Crypt trojan est le nom général pour les virus de Troie avec Crypt comme une partie du nom . Ces chevaux de Troie sont capables de se connecter à Internet et télécharger des programmes malveillants sur leur propre . Le logiciel espion téléchargé peut voler vos informations sensibles privé et contribuer à l'usurpation d'identité . Crypt est également un cheval de Troie , ce qui signifie qu'il permet la connexion à distance à votre ordinateur par des pirates. Cela peut entraîner des informations volées , e-mails non autorisés effectués depuis votre boîte de réception et endommager l'ordinateur . Retirer immédiatement Crypt si elle est détectée . Instructions
End System Processus
1
presse \\ "Ctrl \\" \\ "Shift \\" et \\ " ESC \\ " touches en même temps pour démarrer Windows Gestionnaire de tâches.
2
Cliquez sur le \\ " Processus \\" onglet , appuyez sur \\ "Ctrl \\" et sélectionnez \\ " wtemp32.exe \\" et \\ " nouvelle . exe \\ " les processus du système .
3
Cliquez sur le \\ " Terminer le processus "bouton \\ et fermez le Gestionnaire des tâches.
supprimer des entrées de registre
4
Aller à la "Démarrer \\" \\ menu et cliquez sur \\ "Exécuter \\".
5
type \\ "regedit \\" et cliquez sur \\ " OK \\ " pour lancer l'éditeur de registre
6
Recherchez et supprimer les entrées de registre suivantes: .
HKEY_CLASSES_ROOT \\ \\ SymantecFilterCheck
HKEY_CLASSES_ROOT \\ \\ CLSID \\ \\ { E3C1BC70 - 1607- 43BD - A055 - ACB4BF8DBA88 }
HKEY_CLASSES_ROOT \\ \\ NewBopoMediumPop.PopBopo
HKEY_CLASSES_ROOT \\ \\ NexiAdPopup.DILogc
; HKEY_CLASSES_ROOT \\ \\ NexiAdPopup.DILogc.1
HKEY_CLASSES_ROOT \\ \\ NexkAdPopup.DKLogc
HKEY_CLASSES_ROOT \\ \\ NexkAdPopup.DKLogc.1 < br /> HKEY_LOCAL_MACHINE \\ \\ SYSTEM \\ \\ CurrentControlSet \\ \\ Services \\ \\ skyxpserver
HKEY_LOCAL_MACHINE \\ \\ SYSTEM \\ \\ CurrentControlSet \\ \\ Services \\ \\ lixrfy
HKEY_LOCAL_MACHINE \\ \\ SYSTEM \\ \\ CurrentControlSet \\ \\ Services \\ \\ Abel
HKEY_LOCAL_MACHINE \\ \\ SYSTEM \\ \\ CurrentControlSet \\ \\ Services \\ \\ enqueue
HKEY_CLASSES_ROOT \\ \\ CLSID \\ \\ { 75EA2845 - EAD5 - 486E - A339 - 59FED49289A6 }
HKEY_CLASSES_ROOT \\ \\ CLSID \\ \\ { C80F2C34 - B4A7 - 4F23 - A99E - D55DB29DC30D }
HKEY_CLASSES_ROOT \\ \\ Interface \\ \\ { 3C563030 - 29aa - 496A - 85F9 - 2A91F3A7D203 }
HKEY_CLASSES_ROOT \\ \\ TypeLib \\ \\ { 9B74BBC9 - 9516 - 4C06 - 9A9B - 4594386F429D }
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ 60c2551e
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ Winlogon \\ \\ Notify \\ \\ pmnnNfCV
HKEY_LOCAL_MACHINE \\ \\ SYSTEM \\ \\ CurrentControlSet \\ \\ Services \\ \\ undzg
HKEY_CLASSES_ROOT \\ \\ CLSID \\ \\ { 3229DFCD - 3EAF -4712 - ED45 - 4876FEDC170C }
; HKEY_CLASSES_ROOT \\ \\ CLSID \\ \\ { 1CBD78E7 - DEF4 - 49F2 - 9B35 - 33130D278FFe }
HKEY_CLASSES_ROOT \\ \\ CLSID \\ \\ { 3440A80C - 343C - 47A9 - A316 - D2421DE313E1 }
HKEY_CLASSES_ROOT \\ \\ CLSID \\ \\ { 52B1DFC7 - AAC - 4362 - B103- 868B0683C697 }
HKEY_CLASSES_ROOT \\ \\ CLSID \\ \\ { a04c370e - 0f0a - 4cc0 - A898 - 145d19cb5136 }
HKEY_CLASSES_ROOT \\ \\ CLSID \\ \\ { CF46BFB3 - 2ACC - 441b - B82B - 36B9562C7FF1 }
HKEY_CLASSES_ROOT \\ \\ CLSID \\ \\ { e5c5fe36 - 0f5a - 4368 - 9a77 - be6f882a915e }
HKEY_CLASSES_ROOT \\ \\ MSEvents.MSEvents
HKEY_CLASSES_ROOT \\ \\ MSEvents.MSEvents.1 < br /> HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ Winlogon \\ \\ Notify \\ \\ gebcy
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ Winlogon \\ \\ Prévenez \\ \\ geedc
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Explorer \\ \\ Browser Helper Objects \\ \\ { 1CBD78E7 - DEF4 - 49F2 - 9B35 - 33130D278FFe }
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Explorer \\ \\ Browser Helper Objects \\ \\ { 3440A80C - 343C - 47A9 - A316 - D2421DE313E1 }
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ Explorer \\ \\ \\ Browser Helper Objects \\ \\ { 52B1DFC7 - AAC - 4362 - B103- 868B0683C697 }
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ Explorer \\ \\ \\ Browser Helper Objects \\ \\ { a04c370e - 0f0a - 4cc0 - A898 - 145d19cb5136 }
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Explorer \\ \\ Browser Helper Objects \\ \\ { CF46BFB3 - 2ACC - 441b - B82B - 36B9562C7FF1 }
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Explorer \\ \\ Browser Helper Objects \\ \\ { e5c5fe36 - 0f5a - 4368 - 9a77 - be6f882a915e }
HKEY_CLASSES_ROOT \\ \\ CLSID \\ \\ { bfbc1a78 - cddd -1672 - 876e - 324d6c4686e9 }
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ Winlogon \\ \\ Notify \\ \\ __c007C212
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ Winlogon \\ \\ Notify \\ \\ __c00E2400
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ Winlogon \\ \\ Notify \\ \\ __c00F26F
HKLM \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Run Microsoft Updates wtemp32.exe
HKLM \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ RunServices Microsoft Mises à jour wtemp32.exe
HKCU \\ \\ Software \\ \\ Microsoft \\ \\ OLE Microsoft Updates wtemp32.exe
HKLM \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Ole EnableDCOMN
HKLM \\ \\ SYSTEM \\ \\ CurrentControlSet \\ \\ Control \\ \\ Lsa restrictanonymous 1
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Run @ ^ cfmpgzwd.exe < br /> HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Run @ ^ 3572
7
Répétez la même pour:
< br /> HKEY_LOCAL_MACHINE \\ \\ SYSTEM \\ \\ CurrentControlSet \\ \\ Control \\ \\ Session Manager @ ^ ^ = ^ PendingFileRenameOperations \\ \\ \\ \\ C : ? ? \\ \\ Program Files \\ \\ foobar2000 \\ \\ components \\ \\ foo_ui_yqllyrics.dll < br /> HKEY_LOCAL_MACHINE \\ \\ SYSTEM \\ \\ CurrentControlSet \\ \\ Control \\ \\ session Manager @ ^ ^ = ^ PendingFileRenameOperations \\ \\ \\ \\ C: ? ? \\ \\ Program Files \\ \\ The KMPlayer \\ \\ plugins \\ \\ gen_yqllyrics.dll < br /> HKEY_LOCAL_MACHINE \\ \\ SYSTEM \\ \\ CurrentControlSet \\ \\ Control \\ \\ session Manager @ ^ ^ = ^ PendingFileRenameOperations \\ \\ \\ \\ C: ? ? \\ \\ Program Files \\ \\ The KMPlayer \\ \\ plugins \\ \\ vis_yqllyrics.dll < br /> HKEY_LOCAL_MACHINE \\ \\ SYSTEM \\ \\ CurrentControlSet \\ \\ Control \\ \\ session Manager @ ^ ^ = ^ PendingFileRenameOperations \\ \\ \\ \\ C: ? \\ \\ Program Files \\ \\ Yiqilai \\ \\ Temp \\ \\ foo_ui_yqllyrics.dll
HKEY_LOCAL_MACHINE \\ \\ SYSTEM \\ \\ CurrentControlSet \\ \\ Control \\ \\ session Manager @ ^ ^ = ^ PendingFileRenameOperations \\ \\ \\ \\ C: ? \\ \\ Program Files \\ \\ Yiqilai \\ \\ Temp \\ \\ gen_yqllyrics.dll
HKEY_LOCAL_MACHINE \\ \\ SYSTEM \\ \\ CurrentControlSet \\ \\ Control \\ \\ session Manager @ ^ ^ = ^ PendingFileRenameOperations \\ \\ \\ \\ C: ? \\ \\ Program Files \\ \\ Yiqilai \\ \\ Temp \\ \\ vis_yqllyrics.dll
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ SvcHost @ ^ lixrfy
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Policies \\ \\ Explorer \\ \\ Run @ ^ victoire aggior < br /> HKEY_CURRENT_USER \\ \\ Software \\ \\ \\ \\ \\ \\ CurrentVersion \\ \\ Run @ ^ bibliothèque Framework Module
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ \\ \\ \\ \\ CurrentVersion \\ \\ Run @ ^ bibliothèque Microsoft Windows Microsoft Windows cadre du module < br /> HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Run @ ^ livemgr < br /> HKEY_CURRENT_USER \\ \\ Software \\ \\ Microsoft @ ^ WinID
HKEY_CURRENT_USER \\ \\ Software \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion @ ^ dmdai.exe
HKEY_CURRENT_USER \\ \\ Software \\ \\ Microsoft \\ \\ windows \\ \\ CurrentVersion \\ \\ Run @ ^ MMVA
HKEY_CURRENT_USER \\ \\ Software \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Run @ ^ SysDriver32
HKEY_CURRENT_USER \\ \\ Software \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Run @ ^ service Windows Run
HKEY_CURRENT_USER \\ \\ Software \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Run @ ^ \\ \\ VIE2.exe
HKEY_CURRENT_USER \\ \\ Software \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ RunOnce @ ^ système
HKEY_CURRENT_USER \\ \\ Software \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ RunOnce @ ^ système Run
HKEY_CURRENT_USER \\ \\ Software \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ RunOnce @ ^ Mise à jour système
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ 360rpt.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ 360safe.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ 360safebox.EXE @ ^ ^ débogueur = ^ C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ 360tray.EXE @ ^ ^ ^ débogueur = C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ ANTIARP.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ ArSwp . EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ Ast.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution options \\ \\ autorun.exe @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image file Execution Options \\ \\ AutoRunKiller.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ AvMonitor.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ AVP.COM @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ avp.exe @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ CCenter.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
8
Enlevez ces entrées :
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ FrameworkService.exe @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ GFUpd.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ GuardField.EXE @ ^ ^ = ^ débogueur C : \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ HijackThis.exe @ ^ ^ = débogueur ^ C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ IceSword.EXE @ ^ débogueur ^ ^ = C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ Iparmor.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ KASARP . EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ kav32.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ CurrentVersion \\ \\ \\ image File Execution Options Le fichier \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image: \\ \\ KAVPFW.EXE @ ^ ^ = ^ débogueur C options d'exécution \\ \\ kavstart.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ kissvc.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ kmailmon.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ KPfwSvc.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ KRegEx.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ KVMonxp.KXP @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ KVSrvXP.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ KVWSC.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ kwatch.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ Mmsk.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe < br /> HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ navapsvc.exe @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe < br /> HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ nod32krn.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv . exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ Nod32kui.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ PFW.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ QQDoctor.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ RAV.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ RavMon.exe @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ RAVMOND.exe @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
9
Enfin, supprimer ces entrées :
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ Ravservice.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ RavStub.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ RavTask.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ RAVTRAY.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ regedit.exe @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
; HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ rfwmain.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe < br /> HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ rfwProxy.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe < , br /> HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ rfwsrv.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv . exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ Rfwstub.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ RsAgent.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ Rsaupd.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ RsMain.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ rsnetsvr.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ RSTray.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ Runiep.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ safeboxTray.EXE @ ^ ^ débogueur = ^ C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ ScanFrm.EXE @ ^ ^ ^ débogueur = C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ SREngLdr.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ TrojanDetector . EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ Trojanwall.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution options \\ \\ TrojDie.KXP @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image file Execution Options \\ \\ Vpc32.exe @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ vptray.exe @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ WOPTILITIES.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe < br /> HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Run @ ^ MSMGS
HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Run @ ^ \\ \\ VIE2.exe < ; br /> HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Run @ ^ Redist32 < br /> HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Run @ ^ u3y5uhnu
HKEY_CURRENT_USER \\ \\ Software \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Run @ ^ A00FCDEFF8.exe < br >
10
Fermez l'éditeur du Registre .
supprimer des fichiers
11
Cliquez sur le menu Démarrer puis cliquez sur \\ " Recherche \\".
12
Cochez la case " \\ Tous les fichiers et dossiers " option \\ et sélectionnez le disque dur dans le menu déroulant.
13 Type
\\ " w32myztic - f.vxe \\ "et appuyez sur \\ " Entrée. \\ " Supprimez tous les résultats de la recherche et de répéter pour \\" install_cong1.exe , \\ "\\" install_conga1.exe , \\ "\\" nouvelle . exe, \\ "\\" install_conga1.exe , \\ "\\" install_cong1.exe \\ "et \\ " wtemp32.exe . \\ "
14
Redémarrez votre ordinateur. Photos