Radio se lance toute seule !!!

leticon Messages postés 6 Statut Membre -  
 Utilisateur anonyme -
Bonjour,

voilà déjà un petit temps que lorsque je démarre mon PC une musique (ou plutôt une radio) se lance toute seule. Je me suis déjà énormément renseigner (hijackthis ...) mais rien n'y fait ...
La radio se lance a chaque démarrage ou du moins quelques minutes après. Je sais que c'est un processus (caché ou pas) qui a accès à internet.

Merci d'avance.

7 réponses

leticon Messages postés 6 Statut Membre 1
 
voilà le rapport de l'analyse et de la suppression...

Malwarebytes' Anti-Malware 1.36
Version de la base de données: 2024
Windows 5.1.2600 Service Pack 2

22/04/2009 16:42:26
mbam-log-2009-04-22 (16-42-26).txt

Type de recherche: Examen complet (C:\|D:\|E:\|F:\|)
Eléments examinés: 483601
Temps écoulé: 1 hour(s), 51 minute(s), 16 second(s)

Processus mémoire infecté(s): 4
Module(s) mémoire infecté(s): 1
Clé(s) du Registre infectée(s): 30
Valeur(s) du Registre infectée(s): 7
Elément(s) de données du Registre infecté(s): 1
Dossier(s) infecté(s): 6
Fichier(s) infecté(s): 81

Processus mémoire infecté(s):
D:\WINDOWS\system32\afisicx.exe (Trojan.Agent) -> Unloaded process successfully.
D:\WINDOWS\system32\sopidkc.exe (Backdoor.Bot) -> Unloaded process successfully.
D:\WINDOWS\system32\tdctxte.exe (Backdoor.Bot) -> Unloaded process successfully.
D:\WINDOWS\dhcp\svchost.exe (Trojan.Agent) -> Unloaded process successfully.

Module(s) mémoire infecté(s):
d:\WINDOWS\system32\Iasv32.dll (Dialer) -> Delete on reboot.

Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ias (Dialer) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\ias (Dialer) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ias (Dialer) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\at1394 (Spyware.OnlineGames) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\at1394 (Spyware.OnlineGames) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\at1394 (Spyware.OnlineGames) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sysdrv32 (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\sysdrv32 (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sysdrv32 (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\upmedia (Adware.SmartShopper) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\mediaeldoradocodec (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\sysfldr (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\afisicx (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\afisicx (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\afisicx (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\restore (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sopidkc (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sopidkc (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\sopidkc (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\UpMedia (Adware.SmartShopper) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Protect (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\WR (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\enlfxgw.blpk (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tdctxte (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\tdctxte (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tdctxte (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\AGprotect (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\dhcpsrv (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\dhcpsrv (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\dhcpsrv (Trojan.Agent) -> Quarantined and deleted successfully.

Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost.exe (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reader_s (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reader_s (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reader_s (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\zip (Trojan.Clicker) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\ChkSrv (Trojan.Clicker) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\windows security tool (Trojan.Dropper) -> Quarantined and deleted successfully.

Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad: (D:\WINDOWS\system32\userinit.exe,D:\WINDOWS\system32\^^^^^ %^ ^^ %%%^ ^%^^%% ^% ^ ^%^%.exe,D:\WINDOWS\system32\c++.exe,) Good: (userinit.exe) -> Quarantined and deleted successfully.

Dossier(s) infecté(s):
D:\Program Files\MediaEldoradoCodec (Trojan.FakeAlert) -> Quarantined and deleted successfully.
D:\Program Files\Temporary (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\UpMedia (Adware.SmartShopper) -> Quarantined and deleted successfully.
D:\Documents and Settings\anne-sophie\Application Data\nidle (Trojan.Agent) -> Quarantined and deleted successfully.
D:\Program Files\Svconr (Trojan.Agent) -> Quarantined and deleted successfully.
D:\Documents and Settings\anne-sophie\Local Settings\Temp\ac8zt2 (Trojan.FakeAlert) -> Quarantined and deleted successfully.

Fichier(s) infecté(s):
d:\WINDOWS\system32\Iasv32.dll (Dialer) -> Delete on reboot.
C:\System Volume Information\_restore{FF06CE39-EC2B-43A8-B714-7413DE9977F4}\RP678\A0137805.exe (Trojan.Agent2) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FF06CE39-EC2B-43A8-B714-7413DE9977F4}\RP678\A0137815.dll (PassThief.WoW) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FF06CE39-EC2B-43A8-B714-7413DE9977F4}\RP678\A0137816.exe (Trojan.Agent2) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\UpMedia\uninstallSE.exe (Adware.SmartShopper) -> Quarantined and deleted successfully.
D:\Documents and Settings\antoine\Local Settings\Temporary Internet Files\Content.IE5\AUU3LJ16\zchMiB[1].exe (Trojan.Downloader) -> Quarantined and deleted successfully.
D:\Documents and Settings\antoine\Local Settings\Temporary Internet Files\Content.IE5\YV3ME0B4\abb[1].txt (Virus.Virut) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{FF06CE39-EC2B-43A8-B714-7413DE9977F4}\RP668\A0129664.sys (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{FF06CE39-EC2B-43A8-B714-7413DE9977F4}\RP668\A0132604.dll (Trojan.Agent) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{FF06CE39-EC2B-43A8-B714-7413DE9977F4}\RP668\A0132608.exe (Virus.Virut) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{FF06CE39-EC2B-43A8-B714-7413DE9977F4}\RP676\A0136758.exe (Virus.Virut) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{FF06CE39-EC2B-43A8-B714-7413DE9977F4}\RP678\A0137817.sys (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{FF06CE39-EC2B-43A8-B714-7413DE9977F4}\RP678\A0137818.dll (Dialer) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{FF06CE39-EC2B-43A8-B714-7413DE9977F4}\RP680\A0137850.exe (Virus.Virut) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{FF06CE39-EC2B-43A8-B714-7413DE9977F4}\RP680\A0137851.exe (Virus.Virut) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{FF06CE39-EC2B-43A8-B714-7413DE9977F4}\RP680\A0137852.exe (Virus.Virut) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{FF06CE39-EC2B-43A8-B714-7413DE9977F4}\RP680\A0137853.exe (Virus.Virut) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{FF06CE39-EC2B-43A8-B714-7413DE9977F4}\RP681\A0137880.sys (Backdoor.Refpron) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{FF06CE39-EC2B-43A8-B714-7413DE9977F4}\RP693\A0141943.sys (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{FF06CE39-EC2B-43A8-B714-7413DE9977F4}\RP693\A0141944.dll (Dialer) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{FF06CE39-EC2B-43A8-B714-7413DE9977F4}\RP698\A0143043.sys (Backdoor.Bot) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{FF06CE39-EC2B-43A8-B714-7413DE9977F4}\RP704\A0143176.sys (Backdoor.Bot) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{FF06CE39-EC2B-43A8-B714-7413DE9977F4}\RP704\A0143180.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{FF06CE39-EC2B-43A8-B714-7413DE9977F4}\RP704\A0143184.sys (Backdoor.Bot) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{FF06CE39-EC2B-43A8-B714-7413DE9977F4}\RP704\A0143192.dll (Worm.Mariofev) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{FF06CE39-EC2B-43A8-B714-7413DE9977F4}\RP704\A0143196.sys (Backdoor.Bot) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\6to4v32.dll (Dialer) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\at1394.sys (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\dpcxool64.sys (Trojan.BHO) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\drivers\sysdrv32.sys (Backdoor.Bot) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\UpMedia\uninstallSE.exe (Adware.SmartShopper) -> Quarantined and deleted successfully.
D:\WINDOWS\Temp\BN10.tmp (Trojan.Kobcka) -> Quarantined and deleted successfully.
D:\WINDOWS\Temp\BN12.tmp (Trojan.Kobcka) -> Quarantined and deleted successfully.
D:\WINDOWS\Temp\BN14.tmp (Trojan.Kobcka) -> Quarantined and deleted successfully.
D:\WINDOWS\Temp\BN2.tmp (Trojan.Kobcka) -> Quarantined and deleted successfully.
D:\WINDOWS\Temp\BN4.tmp (Trojan.Kobcka) -> Quarantined and deleted successfully.
D:\WINDOWS\Temp\BN401.tmp (Trojan.Kobcka) -> Quarantined and deleted successfully.
D:\WINDOWS\Temp\kszghshths48.exe (Trojan.Refpron) -> Quarantined and deleted successfully.
D:\WINDOWS\Temp\TMP1E.tmp (Trojan.Dropper) -> Quarantined and deleted successfully.
D:\WINDOWS\Temp\VRT17.tmp (Trojan.Refpron) -> Quarantined and deleted successfully.
D:\WINDOWS\Temp\VRT251.tmp (Trojan.Refpron) -> Quarantined and deleted successfully.
D:\WINDOWS\Temp\VRT2B.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
D:\WINDOWS\Temp\VRT400.tmp (Trojan.Refpron) -> Quarantined and deleted successfully.
D:\WINDOWS\Temp\VRT6.tmp (Trojan.Refpron) -> Quarantined and deleted successfully.
D:\Program Files\MediaEldoradoCodec\install.ico (Trojan.FakeAlert) -> Quarantined and deleted successfully.
D:\Program Files\MediaEldoradoCodec\Uninstall.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\3361\SVCHOST.EXE (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\reader_s.exe (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\afisicx.exe (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\mp7arc.dat (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\comsa32.sys (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\dncyool64.sys (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\2.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\3.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\4.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\5.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\6.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\7.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\8.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\9.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\A.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\B.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\C.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\D.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\E.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\F.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
D:\Documents and Settings\anne-sophie\reader_s.exe (Trojan.Agent) -> Quarantined and deleted successfully.
D:\Documents and Settings\antoine\reader_s.exe (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\Temp\BN7.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\Temp\BN8.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\FInstall.sys (Backdoor.Bot) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\sopidkc.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\tpszxyd.sys (Backdoor.Bot) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\w.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
D:\WINDOWS\rs.txt (Malware.Trace) -> Quarantined and deleted successfully.
D:\Documents and Settings\anne-francoise\Favoris\Error Cleaner.url (Rogue.Link) -> Quarantined and deleted successfully.
D:\Documents and Settings\anne-francoise\Favoris\Privacy Protector.url (Rogue.Link) -> Quarantined and deleted successfully.
D:\Documents and Settings\anne-francoise\Favoris\Spyware&Malware Protection.url (Rogue.Link) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\tdctxte.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
D:\WINDOWS\Temp\manun.exe (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\dhcp\svchost.exe (Trojan.Agent) -> Quarantined and deleted successfully.
1
Utilisateur anonyme
 
Slt,

On va verifier la presence d'infection(s) sur ton PC avec l'aide d' HiJackThis. Celui-ci ne resout aucun probleme, cet utilitaire a pour but de nous aider a trouver la cause de certains problemes (notamment reperer des processus comme etant infectieux) mais aussi pour lister les elements importants de ton pc et si infection(s) il y a, nous les "devoiler", entre guillemets puisqu'il arrive que certaines infections passent a travers les mailles d'HiJackThis. Il est donc important de le renommer avant de le lancer.

Voici la procédure:

- Télécharge HiJackThis de Merijn sur ton bureau.

- Renomme-le en mars

- Double-clique sur mars.exe (HijackThis)

** Génère un rapport en suivant ces indications : **

- Clique sur "Do a system scan and save log file"

- Le Bloc-Note va s'ouvrir ave comme contenu, le rapport HiJackThis.

- Sélectionne la totalité du rapport : Menu Edition / Selectionner Tout (Ctrl + A)

- Fait un "copier" : Menu Edition / copier (Ctrl + C)

- Et colle-le dans ton prochain message : Clic droit / coller (Ctrl + V)

0
leticon Messages postés 6 Statut Membre 1
 
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 15:52:04, on 20/04/2009
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16827)
Boot mode: Normal

Running processes:
D:\WINDOWS\System32\smss.exe
D:\WINDOWS\system32\winlogon.exe
D:\WINDOWS\system32\services.exe
D:\WINDOWS\system32\lsass.exe
D:\WINDOWS\system32\svchost.exe
D:\WINDOWS\System32\svchost.exe
D:\WINDOWS\system32\spoolsv.exe
D:\Program Files\Fichiers communs\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
E:\Program Files\IBM\SQLLIB\BIN\db2mgmtsvc.exe
D:\Program Files\Java\jre6\bin\jqs.exe
D:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
d:\program files\fichiers communs\mcafee\mna\mcnasvc.exe
d:\PROGRA~1\FICHIE~1\mcafee\mcproxy\mcproxy.exe
D:\Program Files\Fichiers communs\Microsoft Shared\VS7DEBUG\MDM.EXE
D:\Program Files\McAfee\MPF\MPFSrv.exe
D:\WINDOWS\system32\nvsvc32.exe
D:\WINDOWS\system32\PnkBstrA.exe
D:\WINDOWS\system32\slserv.exe
D:\WINDOWS\System32\svchost.exe
D:\WINDOWS\system32\vmnat.exe
E:\Program Files\sdb\programs\pgm\serv.exe
D:\Program Files\VMware\VMware Player\vmware-authd.exe
D:\WINDOWS\system32\vmnetdhcp.exe
D:\WINDOWS\System32\svchost.exe
D:\WINDOWS\System32\svchost.exe
D:\WINDOWS\System32\svchost.exe
D:\WINDOWS\System32\svchost.exe
D:\WINDOWS\System32\svchost.exe
D:\Program Files\iPod\bin\iPodService.exe
D:\WINDOWS\system32\svchost.exe
D:\Program Files\Internet Explorer\IEXPLORE.EXE
D:\WINDOWS\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\infocard.exe
D:\WINDOWS\System32\svchost.exe
D:\WINDOWS\system32\winlogon.exe
D:\WINDOWS\system32\wscntfy.exe
D:\WINDOWS\Explorer.EXE
D:\WINDOWS\system32\wuauclt.exe
D:\PROGRA~1\McAfee.com\Agent\mcagent.exe
D:\Program Files\Java\jre6\bin\jusched.exe
D:\Program Files\Dell Photo AIO Printer 922\dlbtbmgr.exe
D:\Program Files\HP\HP Software Update\HPWuSchd.exe
D:\Program Files\HP\hpcoretech\hpcmpmgr.exe
D:\Program Files\Dell Photo AIO Printer 922\dlbtbmon.exe
D:\Program Files\iTunes\iTunesHelper.exe
D:\WINDOWS\system32\RUNDLL32.EXE
D:\Program Files\VMware\VMware Player\hqtray.exe
E:\PROGRA~1\IBM\SQLLIB\BIN\db2systray.exe
D:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe
D:\WINDOWS\system32\ctfmon.exe
D:\Program Files\MSN Messenger\msnmsgr.exe
D:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
D:\Program Files\Okidata\OKI LPR Utility\Okilpr.exe
D:\WINDOWS\System32\msiexec.exe
d:\PROGRA~1\mcafee\msc\mcuimgr.exe
D:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
R3 - URLSearchHook: Freecorder Toolbar - {1392b8d2-5c05-419f-a8f6-b9f15a596612} - D:\Program Files\Freecorder\tbFre0.dll
F2 - REG:system.ini: UserInit=D:\WINDOWS\system32\userinit.exe,D:\WINDOWS\system32\^^^^^ %^ ^^ %%%^ ^%^^%% ^% ^ ^%^%.exe,D:\WINDOWS\system32\c++.exe,
O2 - BHO: Aide pour le lien d'Adobe PDF Reader - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - D:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: IeCatch5 Class - {2F364306-AA45-47B5-9F9D-39A8B94E7EF7} - D:\PROGRA~1\FlashGet\jccatch.dll
O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - D:\Program Files\Java\jre6\bin\ssv.dll
O3 - Toolbar: FlashGet Bar - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - D:\PROGRA~1\FlashGet\fgiebar.dll
O3 - Toolbar: (no name) - {C37757F5-7FB4-4273-B3BE-E81667449196} - (no file)
O3 - Toolbar: (no name) - {959BA9FF-BE80-4A4A-8BB7-7650FD5155A2} - (no file)
O3 - Toolbar: Freecorder Toolbar - {1392b8d2-5c05-419f-a8f6-b9f15a596612} - D:\Program Files\Freecorder\tbFre0.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE D:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [SunJavaUpdateSched] "D:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [Dell Photo AIO Printer 922] "D:\Program Files\Dell Photo AIO Printer 922\dlbtbmgr.exe"
O4 - HKLM\..\Run: [mcagent_exe] D:\Program Files\McAfee.com\Agent\mcagent.exe /runkey
O4 - HKLM\..\Run: [HP Software Update] "D:\Program Files\HP\HP Software Update\HPWuSchd.exe"
O4 - HKLM\..\Run: [HP Component Manager] "D:\Program Files\HP\hpcoretech\hpcmpmgr.exe"
O4 - HKLM\..\Run: [QuickTime Task] "D:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "D:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE D:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [NeroFilterCheck] D:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [VMware hqtray] "D:\Program Files\VMware\VMware Player\hqtray.exe"
O4 - HKLM\..\Run: [DB2COPY1 - db2systray.exe DB2] E:\PROGRA~1\IBM\SQLLIB\BIN\db2systray.exe DB2
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "D:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [reader_s] D:\WINDOWS\System32\reader_s.exe
O4 - HKLM\..\Run: [DLBTCATS] rundll32 D:\WINDOWS\System32\spool\DRIVERS\W32X86\3\DLBTtime.dll,_RunDLLEntry@16
O4 - HKLM\..\Run: [svchost.exe] "D:\WINDOWS\system32\3361\SVCHOST.exe"
O4 - HKCU\..\Run: [ctfmon.exe] D:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [msnmsgr] "D:\Program Files\MSN Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [AnyDVD] D:\Program Files\SlySoft\AnyDVD\AnyDVD.exe
O4 - HKCU\..\Run: [Pando] "D:\Program Files\Pando Networks\Pando\pando.exe" /Minimized
O4 - HKCU\..\Run: [AlcoholAutomount] "D:\Documents and Settings\antoine\Bureau\alcohol\crack\axcmd.exe" /automount
O4 - HKCU\..\Run: [AdobeUpdater] "D:\Program Files\Fichiers communs\Adobe\Updater5\AdobeUpdater.exe"
O4 - HKCU\..\Run: [reader_s] D:\Documents and Settings\antoine\reader_s.exe
O4 - HKCU\..\Policies\Explorer\Run: [Windows Security Tool] WinSecure.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] D:\WINDOWS\System32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] D:\WINDOWS\System32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-21-796845957-963894560-839522115-1007\..\Run: [CTFMON.EXE] D:\WINDOWS\system32\ctfmon.exe (User 'anne-sophie')
O4 - HKUS\S-1-5-21-796845957-963894560-839522115-1007\..\Run: [reader_s] D:\Documents and Settings\anne-sophie\reader_s.exe (User 'anne-sophie')
O4 - HKUS\S-1-5-21-796845957-963894560-839522115-1019\..\Run: [CTFMON.EXE] D:\WINDOWS\System32\CTFMON.EXE (User 'db2admin')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] D:\WINDOWS\System32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] D:\WINDOWS\System32\CTFMON.EXE (User 'Default user')
O4 - Startup: Enregistrement de Need for Speed™ Undercover.lnk = E:\Program Files\nfsu\Support\EAregister.exe
O4 - Startup: ubisoft register.lnk = D:\Program Files\Ubi Soft\Register\schedule.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = D:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: Utilitaire OKI LPR.lnk = D:\Program Files\Okidata\OKI LPR Utility\Okilpr.exe
O8 - Extra context menu item: Download All by FlashGet - D:\Program Files\FlashGet\jc_all.htm
O8 - Extra context menu item: Download using FlashGet - D:\Program Files\FlashGet\jc_link.htm
O9 - Extra button: Recherche - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - D:\PROGRA~1\MICROS~4\OFFICE11\REFIEBAR.DLL
O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - D:\PROGRA~1\FlashGet\flashget.exe
O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - D:\PROGRA~1\FlashGet\flashget.exe
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - D:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - D:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - D:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - D:\Program Files\Messenger\msmsgs.exe
O10 - Unknown file in Winsock LSP: d:\program files\vmware\vmware player\vsocklib.dll
O10 - Unknown file in Winsock LSP: d:\program files\vmware\vmware player\vsocklib.dll
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx2.hotmail.com/mail/w2/resources/MSNPUpld.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/...
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - D:\PROGRA~1\FICHIE~1\Skype\SKYPE4~1.DLL
O20 - AppInit_DLLs: ms32clod.dll
O20 - Winlogon Notify: sysfldr - sysfldr.dll (file missing)
O21 - SSODL: apdqnxp - {C5799B0D-5375-4CAF-9910-80E326526AC9} - (no file)
O21 - SSODL: btrklfr - {D5323C32-5BA4-4E89-B61B-B89481E85BF5} - (no file)
O21 - SSODL: ChkSrv - {f21a2d09-affe-45e7-9163-2958bccb5eab} - D:\WINDOWS\Installer\{f21a2d09-affe-45e7-9163-2958bccb5eab}\ChkSrv.dll (file missing)
O21 - SSODL: zip - {147e9407-8f1c-447d-83cd-7b1ef3b1488b} - D:\WINDOWS\Installer\{147e9407-8f1c-447d-83cd-7b1ef3b1488b}\zip.dll (file missing)
O21 - SSODL: SysRom - {f7064dfa-a5f5-4997-ac11-59499eecfdbb} - D:\WINDOWS\Installer\{f7064dfa-a5f5-4997-ac11-59499eecfdbb}\SysRom.dll (file missing)
O21 - SSODL: AvpRam - {b0b7ce5d-24a4-4836-beee-97844eb51c9f} - D:\WINDOWS\Installer\{b0b7ce5d-24a4-4836-beee-97844eb51c9f}\AvpRam.dll (file missing)
O23 - Service: afisicx Service (afisicx) - Unknown owner - D:\WINDOWS\system32\afisicx.exe (file missing)
O23 - Service: Apple Mobile Device - Apple, Inc. - D:\Program Files\Fichiers communs\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Service Bonjour (Bonjour Service) - Apple Inc. - D:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: DB2 - DB2COPY1 - DB2 (DB2) - International Business Machines Corporation - E:\PROGRA~1\IBM\SQLLIB\bin\db2syscs.exe
O23 - Service: DB2DAS - DB2DAS00 (DB2DAS00) - International Business Machines Corporation - E:\Program Files\IBM\SQLLIB\\bin\db2dasrrm.exe
O23 - Service: DB2 Governor (DB2COPY1) (DB2GOVERNOR_DB2COPY1) - International Business Machines Corporation - E:\Program Files\IBM\SQLLIB\BIN\db2govds.exe
O23 - Service: DB2 License Server (DB2COPY1) (DB2LICD_DB2COPY1) - International Business Machines Corporation - E:\Program Files\IBM\SQLLIB\BIN\db2licd.exe
O23 - Service: DB2 Management Service (DB2COPY1) (DB2MGMTSVC_DB2COPY1) - International Business Machines Corporation - E:\Program Files\IBM\SQLLIB\BIN\db2mgmtsvc.exe
O23 - Service: DB2 Remote Command Server (DB2COPY1) (DB2REMOTECMD_DB2COPY1) - International Business Machines Corporation - E:\Program Files\IBM\SQLLIB\BIN\db2rcmd.exe
O23 - Service: DB2TS - DB2COPY1 - DB2 (DB2TS - DB2) - International Business Machines Corporation - E:\PROGRA~1\IBM\SQLLIB\bin\cielock.exe
O23 - Service: Dhcp server (DhcpSrv) - Unknown owner - D:\WINDOWS\dhcp\svchost.exe (file missing)
O23 - Service: dlbt_device - Dell - D:\WINDOWS\system32\dlbtcoms.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - D:\Program Files\Fichiers communs\InstallShield\Driver\1150\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - D:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - D:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: McAfee Services (mcmscsvc) - McAfee, Inc. - D:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
O23 - Service: McAfee Network Agent (McNASvc) - McAfee, Inc. - d:\program files\fichiers communs\mcafee\mna\mcnasvc.exe
O23 - Service: McAfee Scanner (McODS) - McAfee, Inc. - D:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
O23 - Service: McAfee Proxy Service (McProxy) - McAfee, Inc. - d:\PROGRA~1\FICHIE~1\mcafee\mcproxy\mcproxy.exe
O23 - Service: McAfee SystemGuards (McSysmon) - McAfee, Inc. - D:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee, Inc. - D:\Program Files\McAfee\MPF\MPFSrv.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - D:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - D:\WINDOWS\System32\HPZipm12.exe
O23 - Service: PnkBstrA - Unknown owner - D:\WINDOWS\system32\PnkBstrA.exe
O23 - Service: MAXDB: .M770601 (SAP DBTech-.M770601) - SAP AG - E:\Program Files\sdb\programs\DatabaseStudio\utilities\pgm\kernel.exe
O23 - Service: MAXDB: .M770609 (SAP DBTech-.M770609) - SAP AG - E:\Program Files\sdb\7706\pgm\kernel.exe
O23 - Service: MAXDB: .M770609 (slow) (SAP DBTech-.M770609 (slow)) - SAP AG - E:\Program Files\sdb\7706\pgm\slowknl.exe
O23 - Service: MAXDB: .UMDB (SAP DBTech-.UMDB) - SAP AG - E:\Program Files\sdb\programs\DatabaseStudio\utilities\pgm\kernel.exe
O23 - Service: MAXDB: MAXDB1 (SAP DBTech-MAXDB1) - SAP AG - E:\Program Files\sdb\7706\pgm\kernel.exe
O23 - Service: MAXDB: MAXDB1 (slow) (SAP DBTech-MAXDB1 (slow)) - SAP AG - E:\Program Files\sdb\7706\pgm\slowknl.exe
O23 - Service: SmartLinkService (SLService) - - D:\WINDOWS\SYSTEM32\slserv.exe
O23 - Service: sopidkc Service (sopidkc) - Unknown owner - D:\WINDOWS\system32\sopidkc.exe (file missing)
O23 - Service: StarWind AE Service (StarWindServiceAE) - Rocket Division Software - D:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindServiceAE.exe
O23 - Service: tdctxte Service (tdctxte) - Unknown owner - D:\WINDOWS\system32\tdctxte.exe (file missing)
O23 - Service: VMware Agent Service (ufad-ws60) - VMware, Inc. - D:\Program Files\VMware\VMware Player\vmware-ufad.exe
O23 - Service: VMware Authorization Service (VMAuthdService) - VMware, Inc. - D:\Program Files\VMware\VMware Player\vmware-authd.exe
O23 - Service: VMware DHCP Service (VMnetDHCP) - VMware, Inc. - D:\WINDOWS\system32\vmnetdhcp.exe
O23 - Service: VMware NAT Service - VMware, Inc. - D:\WINDOWS\system32\vmnat.exe
O23 - Service: XServer - SAP AG - E:\Program Files\sdb\programs\pgm\serv.exe
O23 - Service: XServer-7210 - SAP AG - E:\Program Files\sdb\programs\pgm\serv.exe
0
Utilisateur anonyme
 
Slt,

Desolé du delais :)

1/ Telechargement :

# Télécharge Malwarebytes' Anti-Malware

NOTE : S'il te manque COMCTL32.OCX alors télécharge le --> comctl32.ocx

2/ Installation et mise a jour :

# Installe MBAM en double-cliquant sur Mbam-setup.exe ,il se mettra a jour automatiquement.

# Une fois a jour, le programme va se lancer. Clique sur l'onglet Paramètre, et coche la case : "Arrêter internet explorer pendant la suppression".

3/ Recherche :

# Clique a présent sur l'onglet Recherche et coche la case : "exécuter un examen complet".

# Clique ensuite sur "rechercher".

Laisse-le scanner ton PC ...

4/ Suppression :

# Si des éléments on été trouvés ~> Clique sur "Supprimer la selection".

# Si le programme te demande de redemarrer ~> Clique sur "yes".

# A la fin, un rapport va s'ouvrir dans le Bloc-notes ~> Sauvegarde le de manière a le retrouver pour le poster sur le forum.

# Copie (Ctrl + C) et colle (Ctrl + V) le rapport dans ton prochain message stp.

PS : Les rapports sont aussi classés par date et heure du scan dans l'onglet Rapport/Log

Données : Un tutoriel de chez Malekal est disponible ~>

https://www.malekal.com/tutoriel-malwarebyte-anti-malware/

__________________________________

Telecharge et install UsbFix de C_XX & Chiquitine29

Branche tes sources de données externes à ton PC, (clé USB, disque dur externe, etc...) susceptible d avoir été infectés sans les ouvrir

# Double clic sur le raccourci UsbFix présent sur ton bureau .

# Choisi l option 1 ( Recherche )

# Laisse travailler l outil.

# Ensuite post le rapport UsbFix.txt qui apparaitra.

# Note : Le rapport UsbFix.txt est sauvegardé a la racine du disque. ( C:\UsbFix.txt )

( CTRL+A Pour tout selectionner , CTRL+C pour copier et CTRL+V pour coller )

# Note : "Process.exe", une composante de l'outil, est détecté par certains antivirus (AntiVir, Dr.Web, Kaspersky Anti-Virus) comme étant un RiskTool.
Il ne s'agit pas d'un virus, mais d'un utilitaire destiné à mettre fin à des processus.
Mis entre de mauvaises mains, cet utilitaire pourrait arrêter des logiciels de sécurité (Antivirus, Firewall...) d'où l'alerte émise par ces antivirus.

0

Vous n’avez pas trouvé la réponse que vous recherchez ?

Posez votre question
Utilisateur anonyme
 
Slt,

Desolé du delais :)

1/ Telechargement :

# Télécharge Malwarebytes' Anti-Malware

NOTE : S'il te manque COMCTL32.OCX alors télécharge le --> comctl32.ocx

2/ Installation et mise a jour :

# Installe MBAM en double-cliquant sur Mbam-setup.exe ,il se mettra a jour automatiquement.

# Une fois a jour, le programme va se lancer. Clique sur l'onglet Paramètre, et coche la case : "Arrêter internet explorer pendant la suppression".

3/ Recherche :

# Clique a présent sur l'onglet Recherche et coche la case : "exécuter un examen complet".

# Clique ensuite sur "rechercher".

Laisse-le scanner ton PC ...

4/ Suppression :

# Si des éléments on été trouvés ~> Clique sur "Supprimer la selection".

# Si le programme te demande de redemarrer ~> Clique sur "yes".

# A la fin, un rapport va s'ouvrir dans le Bloc-notes ~> Sauvegarde le de manière a le retrouver pour le poster sur le forum.

# Copie (Ctrl + C) et colle (Ctrl + V) le rapport dans ton prochain message stp.

PS : Les rapports sont aussi classés par date et heure du scan dans l'onglet Rapport/Log

Données : Un tutoriel de chez Malekal est disponible ~>

https://www.malekal.com/tutoriel-malwarebyte-anti-malware/

__________________________________

Telecharge et install UsbFix de C_XX & Chiquitine29

Branche tes sources de données externes à ton PC, (clé USB, disque dur externe, etc...) susceptible d avoir été infectés sans les ouvrir

# Double clic sur le raccourci UsbFix présent sur ton bureau .

# Choisi l option 1 ( Recherche )

# Laisse travailler l outil.

# Ensuite post le rapport UsbFix.txt qui apparaitra.

# Note : Le rapport UsbFix.txt est sauvegardé a la racine du disque. ( C:\UsbFix.txt )

( CTRL+A Pour tout selectionner , CTRL+C pour copier et CTRL+V pour coller )

# Note : "Process.exe", une composante de l'outil, est détecté par certains antivirus (AntiVir, Dr.Web, Kaspersky Anti-Virus) comme étant un RiskTool.
Il ne s'agit pas d'un virus, mais d'un utilitaire destiné à mettre fin à des processus.
Mis entre de mauvaises mains, cet utilitaire pourrait arrêter des logiciels de sécurité (Antivirus, Firewall...) d'où l'alerte émise par ces antivirus.

0
leticon Messages postés 6 Statut Membre 1
 
merci beaucoup j'essaye et je te dis quoi ...
j'avais oublier de te dire j'ai des applications (.exe) qui ont disparue je sais pas si c'est un virus ou alors si c'est mon anti-virus qui l'est a supprimer lors d'une analyse ...
0
Utilisateur anonyme
 
hé bien dis moi ! ca a fait du menage !!

Par contre j'ai peur d'une chose, c'est que soit attaqué par un Virut ! (Virut= formatage dans 90% des cas)

--------------------------------------
Télécharge sur ton bureau Dr.Web CureIt
https://free.drweb.com/
- Lance Dr.Web CureIt :
- Clique sur <Analyse> puis sur <Ok> à l'invite de l'analyse rapide.
Le scan va analyser les processus chargés en mémoire. S'il trouve des infections clique sur le bouton <Oui> à chaque propositions.
NB : une fenêtre s'ouvrira avec options pour "Commander" ou "50% de réduction". Quitte en cliquant le <X>.
- Une fois le scan rapide achevé, clique sur <Menu Options> puis choisis <Changer la configuration>. Choisis l'onglet <Scanner>, décoche <Analyse heuristique> puis clique sur <Ok>.
- De retour à la fenêtre principale, clique pour activer <Analyse complète> puis sur le bouton avec la flèche verte => le scan débute alors.
- Lorsque qu'un fichier est détecté, clique sur <Oui> pour tout à l'invite <Désinfecter ?> puis sur <Désinfecter>.
- Lorsque le scan sera terminé, regarde si tu peux cliquer sur cet icône adjacent aux fichiers détectés. Si oui, alors clique dessus et ensuite clique sur l'icône <Suivant> au dessous, et choisis <Déplacer en quarantaine l'objet indésirable>.
- En haut à gauche du menu principal de l'outil, clique sur le menu <Fichier> et choisis <Enregistrer le rapport>.
- Sauvegarde le rapport dans le dossier de ton bureau créé au début de la manip. Il se nomme : DrWeb.csv
- Ferme Dr.Web Cureit.
- Redémarre ton PC (c'est très important car certains fichiers peuvent être déplacés/réparés au redémarrage.
- Après redémarrage copie/colle le rapport Dr. Web sur le forum.

Si Virut est detecté (il y a de grande chances vu ton rapport MBAM), tu sauvegarderas tes données sur un cd ou disque dur externe sauf les .exe et les fichiers compressés ! Je te le redirais de toute facon.

0