ce matin j'ai essayée spyhunter
La désinfection ne sera terminée que lorsque je le dirai. Merci de continuer jusqu'au bout, même si les symptômes apparents ont disparu.
Les outils que je te demanderai de télécharger devront être enregistrés sur ton bureau (là où se trouve la Corbeille)
Tous les rapports devront être joints sur le forum comme mentionné dans ce tutoriel.
Ne suis pas plusieurs procédures de désinfection sur différents forums, au risque d'endommager ton système d'exploitation.
Ne fais rien de ta propre initiative.
Je suis bénévole : je ne pourrai donc pas toujours te répondre de suite.
standardsearch;
drivers-services-list;
installedprogs;
installer-list;
uninstall-list;
torpigcheck;
fakechrprofiles;
hostslook;
srinfo;
C:\Windows\System32\drivers\afd.sys;i
C:\Windows\System32\drivers\atapi.sys;i
C:\Windows\System32\drivers\cdfs.sys;i
C:\Windows\System32\drivers\cdrom.sys;i
C:\Windows\System32\drivers\dfsc.sys;i
C:\Windows\System32\drivers\hdaudbus.sys;i
C:\Windows\System32\drivers\i8042prt.sys;i
C:\Windows\System32\drivers\ipnat.sys;i
C:\Windows\System32\drivers\ipsec.sys;i
C:\Windows\System32\drivers\mrxsmb.sys;i
C:\Windows\System32\drivers\netbt.sys;i
C:\Windows\System32\drivers\ntfs.sys;i
C:\Windows\System32\drivers\parport.sys;i
C:\Windows\System32\drivers\rasl2tp.sys;i
C:\Windows\System32\drivers\rdpdr.sys;i
C:\Windows\System32\drivers\smb.sys;i
C:\Windows\System32\drivers\sptd.sys;i
C:\Windows\System32\drivers\tcpip.sys;i
C:\Windows\System32\drivers\tdx.sys;i
C:\Windows\System32\drivers\volsnap.sys;i
C:\Windows\System32\cmd.exe;i
C:\Windows\SysWOW64\cmd.exe;i
C:\Windows\explorer.exe;i
C:\Windows\SysWOW64\explorer.exe;i
C:\Windows\System32\services.exe;i
C:\Windows\SysWOW64\services.exe;i
C:\Windows\System32\svchost.exe;i
C:\Windows\SysWOW64\svchost.exe;i
C:\Windows\System32\userinit.exe;i
C:\Windows\SysWOW64\userinit.exe;i
C:\Windows\System32\wininit.exe;i
C:\Windows\SysWOW64\wininit.exe;i
C:\Windows\System32\winlogon.exe;i
C:\Windows\SysWOW64\winlogon.exe;i
C:\Windows\System32\kernel32.dll;i
C:\Windows\SysWOW64\kernel32.dll;i
C:\Windows\System32\rpcss.dll;i
C:\Windows\SysWOW64\rpcss.dll;i
C:\Windows\System32\user32.dll;i
C:\Windows\SysWOW64\user32.dll;i
C:\Windows\system32\consrv.dll;i
%temp%\*.exe;vs
%SYSTEMDRIVE%\*.exe;v
%ALLUSERSPROFILE%\Application Data;v
%ALLUSERSPROFILE%\Application Data\*.exe;vs
%APPDATA%;v
%APPDATA%\*.exe;vs
%SystemRoot%\assembly\GAC;v
%SystemRoot%\assembly\GAC_32;v
%SystemRoot%\assembly\GAC_64;v
%WINDIR%\pss;v
%LOCALAPPDATA%;v
%LOCALAPPDATA%\Google\Desktop;vs
C:\Program Files\Google\Desktop;vs
C:\Program Files (x86)\Google\Desktop;vs
dir /AL /S C:\ >> C:\zoek-results.log;b
nslookup www.google.fr >> C:\zoek-results.log;b
assoc .exe >> C:\zoek-results.log;b
ftype exefile >> C:\zoek-results.log;b
assoc .bat >> C:\zoek-results.log;b
ftype batfile >> C:\zoek-results.log;b
assoc .cmd >> C:\zoek-results.log;b
ftype cmdfile >> C:\zoek-results.log;b
assoc .com >> C:\zoek-results.log;b
ftype comfile >> C:\zoek-results.log;b
assoc .scr >> C:\zoek-results.log;b
ftype scrfile >> C:\zoek-results.log;b
assoc .reg >> C:\zoek-results.log;b
ftype regfile >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree" > %LOCALAPPDATA%\Temp\tasks.txt;b
for /f "delims=" %%i in (%LOCALAPPDATA%\Temp\tasks.txt) do (reg query "%%i" /v Id) >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost" /v netsvcs /se "─" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32" >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Classes\clsid\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Classes\Wow6432node\clsid\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Classes\clsid\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Classes\Wow6432node\clsid\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Classes\clsid\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Wow6432Node\Classes\clsid\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Classes\clsid\{5839FCA9-774D-42A1-ACDA-D6A79037F57F}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Wow6432Node\Classes\clsid\{5839FCA9-774D-42A1-ACDA-D6A79037F57F}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Classes\clsid\{F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Wow6432Node\Classes\clsid\{F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v AutoConfigProxy >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v EnableHttp1_1 >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v MigrateProxy >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyEnable >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyHttp1.1 >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyOverride >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyServer >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v AutoConfigProxy >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v EnableHttp1_1 >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v MigrateProxy >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyEnable >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyHttp1.1 >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyOverride >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyServer >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node" >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\SOFTWARE" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet" /s >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Clients\StartMenuInternet" /s >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\SubSystems" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl" /s /f "svchost.exe" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl" /s /f "svchost.exe" >> C:\zoek-results.log;b
reg query "HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main\FeatureControl" /s /f "svchost.exe" >> C:\zoek-results.log;b
reg query "HKEY_USERS\S-1-5-18\Software\Microsoft\Internet Explorer\Main\FeatureControl" /s /f "svchost.exe" >> C:\zoek-results.log;b
reg query "HKEY_USERS\S-1-5-19\Software\Microsoft\Internet Explorer\Main\FeatureControl" /s /f "svchost.exe" >> C:\zoek-results.log;b
reg query "HKEY_USERS\S-1-5-20\Software\Microsoft\Internet Explorer\Main\FeatureControl" /s /f "svchost.exe" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center" /s >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Unknown\shell\openas\command" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules" /f "{*}" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules" /f "TCP Query User" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules" /f "UDP Query User" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters" /v DhcpNameServer >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters" /v NameServer >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces" /s /v DhcpNameServer >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces" /s /v NameServer >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Shell >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify" /s /v DLLName >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Shell >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify" /s /v DLLName >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Shell >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options" /s /v Debugger >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options" /s /v Debugger >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options" /s /v BreakOnDllLoad >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options" /s /v BreakOnDllLoad >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2" /s /f "command" > %LOCALAPPDATA%\Temp\mount.txt;b
for /f %%i in (%LOCALAPPDATA%\Temp\mount.txt) do reg query %%i >> C:\zoek-results.log;b
Ne suis pas plusieurs procédures de désinfection sur différents forums, au risque d'endommager ton système d'exploitation.
Utilisateurs parcourant ce forum: Aucun utilisateur enregistré et 29 invités
.: Nous contacter :: Flux RSS :: Données personnelles :. |