Logiciel de hack ... et hack :/
Résolu
woodyprod
-
Malekal_morte- Messages postés 180304 Date d'inscription Statut Modérateur, Contributeur sécurité Dernière intervention -
Malekal_morte- Messages postés 180304 Date d'inscription Statut Modérateur, Contributeur sécurité Dernière intervention -
Bonjour,
SALUT tt le monde ...
s'il vous plait aider moi ...
je sais pas mais en se connectant aujourd'hui sur un jeu sur mon pc j'ai vue que je me suis fais hacké sachant que ya quelque jours j'ai installer un bot dans je connais pas la source (je l'ai desinstallé juste apres ) alors je crois que c'est la source de mon hack...
mnt je cherche une solution pour trouvé et suprimé ce keylogger ou je sais pas quelle système de hack..
merci d'avance pour votre aide ...
Cordialement
SALUT tt le monde ...
s'il vous plait aider moi ...
je sais pas mais en se connectant aujourd'hui sur un jeu sur mon pc j'ai vue que je me suis fais hacké sachant que ya quelque jours j'ai installer un bot dans je connais pas la source (je l'ai desinstallé juste apres ) alors je crois que c'est la source de mon hack...
mnt je cherche une solution pour trouvé et suprimé ce keylogger ou je sais pas quelle système de hack..
merci d'avance pour votre aide ...
Cordialement
A voir également:
- Logiciel de hack ... et hack :/
- Logiciel de sauvegarde gratuit - Guide
- Money logiciel - Télécharger - Comptabilité & Facturation
- Logiciel - Guide
- Ce logiciel gratuit répare automatiquement votre PC quand Windows a des problèmes - Guide
- Logiciel montage vidéo gratuit windows 10 - Guide
9 réponses
Je suis en train de faire un scan avec avast antivirus si jamais vous avez d'autres solution s'il vous plait dites les moi ...
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
ha ok, ha oui selon comment, ça a pu installer un RAT.
Est-ce que tu vas sur le forum jeuxvideo.com ?
Suis ce tutoriel FRST: https://www.malekal.com/tutoriel-farbar-recovery-scan-tool-frst/
Cela va générer trois rapports FRST :
* FRST.txt
* Shortcut.txt
* Additionnal.txt
Envoie comme expliqué, ces trois rapports sur le site pjjoint et donne les trois liens pjjoint de ces rapports afin qu'ils puissent être consultés.
Est-ce que tu vas sur le forum jeuxvideo.com ?
Suis ce tutoriel FRST: https://www.malekal.com/tutoriel-farbar-recovery-scan-tool-frst/
Cela va générer trois rapports FRST :
* FRST.txt
* Shortcut.txt
* Additionnal.txt
Envoie comme expliqué, ces trois rapports sur le site pjjoint et donne les trois liens pjjoint de ces rapports afin qu'ils puissent être consultés.
desolé de te deranger tout cela est bien fait apres je dois faire quoi ( je sais pas trop les truc dans le pc ) :/
voila les lien des scan :
https://pjjoint.malekal.com/files.php?id=20150108_g15t8l13n10t12
https://pjjoint.malekal.com/files.php?id=FRST_20150108_z9r7e14l9k11
https://pjjoint.malekal.com/files.php?id=20150108_v14f8d9p9m15
voila les lien des scan :
https://pjjoint.malekal.com/files.php?id=20150108_g15t8l13n10t12
https://pjjoint.malekal.com/files.php?id=FRST_20150108_z9r7e14l9k11
https://pjjoint.malekal.com/files.php?id=20150108_v14f8d9p9m15
tes infections se résument à des adwares, pas de RAT, keylogger ou autres apparemment.
Voici la correction à effectuer avec FRST.
Tu peux t'inspirer de cette note explicative avec des captures d'écran pour t'aider: https://www.malekal.com/tutoriel-farbar-recovery-scan-tool-frst/#fix
Ouvre le bloc-notes : Touche Windows + R, dans le champs executer, tape notepad et OK.
Copie/colle dedans ce qui suit :
2015-01-08 15:00 - 2014-08-28 19:12 - 00000000 ____D () C:\ProgramData\pricp
2015-01-08 15:00 - 2014-08-28 18:49 - 00000000 ____D () C:\ProgramData\pRRiceecHHOpp
2015-01-08 14:59 - 2014-11-09 17:13 - 00000000 ____D () C:\ProgramData\GoSave
2015-01-08 14:59 - 2014-08-28 18:52 - 00000000 ____D () C:\ProgramData\IePluginServices
2015-01-08 14:58 - 2014-08-28 18:50 - 00000000 ____D () C:\ProgramData\Adblocker
2015-01-08 13:24 - 2014-08-28 18:50 - 00000000 ____D () C:\Program Files (x86)\Adblocker
CHR Extension: (priCp) - C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdm [2014-08-28]
CHR Extension: (GoSave) - C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\gcejpipihlkdcocgmadbmhodkpkfbdol [2014-11-09]
CHR Extension: (pricp) - C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod [2014-08-28]
HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Search Page = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKU\S-1-5-21-498154490-4218162474-2579822568-1000\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.webpageing.com/?type=hp&ts=1409251896&from=wpc&uid=TOSHIBAXMK3275GSX_Y1S6F042SXXY1S6F042S [Pays US - 69.28.57.22]
SearchScopes: HKLM -> DefaultScope {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKLM -> {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKLM-x32 -> DefaultScope {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} URL = http://websearch.fixsearch.info/?l=1&q={searchTerms}&pid=3765&r=2014/08/28&hid=6859600285867408378&lg=EN&cc=MA&unqvl=61 [Pays DE - 46.165.228.246]
SearchScopes: HKLM-x32 -> {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKLM-x32 -> {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} URL = http://websearch.fixsearch.info/?l=1&q={searchTerms}&pid=3765&r=2014/08/28&hid=6859600285867408378&lg=EN&cc=MA&unqvl=61 [Pays DE - 46.165.228.246]
SearchScopes: HKU\S-1-5-21-498154490-4218162474-2579822568-1000 -> {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKU\S-1-5-21-498154490-4218162474-2579822568-1000 -> {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} URL = http://websearch.fixsearch.info/?l=1&q={searchTerms}&pid=3765&r=2014/08/28&hid=6859600285867408378&lg=EN&cc=MA&unqvl=61 [Pays DE - 46.165.228.246]
BHO: GoSave -> {06ede168-ff52-4e62-9fd6-8fc89d637337} -> C:\Program Files (x86)\GoSave\IF0p0EM6OK0WqM.x64.dll ()
S2 d0e87c27; c:\Program Files (x86)\SW-Booster\AssistantSvc.dll [174928 2014-08-28] () [File not signed]
Une fois, le texte coller dans le bloc-note.
Menu Fichier puis Enregistrer sous.
A gauche, place toi sur le bureau.
Dans le champs en bas, nom du fichier mets : fixlist.txt
Clic sur Enregistrer - cela va créer un fichier fixlist.txt sur le bureau.
Relance FRST et clic sur le bouton Fix
Selon comment un redémarrage est nécessaire (pas obligatoire).
Un fichier texte apparaît, copie/colle le contenu ici dans un nouveau message.
Redémarre l'ordinateur
Suis le tutorial AdwCleaner https://www.malekal.com/adwcleaner-supprimer-virus-adwares-pup/?t=33839&start= ( d'Xplode )
Télécharge le sur ton bureau ou dossier de téléchargement.
Lance AdwCleaner, clique sur [Scanner].
L'analyse peux durer plusieurs minutes, patiente.
Une fois le scan terminé, ne décoche rien, clique sur [Nettoyer]
Une fois le nettoyage terminé, un rapport s'ouvrira. Copie/colle le contenu du rapport dans ta prochaine réponse par un copier/coller.
Si cela ne fonctionne pas, utilise le site http://pjjoint.malekal.com pour héberger le rapport, donne le lien du rapport dans un nouveau message.
Note : Le rapport est également sauvegardé sous C:\AdwCleaner[S1].txt
Voici la correction à effectuer avec FRST.
Tu peux t'inspirer de cette note explicative avec des captures d'écran pour t'aider: https://www.malekal.com/tutoriel-farbar-recovery-scan-tool-frst/#fix
Ouvre le bloc-notes : Touche Windows + R, dans le champs executer, tape notepad et OK.
Copie/colle dedans ce qui suit :
2015-01-08 15:00 - 2014-08-28 19:12 - 00000000 ____D () C:\ProgramData\pricp
2015-01-08 15:00 - 2014-08-28 18:49 - 00000000 ____D () C:\ProgramData\pRRiceecHHOpp
2015-01-08 14:59 - 2014-11-09 17:13 - 00000000 ____D () C:\ProgramData\GoSave
2015-01-08 14:59 - 2014-08-28 18:52 - 00000000 ____D () C:\ProgramData\IePluginServices
2015-01-08 14:58 - 2014-08-28 18:50 - 00000000 ____D () C:\ProgramData\Adblocker
2015-01-08 13:24 - 2014-08-28 18:50 - 00000000 ____D () C:\Program Files (x86)\Adblocker
CHR Extension: (priCp) - C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdm [2014-08-28]
CHR Extension: (GoSave) - C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\gcejpipihlkdcocgmadbmhodkpkfbdol [2014-11-09]
CHR Extension: (pricp) - C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod [2014-08-28]
HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Search Page = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKU\S-1-5-21-498154490-4218162474-2579822568-1000\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.webpageing.com/?type=hp&ts=1409251896&from=wpc&uid=TOSHIBAXMK3275GSX_Y1S6F042SXXY1S6F042S [Pays US - 69.28.57.22]
SearchScopes: HKLM -> DefaultScope {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKLM -> {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKLM-x32 -> DefaultScope {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} URL = http://websearch.fixsearch.info/?l=1&q={searchTerms}&pid=3765&r=2014/08/28&hid=6859600285867408378&lg=EN&cc=MA&unqvl=61 [Pays DE - 46.165.228.246]
SearchScopes: HKLM-x32 -> {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKLM-x32 -> {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} URL = http://websearch.fixsearch.info/?l=1&q={searchTerms}&pid=3765&r=2014/08/28&hid=6859600285867408378&lg=EN&cc=MA&unqvl=61 [Pays DE - 46.165.228.246]
SearchScopes: HKU\S-1-5-21-498154490-4218162474-2579822568-1000 -> {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKU\S-1-5-21-498154490-4218162474-2579822568-1000 -> {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} URL = http://websearch.fixsearch.info/?l=1&q={searchTerms}&pid=3765&r=2014/08/28&hid=6859600285867408378&lg=EN&cc=MA&unqvl=61 [Pays DE - 46.165.228.246]
BHO: GoSave -> {06ede168-ff52-4e62-9fd6-8fc89d637337} -> C:\Program Files (x86)\GoSave\IF0p0EM6OK0WqM.x64.dll ()
S2 d0e87c27; c:\Program Files (x86)\SW-Booster\AssistantSvc.dll [174928 2014-08-28] () [File not signed]
Une fois, le texte coller dans le bloc-note.
Menu Fichier puis Enregistrer sous.
A gauche, place toi sur le bureau.
Dans le champs en bas, nom du fichier mets : fixlist.txt
Clic sur Enregistrer - cela va créer un fichier fixlist.txt sur le bureau.
Relance FRST et clic sur le bouton Fix
Selon comment un redémarrage est nécessaire (pas obligatoire).
Un fichier texte apparaît, copie/colle le contenu ici dans un nouveau message.
Redémarre l'ordinateur
Suis le tutorial AdwCleaner https://www.malekal.com/adwcleaner-supprimer-virus-adwares-pup/?t=33839&start= ( d'Xplode )
Télécharge le sur ton bureau ou dossier de téléchargement.
Lance AdwCleaner, clique sur [Scanner].
L'analyse peux durer plusieurs minutes, patiente.
Une fois le scan terminé, ne décoche rien, clique sur [Nettoyer]
Une fois le nettoyage terminé, un rapport s'ouvrira. Copie/colle le contenu du rapport dans ta prochaine réponse par un copier/coller.
Si cela ne fonctionne pas, utilise le site http://pjjoint.malekal.com pour héberger le rapport, donne le lien du rapport dans un nouveau message.
Note : Le rapport est également sauvegardé sous C:\AdwCleaner[S1].txt
sa ma cree un fichier fixlog le voila le contenue :
Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 07-01-2015
Ran by ana at 2015-01-08 16:43:15 Run:1
Running from C:\Users\ana\Desktop
Loaded Profile: ana (Available profiles: ana)
Boot Mode: Normal
==============================================
Content of fixlist:
*****************
2015-01-08 15:00 - 2014-08-28 19:12 - 00000000 ____D () C:\ProgramData\pricp
2015-01-08 15:00 - 2014-08-28 18:49 - 00000000 ____D () C:\ProgramData\pRRiceecHHOpp
2015-01-08 14:59 - 2014-11-09 17:13 - 00000000 ____D () C:\ProgramData\GoSave
2015-01-08 14:59 - 2014-08-28 18:52 - 00000000 ____D () C:\ProgramData\IePluginServices
2015-01-08 14:58 - 2014-08-28 18:50 - 00000000 ____D () C:\ProgramData\Adblocker
2015-01-08 13:24 - 2014-08-28 18:50 - 00000000 ____D () C:\Program Files (x86)\Adblocker
CHR Extension: (priCp) - C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdm [2014-08-28]
CHR Extension: (GoSave) - C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\gcejpipihlkdcocgmadbmhodkpkfbdol [2014-11-09]
CHR Extension: (pricp) - C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod [2014-08-28]
HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Search Page = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKU\S-1-5-21-498154490-4218162474-2579822568-1000\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.webpageing.com/?type=hp&ts=1409251896&from=wpc&uid=TOSHIBAXMK3275GSX_Y1S6F042SXXY1S6F042S [Pays US - 69.28.57.22]
SearchScopes: HKLM -> DefaultScope {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKLM -> {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKLM-x32 -> DefaultScope {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} URL = http://websearch.fixsearch.info/?l=1&q={searchTerms}&pid=3765&r=2014/08/28&hid=6859600285867408378&lg=EN&cc=MA&unqvl=61 [Pays DE - 46.165.228.246]
SearchScopes: HKLM-x32 -> {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKLM-x32 -> {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} URL = http://websearch.fixsearch.info/?l=1&q={searchTerms}&pid=3765&r=2014/08/28&hid=6859600285867408378&lg=EN&cc=MA&unqvl=61 [Pays DE - 46.165.228.246]
SearchScopes: HKU\S-1-5-21-498154490-4218162474-2579822568-1000 -> {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKU\S-1-5-21-498154490-4218162474-2579822568-1000 -> {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} URL = http://websearch.fixsearch.info/?l=1&q={searchTerms}&pid=3765&r=2014/08/28&hid=6859600285867408378&lg=EN&cc=MA&unqvl=61 [Pays DE - 46.165.228.246]
BHO: GoSave -> {06ede168-ff52-4e62-9fd6-8fc89d637337} -> C:\Program Files (x86)\GoSave\IF0p0EM6OK0WqM.x64.dll ()
S2 d0e87c27; c:\Program Files (x86)\SW-Booster\AssistantSvc.dll [174928 2014-08-28] () [File not signed]
*****************
"C:\ProgramData\pricp" => File/Directory not found.
C:\ProgramData\pRRiceecHHOpp => Moved successfully.
C:\ProgramData\GoSave => Moved successfully.
C:\ProgramData\IePluginServices => Moved successfully.
C:\ProgramData\Adblocker => Moved successfully.
C:\Program Files (x86)\Adblocker => Moved successfully.
C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdm directory not found.
C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\gcejpipihlkdcocgmadbmhodkpkfbdol => Moved successfully.
C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod => Moved successfully.
HKLM\Software\\Microsoft\Internet Explorer\Main\\Search Page => Value was restored successfully.
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main\\Search Page => Value was restored successfully.
HKLM\Software\\Microsoft\Internet Explorer\Main\\Default_Search_URL => Value was restored successfully.
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main\\Default_Search_URL => Value was restored successfully.
HKU\S-1-5-21-498154490-4218162474-2579822568-1000\Software\Microsoft\Internet Explorer\Main\\Default_Page_URL => Value was restored successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope => Value was restored successfully.
"HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}" => Key deleted successfully.
HKCR\CLSID\{33BB0A4E-99AF-4226-BDF6-49120163DE86} => Key not found.
HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\\DefaultScope => Value was restored successfully.
"HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}" => Key deleted successfully.
HKCR\Wow6432Node\CLSID\{33BB0A4E-99AF-4226-BDF6-49120163DE86} => Key not found.
"HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{BB74DE59-BC4C-4172-9AC4-73315F71CFFE}" => Key deleted successfully.
HKCR\Wow6432Node\CLSID\{BB74DE59-BC4C-4172-9AC4-73315F71CFFE} => Key not found.
"HKU\S-1-5-21-498154490-4218162474-2579822568-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}" => Key deleted successfully.
HKCR\CLSID\{33BB0A4E-99AF-4226-BDF6-49120163DE86} => Key not found.
"HKU\S-1-5-21-498154490-4218162474-2579822568-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{BB74DE59-BC4C-4172-9AC4-73315F71CFFE}" => Key deleted successfully.
HKCR\CLSID\{BB74DE59-BC4C-4172-9AC4-73315F71CFFE} => Key not found.
"HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{06ede168-ff52-4e62-9fd6-8fc89d637337}" => Key deleted successfully.
"HKCR\CLSID\{06ede168-ff52-4e62-9fd6-8fc89d637337}" => Key deleted successfully.
d0e87c27 => Service deleted successfully.
==== End of Fixlog 16:43:17 ====
Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 07-01-2015
Ran by ana at 2015-01-08 16:43:15 Run:1
Running from C:\Users\ana\Desktop
Loaded Profile: ana (Available profiles: ana)
Boot Mode: Normal
==============================================
Content of fixlist:
*****************
2015-01-08 15:00 - 2014-08-28 19:12 - 00000000 ____D () C:\ProgramData\pricp
2015-01-08 15:00 - 2014-08-28 18:49 - 00000000 ____D () C:\ProgramData\pRRiceecHHOpp
2015-01-08 14:59 - 2014-11-09 17:13 - 00000000 ____D () C:\ProgramData\GoSave
2015-01-08 14:59 - 2014-08-28 18:52 - 00000000 ____D () C:\ProgramData\IePluginServices
2015-01-08 14:58 - 2014-08-28 18:50 - 00000000 ____D () C:\ProgramData\Adblocker
2015-01-08 13:24 - 2014-08-28 18:50 - 00000000 ____D () C:\Program Files (x86)\Adblocker
CHR Extension: (priCp) - C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdm [2014-08-28]
CHR Extension: (GoSave) - C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\gcejpipihlkdcocgmadbmhodkpkfbdol [2014-11-09]
CHR Extension: (pricp) - C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod [2014-08-28]
HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Search Page = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
HKU\S-1-5-21-498154490-4218162474-2579822568-1000\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.webpageing.com/?type=hp&ts=1409251896&from=wpc&uid=TOSHIBAXMK3275GSX_Y1S6F042SXXY1S6F042S [Pays US - 69.28.57.22]
SearchScopes: HKLM -> DefaultScope {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKLM -> {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKLM-x32 -> DefaultScope {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} URL = http://websearch.fixsearch.info/?l=1&q={searchTerms}&pid=3765&r=2014/08/28&hid=6859600285867408378&lg=EN&cc=MA&unqvl=61 [Pays DE - 46.165.228.246]
SearchScopes: HKLM-x32 -> {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKLM-x32 -> {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} URL = http://websearch.fixsearch.info/?l=1&q={searchTerms}&pid=3765&r=2014/08/28&hid=6859600285867408378&lg=EN&cc=MA&unqvl=61 [Pays DE - 46.165.228.246]
SearchScopes: HKU\S-1-5-21-498154490-4218162474-2579822568-1000 -> {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = https://www.google.com/webhp?gws_rd=ssl{searchTerms} [Pays US - 69.28.57.22]
SearchScopes: HKU\S-1-5-21-498154490-4218162474-2579822568-1000 -> {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} URL = http://websearch.fixsearch.info/?l=1&q={searchTerms}&pid=3765&r=2014/08/28&hid=6859600285867408378&lg=EN&cc=MA&unqvl=61 [Pays DE - 46.165.228.246]
BHO: GoSave -> {06ede168-ff52-4e62-9fd6-8fc89d637337} -> C:\Program Files (x86)\GoSave\IF0p0EM6OK0WqM.x64.dll ()
S2 d0e87c27; c:\Program Files (x86)\SW-Booster\AssistantSvc.dll [174928 2014-08-28] () [File not signed]
*****************
"C:\ProgramData\pricp" => File/Directory not found.
C:\ProgramData\pRRiceecHHOpp => Moved successfully.
C:\ProgramData\GoSave => Moved successfully.
C:\ProgramData\IePluginServices => Moved successfully.
C:\ProgramData\Adblocker => Moved successfully.
C:\Program Files (x86)\Adblocker => Moved successfully.
C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdm directory not found.
C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\gcejpipihlkdcocgmadbmhodkpkfbdol => Moved successfully.
C:\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod => Moved successfully.
HKLM\Software\\Microsoft\Internet Explorer\Main\\Search Page => Value was restored successfully.
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main\\Search Page => Value was restored successfully.
HKLM\Software\\Microsoft\Internet Explorer\Main\\Default_Search_URL => Value was restored successfully.
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main\\Default_Search_URL => Value was restored successfully.
HKU\S-1-5-21-498154490-4218162474-2579822568-1000\Software\Microsoft\Internet Explorer\Main\\Default_Page_URL => Value was restored successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope => Value was restored successfully.
"HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}" => Key deleted successfully.
HKCR\CLSID\{33BB0A4E-99AF-4226-BDF6-49120163DE86} => Key not found.
HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\\DefaultScope => Value was restored successfully.
"HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}" => Key deleted successfully.
HKCR\Wow6432Node\CLSID\{33BB0A4E-99AF-4226-BDF6-49120163DE86} => Key not found.
"HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{BB74DE59-BC4C-4172-9AC4-73315F71CFFE}" => Key deleted successfully.
HKCR\Wow6432Node\CLSID\{BB74DE59-BC4C-4172-9AC4-73315F71CFFE} => Key not found.
"HKU\S-1-5-21-498154490-4218162474-2579822568-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}" => Key deleted successfully.
HKCR\CLSID\{33BB0A4E-99AF-4226-BDF6-49120163DE86} => Key not found.
"HKU\S-1-5-21-498154490-4218162474-2579822568-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{BB74DE59-BC4C-4172-9AC4-73315F71CFFE}" => Key deleted successfully.
HKCR\CLSID\{BB74DE59-BC4C-4172-9AC4-73315F71CFFE} => Key not found.
"HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{06ede168-ff52-4e62-9fd6-8fc89d637337}" => Key deleted successfully.
"HKCR\CLSID\{06ede168-ff52-4e62-9fd6-8fc89d637337}" => Key deleted successfully.
d0e87c27 => Service deleted successfully.
==== End of Fixlog 16:43:17 ====
Voila ça doit être bon, côté adware.
Note que le bot que tu as téléchargé peut avoir lancé un malware qui volent les infos et les transmets sans rien installer sur l'ordinateur.
Mais en tout cas, il n'y a pas l'air d'y avoir de keylogger actif.
Si tu as un doute, tu peux faire un scan en ligne NOD32.
Fais un scan en ligne NOD32 : https://www.malekal.com/scan-antivirus-ligne-nod32/#NOD32
Enregistre le rapport et donne le ici.
Note que le bot que tu as téléchargé peut avoir lancé un malware qui volent les infos et les transmets sans rien installer sur l'ordinateur.
Mais en tout cas, il n'y a pas l'air d'y avoir de keylogger actif.
Si tu as un doute, tu peux faire un scan en ligne NOD32.
Fais un scan en ligne NOD32 : https://www.malekal.com/scan-antivirus-ligne-nod32/#NOD32
Enregistre le rapport et donne le ici.
le voila le scan :
C:\AdwCleaner\Quarantine\C\Program Files (x86)\GoSave\IF0p0EM6OK0WqM.x64.dll.vir a variant of Win64/Adware.MultiPlug.E application cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Program Files (x86)\sw-booster\AssistantSvc.dll.vir a variant of Win32/SProtector.D potentially unwanted application deleted - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Chromatic Browser\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Chromatic Browser\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Chromatic Browser\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Google\Chrome\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Google\Chrome\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\torch\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\torch\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\torch\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\Chromatic Browser\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\Chromatic Browser\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\Chromatic Browser\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\torch\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\torch\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\torch\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Chromatic Browser\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Chromatic Browser\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Chromatic Browser\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Google\Chrome\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Google\Chrome\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\torch\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\torch\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\torch\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Windows\System32\roboot64.exe.vir a variant of Win64/Systweak.A potentially unwanted application deleted - quarantined
C:\FRST\Quarantine\C\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Administrateur\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Administrateur\AppData\Local\Google\Chrome\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Administrateur\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Administrateur\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Administrateur\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Temp\PFHJXV.tmp Win32/TrojanDownloader.Agent.ACF trojan cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Temp\f0F55c2fB0315\temp\BIT4ACE.tmp a variant of Win32/AdWare.SpeedingUpMyPC.N application cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Temp\f0F55c2fB0315\temp\putfu.exe a variant of Win32/Adware.MultiPlug.DX application cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Temp\s2as\temp\hpds_setup.exe Win32/SProtector.M potentially unwanted application deleted - quarantined
C:\Users\ana\AppData\Local\Temp\s2c0\temp\wpc_webssearches.exe a variant of Win32/ELEX.AX potentially unwanted application deleted - quarantined
C:\Users\Invité\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Invité\AppData\Local\Google\Chrome\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Invité\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Invité\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Invité\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Program Files (x86)\GoSave\IF0p0EM6OK0WqM.x64.dll.vir a variant of Win64/Adware.MultiPlug.E application cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Program Files (x86)\sw-booster\AssistantSvc.dll.vir a variant of Win32/SProtector.D potentially unwanted application deleted - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Chromatic Browser\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Chromatic Browser\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Chromatic Browser\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Google\Chrome\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\Google\Chrome\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\torch\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\torch\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Administrateur\AppData\Local\torch\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\Chromatic Browser\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\Chromatic Browser\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\Chromatic Browser\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\torch\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\torch\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\ana\AppData\Local\torch\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Chromatic Browser\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Chromatic Browser\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Chromatic Browser\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Google\Chrome\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\Google\Chrome\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\torch\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\torch\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Invité\AppData\Local\torch\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Windows\System32\roboot64.exe.vir a variant of Win64/Systweak.A potentially unwanted application deleted - quarantined
C:\FRST\Quarantine\C\Users\ana\AppData\Local\Google\Chrome\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Administrateur\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Administrateur\AppData\Local\Google\Chrome\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Administrateur\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Administrateur\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Administrateur\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Temp\PFHJXV.tmp Win32/TrojanDownloader.Agent.ACF trojan cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Temp\f0F55c2fB0315\temp\BIT4ACE.tmp a variant of Win32/AdWare.SpeedingUpMyPC.N application cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Temp\f0F55c2fB0315\temp\putfu.exe a variant of Win32/Adware.MultiPlug.DX application cleaned by deleting - quarantined
C:\Users\ana\AppData\Local\Temp\s2as\temp\hpds_setup.exe Win32/SProtector.M potentially unwanted application deleted - quarantined
C:\Users\ana\AppData\Local\Temp\s2c0\temp\wpc_webssearches.exe a variant of Win32/ELEX.AX potentially unwanted application deleted - quarantined
C:\Users\Invité\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Invité\AppData\Local\Google\Chrome\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Invité\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\ekmagalmoaadcleldhpdkjbaijdechom\3.9\wpum.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Invité\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\gdefoklganepljiopdnglodohlgfikkl\243\Kt.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Invité\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\opikgempgjiidoamhjfjflchkbhhkiod\3.9\dO.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
oui :)
Voila, c'est terminé, tu peux supprimer les programmes utilisés.
Quelques conseils :
Installe Malwarebyte's Anti-Malware : https://www.malekal.com/tutoriel-malwarebyte-anti-malware/
Fais des scans réguliers avec, il est efficace.
(sauf si tu es sur un netbook)
Pour prévenir les sites malicieux, tu peux installer Blockulicious : https://forum.malekal.com/viewtopic.php?t=46656&start=
Pour ne plus te faire avoir.
A lire - Programmes parasites / PUPs : https://www.malekal.com/adwares-pup-protection/
Voila, c'est terminé, tu peux supprimer les programmes utilisés.
Quelques conseils :
Installe Malwarebyte's Anti-Malware : https://www.malekal.com/tutoriel-malwarebyte-anti-malware/
Fais des scans réguliers avec, il est efficace.
(sauf si tu es sur un netbook)
Pour prévenir les sites malicieux, tu peux installer Blockulicious : https://forum.malekal.com/viewtopic.php?t=46656&start=
Pour ne plus te faire avoir.
A lire - Programmes parasites / PUPs : https://www.malekal.com/adwares-pup-protection/