1000 -> {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} URL = http://websearch.fixsearch.info/?l=1&q={searchTerms}&pid=3765&r=2014/08/28&hid=6859600285867408378&lg=EN&cc=MA&unqvl=61 [Pays DE - 46.165.228.246]
BHO: GoSave -> {06ede168-ff52-4e62-9fd6-8fc89d637337} -> C:\Program Files (x86)\GoSave\IF0p0EM6OK0WqM.x64.dll ()
S2 d0e87c27; c:\Program Files (x86)\SW-Booster\AssistantSvc.dll [174928 2014-08-28] () [File not signed]
*****************
"C:\ProgramData\pricp" => File/Directory not found.
C:\ProgramData\pRRiceecHHOpp => Moved successfully.
C:\ProgramData\GoSave => Moved successfully.
C:\ProgramData\IePluginServices => Moved successfully.
C:\ProgramData\Adblocker => Moved successfully.
C:\Program Files (x86)\Adblocker => Moved successfully.
C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdm directory not found.
C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\gcejpipihlkdcocgmadbmhodkpkfbdol => Moved successfully.
C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod => Moved successfully.
HKLM\Software\\Microsoft\Internet Explorer\Main\\Search Page => Value was restored successfully.
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main\\Search Page => Value was restored successfully.
HKLM\Software\\Microsoft\Internet Explorer\Main\\Default_Search_URL => Value was restored successfully.
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main\\Default_Search_URL => Value was restored successfully.
HKU\S-1-5-21-498154490-4218162474-2579822568-1000\Software\Microsoft\Internet Explorer\Main\\Default_Page_URL => Value was restored successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope => Value was restored successfully.
"HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}" => Key deleted successfully.
HKCR\CLSID\{33BB0A4E-99AF-4226-BDF6-49120163DE86} => Key not found.
HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\\DefaultScope => Value was restored successfully.
"HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}" => Key deleted successfully.
HKCR\Wow6432Node\CLSID\{33BB0A4E-99AF-4226-BDF6-49120163DE86} => Key not found.
"HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{BB74DE59-BC4C-4172-9AC4-73315F71CFFE}" => Key deleted successfully.
HKCR\Wow6432Node\CLSID\{BB74DE59-BC4C-4172-9AC4-73315F71CFFE} => Key not found.
"HKU\S-1-5-21-498154490-4218162474-2579822568-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}" => Key deleted successfully.
HKCR\CLSID\{33BB0A4E-99AF-4226-BDF6-49120163DE86} => Key not found.
"HKU\S-1-5-21-498154490-4218162474-2579822568-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{BB74DE59-BC4C-4172-9AC4-73315F71CFFE}" => Key deleted successfully.
HKCR\CLSID\{BB74DE59-BC4C-4172-9AC4-73315F71CFFE} => Key not found.
"HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{06ede168-ff52-4e62-9fd6-8fc89d637337}" => Key deleted successfully.
"HKCR\CLSID\{06ede168-ff52-4e62-9fd6-8fc89d637337}" => Key deleted successfully.
d0e87c27 => Service deleted successfully.
==== End of Fixlog 16:43:17 ====
woodyprod
Messages postés
15
Date d'inscription
jeudi 8 janvier 2015
Statut
Membre
Dernière intervention
8 janvier 2015
8 janv. 2015 à 18:13
8 janv. 2015 à 18:13
Malekal_morte-
Messages postés
180304
Date d'inscription
mercredi 17 mai 2006
Statut
Modérateur, Contributeur sécurité
Dernière intervention
15 décembre 2020
24 644
8 janv. 2015 à 18:15
8 janv. 2015 à 18:15
Voila ça doit être bon, côté adware.
Note que le bot que tu as téléchargé peut avoir lancé un malware qui volent les infos et les transmets sans rien installer sur l'ordinateur.
Mais en tout cas, il n'y a pas l'air d'y avoir de keylogger actif.
Si tu as un doute, tu peux faire un scan en ligne NOD32.
Fais un scan en ligne NOD32 : https://www.malekal.com/scan-antivirus-ligne-nod32/#NOD32
Enregistre le rapport et donne le ici.
Note que le bot que tu as téléchargé peut avoir lancé un malware qui volent les infos et les transmets sans rien installer sur l'ordinateur.
Mais en tout cas, il n'y a pas l'air d'y avoir de keylogger actif.
Si tu as un doute, tu peux faire un scan en ligne NOD32.
Fais un scan en ligne NOD32 : https://www.malekal.com/scan-antivirus-ligne-nod32/#NOD32
Enregistre le rapport et donne le ici.
woodyprod
Messages postés
15
Date d'inscription
jeudi 8 janvier 2015
Statut
Membre
Dernière intervention
8 janvier 2015
8 janv. 2015 à 18:23
8 janv. 2015 à 18:23
merci je vais faire le scan que t'as demander !
woodyprod
Messages postés
15
Date d'inscription
jeudi 8 janvier 2015
Statut
Membre
Dernière intervention
8 janvier 2015
8 janv. 2015 à 18:49
8 janv. 2015 à 18:49
a 41 % deja 46 dossier infectées normal ?
Malekal_morte-
Messages postés
180304
Date d'inscription
mercredi 17 mai 2006
Statut
Modérateur, Contributeur sécurité
Dernière intervention
15 décembre 2020
24 644
8 janv. 2015 à 18:52
8 janv. 2015 à 18:52
Ben il doit détecter les m*rdouilles dans la quarantaine d'AdwCleaner et FRST.
woodyprod
Messages postés
15
Date d'inscription
jeudi 8 janvier 2015
Statut
Membre
Dernière intervention
8 janvier 2015
8 janv. 2015 à 18:58
8 janv. 2015 à 18:58
ah d'accord mais je crois que ya aussi des malwar psque quand j'ai fais le scan avast j'ai vue des truc ... affecpter par malware
woodyprod
Messages postés
15
Date d'inscription
jeudi 8 janvier 2015
Statut
Membre
Dernière intervention
8 janvier 2015
8 janv. 2015 à 19:56
8 janv. 2015 à 19:56
le voila le scan :
C:\AdwCleaner\Quarantine\C\Program Files (x86)\GoSave\IF0p0EM6OK0WqM.x64.dll.vir a variant of Win64/Adware.MultiPlug.E application cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Program Files (x86)\sw-booster\AssistantSvc.dll.vir a variant of Win32/SProtector.D potentially unwanted application deleted - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Chromatic Browser\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Chromatic Browser\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Chromatic Browser\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Google\Chrome\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Google\Chrome\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\torch\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\torch\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\torch\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\Chromatic Browser\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\Chromatic Browser\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\Chromatic Browser\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\torch\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\torch\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\torch\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Chromatic Browser\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Chromatic Browser\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Chromatic Browser\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Google\Chrome\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Google\Chrome\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\torch\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\torch\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\torch\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Windows\System32\roboot64.exe.vir a variant of Win64/Systweak.A potentially unwanted application deleted - quarantined
C:\FRST\Quarantine\C\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Administrateur\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Administrateur\AppData\Local\Google\Chrome\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Administrateur\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Administrateur\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Administrateur\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Temp\PFHJXV.tmp Win32/TrojanDownloader.Agent.ACF trojan cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Temp\f0F55c2fB0315\temp\BIT4ACE.tmp a variant of Win32/AdWare.SpeedingUpMyPC.N application cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Temp\f0F55c2fB0315\temp\putfu.exe a variant of Win32/Adware.MultiPlug.DX application cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Temp\s2as\temp\hpds_setup.exe Win32/SProtector.M potentially unwanted application deleted - quarantined
C:\Users\ana\AppData\Local\Temp\s2c0\temp\wpc_webssearches.exe a variant of Win32/ELEX.AX potentially unwanted application deleted - quarantined
C:\Users\Invité\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Invité\AppData\Local\Google\Chrome\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Invité\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Invité\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Invité\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Program Files (x86)\GoSave\IF0p0EM6OK0WqM.x64.dll.vir a variant of Win64/Adware.MultiPlug.E application cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Program Files (x86)\sw-booster\AssistantSvc.dll.vir a variant of Win32/SProtector.D potentially unwanted application deleted - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Chromatic Browser\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Chromatic Browser\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Chromatic Browser\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Google\Chrome\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Google\Chrome\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\torch\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\torch\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\torch\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\Chromatic Browser\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\Chromatic Browser\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\Chromatic Browser\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\torch\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\torch\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\torch\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Chromatic Browser\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Chromatic Browser\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Chromatic Browser\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Google\Chrome\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Google\Chrome\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\torch\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\torch\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\torch\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Windows\System32\roboot64.exe.vir a variant of Win64/Systweak.A potentially unwanted application deleted - quarantined
C:\FRST\Quarantine\C\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Administrateur\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Administrateur\AppData\Local\Google\Chrome\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Administrateur\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Administrateur\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Administrateur\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Temp\PFHJXV.tmp Win32/TrojanDownloader.Agent.ACF trojan cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Temp\f0F55c2fB0315\temp\BIT4ACE.tmp a variant of Win32/AdWare.SpeedingUpMyPC.N application cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Temp\f0F55c2fB0315\temp\putfu.exe a variant of Win32/Adware.MultiPlug.DX application cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Temp\s2as\temp\hpds_setup.exe Win32/SProtector.M potentially unwanted application deleted - quarantined
C:\Users\ana\AppData\Local\Temp\s2c0\temp\wpc_webssearches.exe a variant of Win32/ELEX.AX potentially unwanted application deleted - quarantined
C:\Users\Invité\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Invité\AppData\Local\Google\Chrome\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Invité\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Invité\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Invité\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
Malekal_morte-
Messages postés
180304
Date d'inscription
mercredi 17 mai 2006
Statut
Modérateur, Contributeur sécurité
Dernière intervention
15 décembre 2020
24 644
8 janv. 2015 à 20:24
8 janv. 2015 à 20:24
oui :)
Voila, c'est terminé, tu peux supprimer les programmes utilisés.
Quelques conseils :
Installe Malwarebyte's Anti-Malware : https://www.malekal.com/tutoriel-malwarebyte-anti-malware/
Fais des scans réguliers avec, il est efficace.
(sauf si tu es sur un netbook)
Pour prévenir les sites malicieux, tu peux installer Blockulicious : https://forum.malekal.com/viewtopic.php?t=46656&start=
Pour ne plus te faire avoir.
A lire - Programmes parasites / PUPs : https://www.malekal.com/adwares-pup-protection/
Voila, c'est terminé, tu peux supprimer les programmes utilisés.
Quelques conseils :
Installe Malwarebyte's Anti-Malware : https://www.malekal.com/tutoriel-malwarebyte-anti-malware/
Fais des scans réguliers avec, il est efficace.
(sauf si tu es sur un netbook)
Pour prévenir les sites malicieux, tu peux installer Blockulicious : https://forum.malekal.com/viewtopic.php?t=46656&start=
Pour ne plus te faire avoir.
A lire - Programmes parasites / PUPs : https://www.malekal.com/adwares-pup-protection/
woodyprod
Messages postés
15
Date d'inscription
jeudi 8 janvier 2015
Statut
Membre
Dernière intervention
8 janvier 2015
8 janv. 2015 à 20:29
8 janv. 2015 à 20:29
Merci beucoup je suis sur un pc normal un accent s11 esque c'est nécessaire les truc pour un tel pc ?
Malekal_morte-
Messages postés
180304
Date d'inscription
mercredi 17 mai 2006
Statut
Modérateur, Contributeur sécurité
Dernière intervention
15 décembre 2020
24 644
8 janv. 2015 à 20:36
8 janv. 2015 à 20:36
au moins Blockulicious :)