Formatage

spomino -  
 Utilisateur anonyme -
Bonjour,
alors voila je pense que mon ordi est infecté et je voudrais formater l'ordinateur je voudrais savoir que faire des fichiers que je veux garder. Les mettre sur un périphérique? OK mais n'y a t-il pas un danger que les virus subsistent via ce périphérique ? Merci de m'éclairer
A voir également:

39 réponses

Utilisateur anonyme
 
non a la fin du scan il crée un fichier sur le bureau qu il faut envoyer au créateur du logiciel pour l aider a développer son programme mais tu ne ma pas mis le rapport de usbfix option 2

il se trouve ici comme je te lai déjà dis Note : le rapport UsbFix.txt est sauvegardé à la racine du disque (C:\UsbFix.txt).

tu a bien fais option 2 ?
0
spomino
 
ben oui j'ai taper 2 (sa doit etre suppression je crois) ou alors tu voulais celle a la droite du 1er alors c'est listing c'est ca ?
0
spomino
 
sinon dans C:\Usbfix.txt j'ai :

############################## | UsbFix V6.094 |

User : lucas (Administrateurs) # DUGNY
Update on 14/02/2010 by El Desaparecido , C_XX & Chimay8
Start at: 14:57:26 | 14/02/2010
Website : http://pagesperso-orange.fr/NosTools/index.html
Contact : FindyKill.Contact@gmail.com

AMD Athlon(tm) 64 Processor 3200+
Microsoft Windows XP Édition familiale (5.1.2600 32-bit) # Service Pack 3
Internet Explorer 8.0.6001.18702
Windows Firewall Status : Enabled
AV : Avira AntiVir PersonalEdition 7.0.2.117
[ Enabled | Updated ]

A:\ -> Lecteur de disquettes 3 ½ pouces
C:\ -> Disque fixe local # 152,66 Go (25,88 Go free) # NTFS
D:\ -> Disque CD-ROM # 7,05 Go (0 Mo free) [3282_26451] # UDF
E:\ -> Disque CD-ROM
F:\ -> Disque amovible # 960,72 Mo (596,64 Mo free) [USB DISK] # FAT
G:\ -> Disque amovible # 7,4 Go (4,57 Go free) [IPOD (QUENT] # FAT32

############################## | Processus actifs |

C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\SYSTEM32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\SYSTEM32\logonui.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Fichiers communs\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Application Updater\ApplicationUpdater.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\system32\userinit.exe
C:\Program Files\Google\Update\GoogleUpdate.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\wbem\wmiprvse.exe

################## | Elements infectieux |

Supprimé ! C:\Program Files\Dot1XCfg
Supprimé ! C:\Program Files\Temporary
Supprimé ! C:\regxpcom.exe
Supprimé ! C:\temp.txt
Supprimé ! C:\Recycler\S-1-5-21-1644491937-1715567821-839522115-1005
Supprimé ! C:\Recycler\S-1-5-21-1644491937-1715567821-839522115-1006
Supprimé ! C:\Recycler\S-1-5-21-507921405-2077806209-839522115-1004
Supprimé ! C:\Recycler\S-1-5-21-507921405-2077806209-839522115-1005
Supprimé ! C:\Recycler\S-1-5-21-507921405-2077806209-839522115-1006
Supprimé ! C:\Recycler\S-1-5-21-507921405-2077806209-839522115-1007
Supprimé ! C:\Recycler\S-1-5-21-507921405-2077806209-839522115-500
Supprimé ! G:\.\Recycler\svchost.exe

################## | Registre |

Supprimé ! [HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SSHNAS]
Supprimé ! [HKLM\SYSTEM\ControlSet003\Enum\Root\LEGACY_SSHNAS]

################## | Mountpoints2 |

Supprimé ! HKCU\...\Explorer\MountPoints2\{cce0815e-0c20-11df-9f2c-0018f3028254}\Shell\AutoRun\Command
Supprimé ! HKCU\...\Explorer\MountPoints2\{f1ca36b0-13f9-11df-9f3e-0018f3028254}\Shell\AutoRun\Command

################## | Listing des fichiers présent |

[15/02/2008 18:12|--a------|197] C:\ASWL2K.ini
[18/01/2006 16:17|--a------|0] C:\AUTOEXEC.BAT
[15/02/2008 18:38|---hs----|216] C:\boot.ini
[05/08/2004 13:00|-rahs----|4952] C:\Bootfont.bin
[18/01/2006 16:17|--a------|0] C:\CONFIG.SYS
[24/01/2010 17:01|--a------|366] C:\DelSysReg.log
[11/06/2009 21:52|--a------|119] C:\dgindex.bat
[18/01/2006 16:17|-rahs----|0] C:\IO.SYS
[28/11/2009 19:12|--a------|26] C:\Last Formats.azl
[28/11/2009 19:11|--a------|0] C:\Last List.azl
[04/04/2009 10:20|--a------|45724] C:\MP4debug.log
[11/06/2009 21:49|--a------|3977] C:\mpeg.txt
[18/01/2006 16:17|-rahs----|0] C:\MSDOS.SYS
[11/06/2009 21:56|--a------|136] C:\muxmp4.bat
[05/08/2004 13:00|-rahs----|47564] C:\NTDETECT.COM
[22/09/2008 17:21|-rahs----|252240] C:\ntldr
[29/02/2004 16:44|--a------|52576] C:\orange.bmp
[?|?|?] C:\pagefile.sys
[11/02/2008 18:22|--a------|184] C:\Setup.log
[08/02/2008 18:42|--a------|629] C:\SMax.log
[17/01/2008 18:07|--ahs----|4096] C:\Thumbs.db
[14/02/2010 15:05|--a------|4022] C:\UsbFix.txt
[18/11/2009 18:34|--a------|1348] F:\Nostale.lnk
[16/01/2010 10:55|--a------|137398872] F:\HaloTrial (2).exe
[01/01/2000 03:34|---------|0] G:\.metadata_never_index
[02/11/2009 20:45|--a------|3020] G:\BOOTEX.LOG

################## | Vaccination |

# C:\autorun.inf -> Dossier créé par UsbFix .
# F:\autorun.inf -> Dossier créé par UsbFix .
# G:\autorun.inf -> Dossier créé par UsbFix .

################## | Upload |

Veuillez envoyer le fichier : C:\UsbFix_Upload_Me_DUGNY.zip : https://www.ionos.fr/?affiliate_id=77097
Merci pour votre contribution .
0
Utilisateur anonyme
 
? jai pas compris ? MOI je veux le rapport usbfix option 2

est fais le reste de la manip comme demandé
0

Vous n’avez pas trouvé la réponse que vous recherchez ?

Posez votre question
Utilisateur anonyme
 
tu q envoyer le fichier qui il y a sur ton bureau a cette adresse https://www.ionos.fr/?affiliate_id=77097
0
spomino
 
dans comptes d'utilisateur je ne trouve pas l'option que tu me demandes d'activer ou desactiver je sais plus sinon j'ai recommencer l'option 2 de usb fix
0
spomino
 
je suis sous XP ...
0
Utilisateur anonyme
 
NON ces pas la peine de recommancer usbfix

tu est bien sous vista ?

dans compte d utilisateur tu a une case a décoche si tu trouve pas utilise le lien que je tai donné tous est expliquer en image

fais ad remover et le reste
0
spomino
 
ad remover terminé,je rappelle je suis sous XP:
.
======= RAPPORT D'AD-REMOVER 1.1.4.6_J | UNIQUEMENT XP/VISTA/7 =======
.
Mis à jour par C_XX le 05.02.2010 à 17:34
Contact: AdRemover.contact@gmail.com
Site web: http://pagesperso-orange.fr/NosTools/ad_remover.html
.
Lancé à: 16:35:59, 14/02/2010 | Mode Normal | Option: CLEAN
Exécuté de: C:\Ad-Remover\
Système d'exploitation: Microsoft® Windows XP™ Service Pack 3 v5.1.2600
Nom du PC: DUGNY | Utilisateur actuel: lucas
.
============== ÉLÉMENT(S) NEUTRALISÉ(S) ==============
.
Service: *Application Updater*

C:\DOCUME~1\lucas\MENUDM~1\PROGRA~1\PlayMP3z
C:\Program Files\Application Updater
C:\Program Files\Dealio Toolbar
C:\Program Files\EoRezo
C:\Program Files\FBrowserAdvisor
C:\Program Files\FBrowsingAdvisor
C:\Program Files\pdfforge Toolbar
C:\Program Files\PlayMP3z
C:\Program Files\Search Settings
C:\Program Files\Viewpoint
C:\DOCUME~1\lucas\APPLIC~1\EoRezo
C:\DOCUME~1\lucas\APPLIC~1\ItsLabel
C:\DOCUME~1\lucas\APPLIC~1\pdfforge
C:\DOCUME~1\lucas\APPLIC~1\Search Settings
C:\Windows\Installer\793ce.msi
C:\Windows\Installer\793f1.msi
C:\Windows\Installer\7940b.msi
C:\WINDOWS\system32\config\systemprofile\Application Data\Application Updater
C:\Documents and Settings\quentin\Application Data\Dealio
C:\Documents and Settings\laurent\Application Data\Dealio
C:\Documents and Settings\quentin\Application Data\pdfforge
C:\Documents and Settings\laurent\Application Data\pdfforge
C:\Documents and Settings\quentin\Application Data\Search Settings
C:\Documents and Settings\laurent\Application Data\Search Settings

(!) -- Fichiers temporaires supprimés.

.
HKCU\software\EoRezo
HKCU\software\FBrowsingAdvisor
HKCU\software\ItsLabel
HKCU\software\MediaHoldings
HKCU\Software\Microsoft\Internet Explorer\LowRegistry\Search Settings
HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\\{9A9C9B68-F908-4AAB-8D0C-10EA8997F37E}
HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks\\{E312764E-7706-43F1-8DAB-FCDD2B1E416D}
HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{64F56FC1-1272-44CD-BA6E-39723696E350}
HKCU\software\Mirar
HKCU\software\pdfforge
HKCU\software\PlayMP3
HKCU\software\Search Settings
HKLM\software\Application Updater
HKLM\Software\Classes\CLSID\{01398B87-61AF-4FFB-9AB5-1A1C5FB39A9C}
HKLM\Software\Classes\CLSID\{64F56FC1-1272-44CD-BA6E-39723696E350}
HKLM\Software\Classes\CLSID\{B922D405-6D13-4A2B-AE89-08A030DA4402}
HKLM\Software\Classes\CLSID\{E312764E-7706-43F1-8DAB-FCDD2B1E416D}
HKLM\software\classes\EoRezoBHO.EoBho
HKLM\software\classes\EoRezoBHO.EoBho.1
HKLM\software\classes\installer\Products\96DC878CBD58B624183A7E1157AABE19
HKLM\Software\Classes\Interface\{1037B06C-84B7-4240-8D80-485810A0497D}
HKLM\Software\Classes\Interface\{4A6B3860-FF3F-47A6-A21D-EFE9E56FB1E4}
HKLM\Software\Classes\Interface\{54B287F9-FD90-4457-B65E-CB91560C021D}
HKLM\Software\Classes\Interface\{6CB9A28B-1D90-F2BA-4DA7-D0630293AC69}
HKLM\Software\Classes\Interface\{6E4C7AFC-9915-4036-B7F9-8B3F1710788F}
HKLM\Software\Classes\Interface\{B0D071A1-36B3-4757-A126-14C89C56013A}
HKLM\Software\Classes\Interface\{F9DD1CE0-8153-F9BE-FFA9-F351EC261D60}
HKLM\Software\Classes\TypeLib\{B4C656C9-F2E9-4E77-B3F4-443DF2BD778F}
HKLM\software\Dealio
HKLM\software\EoRezo
HKLM\software\ItsLabel
HKLM\Software\Microsoft\Internet Explorer\Toolbar\\{01398B87-61AF-4FFB-9AB5-1A1C5FB39A9C}
HKLM\Software\Microsoft\Internet Explorer\Toolbar\\{B922D405-6D13-4A2B-AE89-08A030DA4402}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{01398B87-61AF-4FFB-9AB5-1A1C5FB39A9C}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{64F56FC1-1272-44CD-BA6E-39723696E350}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B922D405-6D13-4A2B-AE89-08A030DA4402}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E312764E-7706-43F1-8DAB-FCDD2B1E416D}
HKLM\software\microsoft\windows\currentversion\installer\userdata\S-1-5-18\Components\0292226F570267D459357AF78015E534
HKLM\software\microsoft\windows\currentversion\installer\userdata\S-1-5-18\Components\03285961954D5824C85975D955031EE8
HKLM\software\microsoft\windows\currentversion\installer\userdata\S-1-5-18\Components\23A03A6765D10864EB278629A2DF32C3
HKLM\software\microsoft\windows\currentversion\installer\userdata\S-1-5-18\Components\377026901A2D8744A8423A983B50E0D1
HKLM\software\microsoft\windows\currentversion\installer\userdata\S-1-5-18\Components\3A4FCCE032CA50340A6975C92410AE30
HKLM\software\microsoft\windows\currentversion\installer\userdata\S-1-5-18\Components\6AC3985F4D64C2245A96D31569D1BF40
HKLM\software\microsoft\windows\currentversion\installer\userdata\S-1-5-18\Components\6E00D9B24354FBA44AE2CA0FA86EF2E2
HKLM\software\microsoft\windows\currentversion\installer\userdata\S-1-5-18\Components\76DA9915C36F3D742951F63351CF5C97
HKLM\software\microsoft\windows\currentversion\installer\userdata\S-1-5-18\Components\7C13F41728A69EF41AA1A3372FB86FA6
HKLM\software\microsoft\windows\currentversion\installer\userdata\S-1-5-18\Components\855847FA0E25FBA46B8516389DFDD4B3
HKLM\software\microsoft\windows\currentversion\installer\userdata\S-1-5-18\Components\9B0B0584E80456A4FB98DA3973B1EB3F
HKLM\software\microsoft\windows\currentversion\installer\userdata\S-1-5-18\Components\9DC2844D0E3E8924C8973C3B3BAE1F58
HKLM\software\microsoft\windows\currentversion\installer\userdata\S-1-5-18\Components\A89F1E0FE544529429C8BF82FE74CE39
HKLM\software\microsoft\windows\currentversion\installer\userdata\S-1-5-18\Components\AFEB575AA30ACB243B748619F62F0782
HKLM\software\microsoft\windows\currentversion\installer\userdata\S-1-5-18\Components\B278DBFACA5AB424DA79915F3A109F9A
HKLM\software\microsoft\windows\currentversion\installer\userdata\S-1-5-18\Components\B3B348F18694F1949B4D6BD9507F2886
HKLM\software\microsoft\windows\currentversion\installer\userdata\S-1-5-18\Components\B92A2929968AED344BD6B34AD60E6604
HKLM\software\microsoft\windows\currentversion\installer\userdata\S-1-5-18\Components\C9667115F6A9CE340B31B63B680FF26F
HKLM\software\microsoft\windows\currentversion\installer\userdata\S-1-5-18\Components\E48E3A6D380B2EC4ABCEB3BA048D767F
HKLM\software\microsoft\windows\currentversion\installer\userdata\S-1-5-18\Components\EFB70E89C3D6D354596520DE424F89D6
HKLM\software\microsoft\windows\currentversion\installer\userdata\S-1-5-18\Components\F461B8DD96FF5AA41A52D14E1D7B69C7
HKLM\software\microsoft\windows\currentversion\installer\userdata\S-1-5-18\Components\F49A213B5069AC348994D03F81B56C19
HKLM\software\microsoft\windows\currentversion\installer\userdata\S-1-5-18\Components\F715D253BF28D554C9C0F60ABA8585CF
HKLM\software\microsoft\windows\currentversion\installer\userdata\S-1-5-18\Products\96DC878CBD58B624183A7E1157AABE19
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\\SearchSettings
HKLM\software\microsoft\windows\currentversion\uninstall\{C878CD69-85DB-426B-81A3-E71175AAEB91}
HKLM\software\microsoft\windows\currentversion\uninstall\FBrowsingAdvisor_is1
HKLM\software\microsoft\windows\currentversion\uninstall\PlayMP3
HKLM\software\pdfforge
HKLM\software\Search Settings
.
============== Scan additionnel ==============
.
.
* Internet Explorer Version 8.0.6001.18702 *
.
[HKEY_CURRENT_USER\..\Internet Explorer\Main]
.
Do404Search: 01000000
Local Page: C:\WINDOWS\system32\blank.htm
Show_ToolBar: yes
Enable Browser Extensions: yes
Start Page: hxxp://fr.msn.com/
Default_search_url: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Default_page_url: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
Search bar: hxxp://go.microsoft.com/fwlink/?linkid=54896
.
[HKEY_LOCAL_MACHINE\..\Internet Explorer\Main]
.
Default_Page_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
Default_Search_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Search Page: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Delete_Temp_Files_On_Exit: yes
Local Page: C:\WINDOWS\system32\blank.htm
Start Page: hxxp://fr.msn.com/
Search bar: hxxp://search.msn.com/spbasic.htm
.
[HKEY_LOCAL_MACHINE\..\Internet Explorer\ABOUTURLS]
.
Tabs: res://ieframe.dll/tabswelcome.htm
.
============== Suspect (Cracks, Serials, ...) ==============
.
C:\Documents and Settings\lucas\Local Settings\Temp\apatch.exe
.
===================================
.
8488 Octet(s) - C:\Ad-Report-CLEAN[1].log
.
2800 Fichier(s) - C:\DOCUME~1\lucas\LOCALS~1\Temp
121 Fichier(s) - C:\WINDOWS\Temp
10 Fichier(s) - C:\WINDOWS\Prefetch
.
16 Fichier(s) - C:\Ad-Remover\BACKUP
101 Fichier(s) - C:\Ad-Remover\QUARANTINE
.
Fin à: 16:43:14 | 14/02/2010 - CLEAN[1]
.
============== E.O.F ==============
.
0
Utilisateur anonyme
 
Téléchargez MalwareByte's Anti-Malware

http://www.malwarebytes.org/mbam/program/mbam-setup.exe

. Enregistres le sur le bureau
. Double cliques sur le fichier téléchargé pour lancer le processus d'installation.
. Dans l'onglet "mise à jour", cliques sur le bouton Recherche de mise à jour
. Si le pare-feu demande l'autorisation de se connecter pour malwarebytes, accepte
. Une fois la mise à jour terminé
. Rend-toi dans l'onglet, Recherche
. Sélectionnes Exécuter un examen complet (examen assez long)
. Cliques sur Rechercher
. Le scan démarre.
. A la fin de l'analyse, un message s'affiche : L'examen s'est terminé normalement. Cliquez sur 'Afficher les résultats' pour afficher tous les objets trouvés.
. Cliques sur Ok pour poursuivre.
. Si des malwares ont été détectés, clique sur Afficher les résultats
. Sélectionnes tout (ou laisses cochés) et cliques sur Supprimer la sélection Malwarebytes va détruire les fichiers et clés de registre et en mettre une copie dans la quarantaine.
. Malwarebytes va ouvrir le bloc-notes et y copier le rapport d'analyse.
. Rends toi dans l'onglet rapport/log
. Tu cliques dessus pour l'afficher, une fois affiché
. Tu cliques sur edition en haut du boc notes, et puis sur sélectionner tous
. Tu recliques sur edition et puis sur copier et tu reviens sur le forum et dans ta réponse
. tu cliques droit dans le cadre de la reponse et coller

Si tu as besoin d'aide regarde ces tutoriels :
Aide: https://www.malekal.com/tutoriel-malwarebyte-anti-malware/
http://www.infos-du-net.com/forum/278396-11-tuto-malwarebytes-anti-malware-mbam
0
spomino
 
est-on en train de nettoyer l'ordinateur complet ? ce qui m'arrangerait et simplifierait bien tout ou juste mes peripheriques usb ou le tout (PC + periph)
je vais lancer malware
0
Utilisateur anonyme
 
ben le PC et les support car si ton ordi est infecter a chaque fois que tu branche a ton pc ta clé usb elle va être réinfecter par le virus qui se trouve sur ton pc
0
spomino
 
est-ce que, apres ces operations, j'aurai besoin de formater mon ordinateur car en realiter je voulais le formater juste pour me debarasser des virus
0
Utilisateur anonyme
 
pour info certain virus résiste a un formatage simple comme je pense tu a fais

en plus si tu branche tes clé usb infecter sur ton ordi sain qui viens être formater tu réinfecte ton PC comme tu viens de le faire

SI TU peux formater tous les jours aucun problème je te laisse mais sinon suis mes conseil
0
spomino
 
je te fait confiance a 100% je veux absoluement me debarasser de ces trucs
comment ca j'ai reinfecter le PC ?
je n'ai pas deco reco de periph depuis que j'ai commencer les manips
sinon niveau scan j'ai mit a scanner tout les lecteurs(les periphs aussi) j'en suis a 18 fichiers infectés
0
Utilisateur anonyme
 
ben tu ma dis que tu venais de formater ton pc he ben voila y a plein de virus car tu a été réinfecter par tes clé usb
0
spomino
 
tu as mal compris je ne l'ai pas formaté
si ce netoyage suffit ce sera cool
0
spomino
 
Malwarebytes' Anti-Malware 1.44
Version de la base de données: 3738
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

14/02/2010 20:30:35
mbam-log-2010-02-14 (20-30-35).txt

Type de recherche: Examen complet (A:\|C:\|D:\|E:\|F:\|G:\|)
Eléments examinés: 429959
Temps écoulé: 3 hour(s), 31 minute(s), 26 second(s)

Processus mémoire infecté(s): 1
Module(s) mémoire infecté(s): 3
Clé(s) du Registre infectée(s): 16
Valeur(s) du Registre infectée(s): 1
Elément(s) de données du Registre infecté(s): 2
Dossier(s) infecté(s): 10
Fichier(s) infecté(s): 123

Processus mémoire infecté(s):
C:\WINDOWS\system\svchost.exe (Backdoor.Bot) -> Unloaded process successfully.

Module(s) mémoire infecté(s):
C:\WINDOWS\system32\csseqchk32.dll (Trojan.Tracur) -> Delete on reboot.
C:\WINDOWS\system32\2C.tmp (Trojan.Tracur) -> Delete on reboot.
C:\WINDOWS\system32\d3d932.dll (Trojan.Agent) -> Delete on reboot.

Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00df6602-934f-44d4-9359-3aee0fc6d866} (Trojan.BHO.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{00df6602-934f-44d4-9359-3aee0fc6d866} (Trojan.BHO.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0113eb94-cac8-4716-967d-66c64b2d87c6} (Trojan.BHO.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{0113eb94-cac8-4716-967d-66c64b2d87c6} (Trojan.BHO.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{01243811-ca46-43f3-b63f-37c45396b56f} (Trojan.BHO.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{01243811-ca46-43f3-b63f-37c45396b56f} (Trojan.BHO.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\d05b0ddf700 (Trojan.Tracur) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{9a9c9b68-f908-4aab-8d0c-10ea8997f37e} (Adware.Mirar) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{566dede9-9ed8-45da-9be6-9b2eeab17f49} (Adware.Mirar) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{9a9c9b68-f908-4aab-8d0c-10ea8997f37e} (Adware.Mirar) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{9a9c9b69-f908-4aab-8d0c-10ea8997f37e} (Adware.Mirar) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00df6602-934f-44d4-9359-3aee0fc6d866} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{0113eb94-cac8-4716-967d-66c64b2d87c6} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{01243811-ca46-43f3-b63f-37c45396b56f} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\.fsharproj (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PCenter (Rogue.PrivacyCenter) -> Quarantined and deleted successfully.

Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\phime2002a (Backdoor.Bot) -> Quarantined and deleted successfully.

Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Tracur) -> Data: c:\windows\system32\csseqchk32.dll -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Tracur) -> Data: system32\csseqchk32.dll -> Delete on reboot.

Dossier(s) infecté(s):
C:\Documents and Settings\Utilisateur\Application Data\wsnpoem (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\véronique\Application Data\wsnpoem (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\akl (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Program Files\amsys (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Program Files\p2pnetworks (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Program Files\WinPerformance (Rogue.WinPerformance) -> Quarantined and deleted successfully.
C:\Program Files\WinPerformance\registry_backup (Rogue.WinPerformance) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\acespy (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\PerfInfo (Rogue.WinPerformance) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32 (Worm.Archive) -> Quarantined and deleted successfully.

Fichier(s) infecté(s):
C:\WINDOWS\system32\d3d932.dll (Trojan.BHO.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\csseqchk32.dll (Trojan.Tracur) -> Delete on reboot.
C:\WINDOWS\system32\2C.tmp (Trojan.Tracur) -> Delete on reboot.
C:\System Volume Information\_restore{866E0948-B53A-4159-9780-675C96EBE68E}\RP527\A0069011.exe (Keylogger.Logixoft) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{866E0948-B53A-4159-9780-675C96EBE68E}\RP533\A0070417.exe (Adware.Mirar) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{866E0948-B53A-4159-9780-675C96EBE68E}\RP582\A0094889.dll (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{866E0948-B53A-4159-9780-675C96EBE68E}\RP584\A0099043.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{866E0948-B53A-4159-9780-675C96EBE68E}\RP584\A0099044.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{866E0948-B53A-4159-9780-675C96EBE68E}\RP584\A0099045.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{866E0948-B53A-4159-9780-675C96EBE68E}\RP587\A0102290.dll (Adware.PLayMP3z) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{866E0948-B53A-4159-9780-675C96EBE68E}\RP587\A0102298.exe (Adware.PLayMP3z) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{866E0948-B53A-4159-9780-675C96EBE68E}\RP587\A0102343.exe (Rogue.PClean) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{866E0948-B53A-4159-9780-675C96EBE68E}\RP587\A0102344.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{866E0948-B53A-4159-9780-675C96EBE68E}\RP587\A0102346.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{866E0948-B53A-4159-9780-675C96EBE68E}\RP543\A0076893.exe (Rogue.PClean) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{866E0948-B53A-4159-9780-675C96EBE68E}\RP543\A0076894.exe (Rogue.PrivacyCenter) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{866E0948-B53A-4159-9780-675C96EBE68E}\RP543\A0076896.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\RECYCLER\S-1-5-21-1644491937-1715567821-839522115-1005.UsbFix\Dc366.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\RECYCLER\S-1-5-21-507921405-2077806209-839522115-1005.UsbFix\Dc255.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\RECYCLER\S-1-5-21-507921405-2077806209-839522115-1005.UsbFix\Dc295.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\RECYCLER\S-1-5-21-507921405-2077806209-839522115-1005.UsbFix\Dc334.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\RECYCLER\S-1-5-21-507921405-2077806209-839522115-1005.UsbFix\Dc343.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\RECYCLER\S-1-5-21-507921405-2077806209-839522115-1005.UsbFix\Dc377.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\RECYCLER\S-1-5-21-507921405-2077806209-839522115-1005.UsbFix\Dc415.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\RECYCLER\S-1-5-21-507921405-2077806209-839522115-1005.UsbFix\Dc462.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\RECYCLER\S-1-5-21-507921405-2077806209-839522115-1005.UsbFix\Dc463.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\RECYCLER\S-1-5-21-507921405-2077806209-839522115-1005.UsbFix\Dc507.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\RECYCLER\S-1-5-21-507921405-2077806209-839522115-1005.UsbFix\Dc524.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\RECYCLER\S-1-5-21-507921405-2077806209-839522115-1005.UsbFix\Dc578.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\RECYCLER\S-1-5-21-507921405-2077806209-839522115-1005.UsbFix\Dc594.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\RECYCLER\S-1-5-21-507921405-2077806209-839522115-1005.UsbFix\Dc637.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\RECYCLER\S-1-5-21-507921405-2077806209-839522115-1005.UsbFix\Dc656.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\RECYCLER\S-1-5-21-507921405-2077806209-839522115-1005.UsbFix\Dc675.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\RECYCLER\S-1-5-21-507921405-2077806209-839522115-1005.UsbFix\Dc682.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\RECYCLER\S-1-5-21-507921405-2077806209-839522115-1005.UsbFix\Dc685.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\RECYCLER\S-1-5-21-507921405-2077806209-839522115-1005.UsbFix\Dc699.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\RECYCLER\S-1-5-21-507921405-2077806209-839522115-1005.UsbFix\Dc739.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\RECYCLER\S-1-5-21-507921405-2077806209-839522115-1005.UsbFix\Dc680.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\RECYCLER\S-1-5-21-507921405-2077806209-839522115-1005.UsbFix\Dc902.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\1.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\1C.tmp (Trojan.Tracur) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\2.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\23.tmp (Trojan.Tracur) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\nenejiyo.dll.tmp (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\BA.tmp (Trojan.Tracur) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jagenoki.dll.tmp (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jajagedu.dll.tmp (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\3.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\4.tmp (Trojan.Tracur) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\5.tmp (Trojan.Tracur) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\68.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\WinNB58.dll (Adware.Mirar) -> Quarantined and deleted successfully.
C:\Ad-Remover\QUARANTINE\PROGRA~1\FBROWS~2\XPCOMEvents.dll.vir (Adware.PLayMP3z) -> Quarantined and deleted successfully.
C:\Ad-Remover\QUARANTINE\PROGRA~1\PlayMP3z\PlayMP3.exe.vir (Adware.PLayMP3z) -> Quarantined and deleted successfully.
C:\Documents and Settings\laurent\Local Settings\Temp\c.exe (Trojan.Fraudpack) -> Quarantined and deleted successfully.
C:\Documents and Settings\laurent\Local Settings\Temp\g.exe (Trojan.Fraudpack) -> Quarantined and deleted successfully.
C:\Documents and Settings\laurent\Local Settings\Temp\sshnas.dll (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\quentin\Local Settings\Temp\6.tmp (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\sphinx lucas\Local Settings\Temporary Internet Files\Content.IE5\CCDW3WA8\lsegihwln[1].txt (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\sphinx lucas\Local Settings\Temporary Internet Files\Content.IE5\CCDW3WA8\lsegihwln[2].txt (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\sphinx lucas\Local Settings\Temporary Internet Files\Content.IE5\JD7Y9097\cprdshtvt[1].htm (Backdoor.Sinowal) -> Quarantined and deleted successfully.
C:\Documents and Settings\sphinx lucas\Local Settings\Temporary Internet Files\Content.IE5\JD7Y9097\cprdshtvt[2].htm (Backdoor.Sinowal) -> Quarantined and deleted successfully.
C:\Documents and Settings\sphinx lucas\Local Settings\Temporary Internet Files\Content.IE5\RJ152F70\addy[1].exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\sphinx lucas\Local Settings\Temporary Internet Files\Content.IE5\RJ152F70\lsegihwln[1].txt (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\Utilisateur\Application Data\wsnpoem\audio.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Utilisateur\Application Data\wsnpoem\video.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\véronique\Application Data\wsnpoem\audio.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\véronique\Application Data\wsnpoem\video.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\akl\akl.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Program Files\akl\akl.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Program Files\akl\curlog.htm (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Program Files\akl\keylog.txt (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Program Files\akl\readme.txt (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Program Files\akl\uninstall.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Program Files\akl\unsetup.dat (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Program Files\akl\unsetup.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Program Files\amsys\awmsg.dat (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Program Files\amsys\mfc42.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Program Files\amsys\msvcrt.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Program Files\amsys\unins000.dat (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Program Files\amsys\unis000.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Program Files\amsys\winam.dat (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Program Files\p2pnetworks\amp2pl.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Program Files\WinPerformance\uninstall.exe (Rogue.WinPerformance) -> Quarantined and deleted successfully.
C:\Program Files\WinPerformance\registry_backup\2008.01.25 15.57.17.rb (Rogue.WinPerformance) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\@i167860101v4 (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\@i167860101v6 (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\@i167860101v7 (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\@u167860101v0 (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\@u167860101v1 (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\@u167860101v2 (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\@u167860101v3 (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\@u167860101v5 (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\mi167860101v4 (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\mi167860101v4.kwd (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\mi167860101v6 (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\mi167860101v6.kwd (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\mi167860101v7 (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\mi167860101v7.kwd (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\mu167860101v5 (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\mu167860101v5.kwd (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\wu167860101v0 (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\wu167860101v0.kwd (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\wu167860101v1 (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\wu167860101v1.kwd (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\wu167860101v2 (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\wu167860101v2.kwd (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\wu167860101v3 (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\wu167860101v3.kwd (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\_i167860101v4 (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\_i167860101v6 (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\_i167860101v7 (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\_u167860101v0 (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\_u167860101v1 (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\_u167860101v2 (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\_u167860101v3 (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysWoW32\_u167860101v5 (Worm.Archive) -> Quarantined and deleted successfully.
C:\Documents and Settings\Utilisateur\Application Data\ntos.exe (Trojan.Proxy) -> Quarantined and deleted successfully.
C:\Documents and Settings\véronique\Application Data\ntos.exe (Trojan.Proxy) -> Quarantined and deleted successfully.
C:\WINDOWS\GnuHashes.ini (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system\svchost.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\Documents and Settings\laurent\Local Settings\Temp\a.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\laurent\Local Settings\Temp\b.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
0
Utilisateur anonyme
 
putain assez infecter mais si tu compte formater ensuite on va juste faire sa

▶ Téléchargez Dr.Web CureIt! sur ton Bureau :
ftp://ftp.drweb.com/pub/drweb/cureit/drweb-cureit.exe

▶ Double-cliquez sur drweb-cureit.exe et cliquez sur Commencer le scan.
▶ Ce scan rapide permet l'analyse des processus chargés en mémoire; s'il trouve des processus infectés, cliquez sur le bouton Oui pour Tout à l'invite.
▶ Lorsque le scan rapide est terminé, cliquez sur Options > Changer la configuration.
▶ Choisissez l'onglet Scanner, et décochez Analyse heuristique.
▶ De retour à la fenêtre principale : choisissez Analyse complète.
▶ Cliquez la flèche verte sur la droite et le scan débutera. Une publicité apparaît quelquefois, fermez-la.
▶ Cliquez Oui pour Tout si un fichier est détecté.
▶ A la fin du scan, si des infections sont trouvées, cliquez sur Tout sélectionner, puis sur Désinfecter. Si la désinfection est impossible, cliquez sur Quarantaine.
▶ Au menu principal de l'outil, en haut à gauche, cliquez sur le menu Fichier et choisissez Enregistrer le rapport.
▶ Sauvegardez le rapport sur votre Bureau. Ce dernier se nommera DrWeb.csv.
▶ Fermez Dr.Web CureIt!
▶ Redémarrez votre ordinateur (très important) car certains fichiers peuvent être déplacés/réparés au redémarrage.
▶ Postez (Copiez/Collez) le contenu du rapport de l'outil Dr.Web dans un bloc note

Ensuite :

▶ Rendez-vous à cette adresse d'hébergement gratuit : http://www.cijoint.fr/
▶ Cliquez sur parcourir, chercher rapport DrWeb.txt puis sur cliquez ici pour déposer le fichier
▶ Une fois le lien crée, faite un clique droit dessus et copier l'adresse du lien pour venir le coller dans votre réponse
0