Crypt trojan est le nom général pour les virus de Troie avec Crypt comme une partie du nom . Ces chevaux de Troie sont capables de se connecter à Internet et télécharger des programmes malveillants sur leur propre . Le logiciel espion téléchargé peut voler vos informations sensibles privé et contribuer à l'usurpation d'identité . Crypt est également un cheval de Troie , ce qui signifie qu'il permet la connexion à distance à votre ordinateur par des pirates. Cela peut entraîner des informations volées , e-mails non autorisés effectués depuis votre boîte de réception et endommager l'ordinateur . Retirer immédiatement Crypt si elle est détectée . Instructions End System Processus 1 presse \\ "Ctrl \\" \\ "Shift \\" et \\ " ESC \\ " touches en même temps pour démarrer Windows Gestionnaire de tâches. 2 Cliquez sur le \\ " Processus \\" onglet , appuyez sur \\ "Ctrl \\" et sélectionnez \\ " wtemp32.exe \\" et \\ " nouvelle . exe \\ " les processus du système . 3 Cliquez sur le \\ " Terminer le processus "bouton \\ et fermez le Gestionnaire des tâches. supprimer des entrées de registre 4 Aller à la "Démarrer \\" \\ menu et cliquez sur \\ "Exécuter \\". 5 type \\ "regedit \\" et cliquez sur \\ " OK \\ " pour lancer l'éditeur de registre 6 Recherchez et supprimer les entrées de registre suivantes: . HKEY_CLASSES_ROOT \\ \\ SymantecFilterCheck HKEY_CLASSES_ROOT \\ \\ CLSID \\ \\ { E3C1BC70 - 1607- 43BD - A055 - ACB4BF8DBA88 } HKEY_CLASSES_ROOT \\ \\ NewBopoMediumPop.PopBopo HKEY_CLASSES_ROOT \\ \\ NexiAdPopup.DILogc ; HKEY_CLASSES_ROOT \\ \\ NexiAdPopup.DILogc.1 HKEY_CLASSES_ROOT \\ \\ NexkAdPopup.DKLogc HKEY_CLASSES_ROOT \\ \\ NexkAdPopup.DKLogc.1 < br /> HKEY_LOCAL_MACHINE \\ \\ SYSTEM \\ \\ CurrentControlSet \\ \\ Services \\ \\ skyxpserver HKEY_LOCAL_MACHINE \\ \\ SYSTEM \\ \\ CurrentControlSet \\ \\ Services \\ \\ lixrfy HKEY_LOCAL_MACHINE \\ \\ SYSTEM \\ \\ CurrentControlSet \\ \\ Services \\ \\ Abel HKEY_LOCAL_MACHINE \\ \\ SYSTEM \\ \\ CurrentControlSet \\ \\ Services \\ \\ enqueue HKEY_CLASSES_ROOT \\ \\ CLSID \\ \\ { 75EA2845 - EAD5 - 486E - A339 - 59FED49289A6 } HKEY_CLASSES_ROOT \\ \\ CLSID \\ \\ { C80F2C34 - B4A7 - 4F23 - A99E - D55DB29DC30D } HKEY_CLASSES_ROOT \\ \\ Interface \\ \\ { 3C563030 - 29aa - 496A - 85F9 - 2A91F3A7D203 } HKEY_CLASSES_ROOT \\ \\ TypeLib \\ \\ { 9B74BBC9 - 9516 - 4C06 - 9A9B - 4594386F429D } HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ 60c2551e HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ Winlogon \\ \\ Notify \\ \\ pmnnNfCV HKEY_LOCAL_MACHINE \\ \\ SYSTEM \\ \\ CurrentControlSet \\ \\ Services \\ \\ undzg HKEY_CLASSES_ROOT \\ \\ CLSID \\ \\ { 3229DFCD - 3EAF -4712 - ED45 - 4876FEDC170C } ; HKEY_CLASSES_ROOT \\ \\ CLSID \\ \\ { 1CBD78E7 - DEF4 - 49F2 - 9B35 - 33130D278FFe } HKEY_CLASSES_ROOT \\ \\ CLSID \\ \\ { 3440A80C - 343C - 47A9 - A316 - D2421DE313E1 } HKEY_CLASSES_ROOT \\ \\ CLSID \\ \\ { 52B1DFC7 - AAC - 4362 - B103- 868B0683C697 } HKEY_CLASSES_ROOT \\ \\ CLSID \\ \\ { a04c370e - 0f0a - 4cc0 - A898 - 145d19cb5136 } HKEY_CLASSES_ROOT \\ \\ CLSID \\ \\ { CF46BFB3 - 2ACC - 441b - B82B - 36B9562C7FF1 } HKEY_CLASSES_ROOT \\ \\ CLSID \\ \\ { e5c5fe36 - 0f5a - 4368 - 9a77 - be6f882a915e } HKEY_CLASSES_ROOT \\ \\ MSEvents.MSEvents HKEY_CLASSES_ROOT \\ \\ MSEvents.MSEvents.1 < br /> HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ Winlogon \\ \\ Notify \\ \\ gebcy HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ Winlogon \\ \\ Prévenez \\ \\ geedc HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Explorer \\ \\ Browser Helper Objects \\ \\ { 1CBD78E7 - DEF4 - 49F2 - 9B35 - 33130D278FFe } HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Explorer \\ \\ Browser Helper Objects \\ \\ { 3440A80C - 343C - 47A9 - A316 - D2421DE313E1 } HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ Explorer \\ \\ \\ Browser Helper Objects \\ \\ { 52B1DFC7 - AAC - 4362 - B103- 868B0683C697 } HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ Explorer \\ \\ \\ Browser Helper Objects \\ \\ { a04c370e - 0f0a - 4cc0 - A898 - 145d19cb5136 } HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Explorer \\ \\ Browser Helper Objects \\ \\ { CF46BFB3 - 2ACC - 441b - B82B - 36B9562C7FF1 } HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Explorer \\ \\ Browser Helper Objects \\ \\ { e5c5fe36 - 0f5a - 4368 - 9a77 - be6f882a915e } HKEY_CLASSES_ROOT \\ \\ CLSID \\ \\ { bfbc1a78 - cddd -1672 - 876e - 324d6c4686e9 } HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ Winlogon \\ \\ Notify \\ \\ __c007C212 HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ Winlogon \\ \\ Notify \\ \\ __c00E2400 HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ Winlogon \\ \\ Notify \\ \\ __c00F26F HKLM \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Run Microsoft Updates wtemp32.exe HKLM \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ RunServices Microsoft Mises à jour wtemp32.exe HKCU \\ \\ Software \\ \\ Microsoft \\ \\ OLE Microsoft Updates wtemp32.exe HKLM \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Ole EnableDCOMN HKLM \\ \\ SYSTEM \\ \\ CurrentControlSet \\ \\ Control \\ \\ Lsa restrictanonymous 1 HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Run @ ^ cfmpgzwd.exe < br /> HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Run @ ^ 3572 7 Répétez la même pour: < br /> HKEY_LOCAL_MACHINE \\ \\ SYSTEM \\ \\ CurrentControlSet \\ \\ Control \\ \\ Session Manager @ ^ ^ = ^ PendingFileRenameOperations \\ \\ \\ \\ C : ? ? \\ \\ Program Files \\ \\ foobar2000 \\ \\ components \\ \\ foo_ui_yqllyrics.dll < br /> HKEY_LOCAL_MACHINE \\ \\ SYSTEM \\ \\ CurrentControlSet \\ \\ Control \\ \\ session Manager @ ^ ^ = ^ PendingFileRenameOperations \\ \\ \\ \\ C: ? ? \\ \\ Program Files \\ \\ The KMPlayer \\ \\ plugins \\ \\ gen_yqllyrics.dll < br /> HKEY_LOCAL_MACHINE \\ \\ SYSTEM \\ \\ CurrentControlSet \\ \\ Control \\ \\ session Manager @ ^ ^ = ^ PendingFileRenameOperations \\ \\ \\ \\ C: ? ? \\ \\ Program Files \\ \\ The KMPlayer \\ \\ plugins \\ \\ vis_yqllyrics.dll < br /> HKEY_LOCAL_MACHINE \\ \\ SYSTEM \\ \\ CurrentControlSet \\ \\ Control \\ \\ session Manager @ ^ ^ = ^ PendingFileRenameOperations \\ \\ \\ \\ C: ? \\ \\ Program Files \\ \\ Yiqilai \\ \\ Temp \\ \\ foo_ui_yqllyrics.dll HKEY_LOCAL_MACHINE \\ \\ SYSTEM \\ \\ CurrentControlSet \\ \\ Control \\ \\ session Manager @ ^ ^ = ^ PendingFileRenameOperations \\ \\ \\ \\ C: ? \\ \\ Program Files \\ \\ Yiqilai \\ \\ Temp \\ \\ gen_yqllyrics.dll HKEY_LOCAL_MACHINE \\ \\ SYSTEM \\ \\ CurrentControlSet \\ \\ Control \\ \\ session Manager @ ^ ^ = ^ PendingFileRenameOperations \\ \\ \\ \\ C: ? \\ \\ Program Files \\ \\ Yiqilai \\ \\ Temp \\ \\ vis_yqllyrics.dll HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ SvcHost @ ^ lixrfy HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Policies \\ \\ Explorer \\ \\ Run @ ^ victoire aggior < br /> HKEY_CURRENT_USER \\ \\ Software \\ \\ \\ \\ \\ \\ CurrentVersion \\ \\ Run @ ^ bibliothèque Framework Module HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ \\ \\ \\ \\ CurrentVersion \\ \\ Run @ ^ bibliothèque Microsoft Windows Microsoft Windows cadre du module < br /> HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Run @ ^ livemgr < br /> HKEY_CURRENT_USER \\ \\ Software \\ \\ Microsoft @ ^ WinID HKEY_CURRENT_USER \\ \\ Software \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion @ ^ dmdai.exe HKEY_CURRENT_USER \\ \\ Software \\ \\ Microsoft \\ \\ windows \\ \\ CurrentVersion \\ \\ Run @ ^ MMVA HKEY_CURRENT_USER \\ \\ Software \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Run @ ^ SysDriver32 HKEY_CURRENT_USER \\ \\ Software \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Run @ ^ service Windows Run HKEY_CURRENT_USER \\ \\ Software \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Run @ ^ \\ \\ VIE2.exe HKEY_CURRENT_USER \\ \\ Software \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ RunOnce @ ^ système HKEY_CURRENT_USER \\ \\ Software \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ RunOnce @ ^ système Run HKEY_CURRENT_USER \\ \\ Software \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ RunOnce @ ^ Mise à jour système HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ 360rpt.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ 360safe.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ 360safebox.EXE @ ^ ^ débogueur = ^ C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ 360tray.EXE @ ^ ^ ^ débogueur = C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ ANTIARP.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ ArSwp . EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ Ast.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution options \\ \\ autorun.exe @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image file Execution Options \\ \\ AutoRunKiller.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ AvMonitor.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ AVP.COM @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ avp.exe @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ CCenter.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe 8 Enlevez ces entrées : HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ FrameworkService.exe @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ GFUpd.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ GuardField.EXE @ ^ ^ = ^ débogueur C : \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ HijackThis.exe @ ^ ^ = débogueur ^ C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ IceSword.EXE @ ^ débogueur ^ ^ = C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ Iparmor.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ KASARP . EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ kav32.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ CurrentVersion \\ \\ \\ image File Execution Options Le fichier \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image: \\ \\ KAVPFW.EXE @ ^ ^ = ^ débogueur C options d'exécution \\ \\ kavstart.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ kissvc.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ kmailmon.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ KPfwSvc.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ KRegEx.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ KVMonxp.KXP @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ KVSrvXP.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ KVWSC.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ kwatch.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ Mmsk.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe < br /> HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ navapsvc.exe @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe < br /> HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ nod32krn.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv . exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ Nod32kui.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ PFW.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ QQDoctor.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ RAV.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ RavMon.exe @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ RAVMOND.exe @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe 9 Enfin, supprimer ces entrées : HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ Ravservice.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ RavStub.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ RavTask.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ RAVTRAY.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ regedit.exe @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe ; HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ rfwmain.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe < br /> HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ rfwProxy.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe < , br /> HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ rfwsrv.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv . exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ Rfwstub.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ RsAgent.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ Rsaupd.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ RsMain.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ rsnetsvr.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ RSTray.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ Runiep.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ safeboxTray.EXE @ ^ ^ débogueur = ^ C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ ScanFrm.EXE @ ^ ^ ^ débogueur = C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ SREngLdr.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ TrojanDetector . EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ Trojanwall.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution options \\ \\ TrojDie.KXP @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image file Execution Options \\ \\ Vpc32.exe @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ vptray.exe @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows NT \\ \\ CurrentVersion \\ \\ image File Execution Options \\ \\ WOPTILITIES.EXE @ ^ ^ = ^ débogueur C: \\ \\ WINDOWS \\ \\ system32 \\ \\ dllcache \\ \\ spoolsv.exe < br /> HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Run @ ^ MSMGS HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Run @ ^ \\ \\ VIE2.exe < ; br /> HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Run @ ^ Redist32 < br /> HKEY_LOCAL_MACHINE \\ \\ SOFTWARE \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Run @ ^ u3y5uhnu HKEY_CURRENT_USER \\ \\ Software \\ \\ Microsoft \\ \\ Windows \\ \\ CurrentVersion \\ \\ Run @ ^ A00FCDEFF8.exe < br > 10 Fermez l'éditeur du Registre . supprimer des fichiers 11 Cliquez sur le menu Démarrer puis cliquez sur \\ " Recherche \\". 12 Cochez la case " \\ Tous les fichiers et dossiers " option \\ et sélectionnez le disque dur dans le menu déroulant. 13 Type \\ " w32myztic - f.vxe \\ "et appuyez sur \\ " Entrée. \\ " Supprimez tous les résultats de la recherche et de répéter pour \\" install_cong1.exe , \\ "\\" install_conga1.exe , \\ "\\" nouvelle . exe, \\ "\\" install_conga1.exe , \\ "\\" install_cong1.exe \\ "et \\ " wtemp32.exe . \\ " 14 Redémarrez votre ordinateur. Photos
|