La désinfection ne sera terminée que lorsque je le dirai. Merci de continuer jusqu'au bout, même si les symptômes apparents ont disparu.
Les outils que je te demanderai de télécharger devront être enregistrés sur ton bureau : aide en images
(merci à H.A.W.X).
Tous les rapports devront être joints sur le forum comme mentionné dans ce tutoriel.
Ne suis pas plusieurs procédures de désinfection sur différents forums, au risque d'endommager ton système d'exploitation.
Ne fais rien de ta propre initiative.
Je suis bénévole : je ne pourrai donc pas toujours te répondre de suite.
standardsearch;
drivers-services-list;
installedprogs;
installer-list;
uninstall-list;
torpigcheck;
srinfo;
fakechrprofiles;
hostslook;
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost" /v netsvcs /se "─" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components" /s >> C:\zoek-results.log;b
C:\Windows\System32\drivers\afd.sys;i
C:\Windows\System32\drivers\atapi.sys;i
C:\Windows\System32\drivers\cdfs.sys;i
C:\Windows\System32\drivers\cdrom.sys;i
C:\Windows\System32\drivers\dfsc.sys;i
C:\Windows\System32\drivers\hdaudbus.sys;i
C:\Windows\System32\drivers\i8042prt.sys;i
C:\Windows\System32\drivers\ipnat.sys;i
C:\Windows\System32\drivers\ipsec.sys;i
C:\Windows\System32\drivers\mrxsmb.sys;i
C:\Windows\System32\drivers\netbt.sys;i
C:\Windows\System32\drivers\ntfs.sys;i
C:\Windows\System32\drivers\parport.sys;i
C:\Windows\System32\drivers\rasl2tp.sys;i
C:\Windows\System32\drivers\rdpdr.sys;i
C:\Windows\System32\drivers\smb.sys;i
C:\Windows\System32\drivers\sptd.sys;i
C:\Windows\System32\drivers\tcpip.sys;i
C:\Windows\System32\drivers\tdx.sys;i
C:\Windows\System32\drivers\volsnap.sys;i
C:\Windows\System32\cmd.exe;i
C:\Windows\SysWOW64\cmd.exe;i
C:\Windows\explorer.exe;i
C:\Windows\SysWOW64\explorer.exe;i
C:\Windows\System32\services.exe;i
C:\Windows\SysWOW64\services.exe;i
C:\Windows\System32\svchost.exe;i
C:\Windows\SysWOW64\svchost.exe;i
C:\Windows\System32\userinit.exe;i
C:\Windows\SysWOW64\userinit.exe;i
C:\Windows\System32\wininit.exe;i
C:\Windows\SysWOW64\wininit.exe;i
C:\Windows\System32\winlogon.exe;i
C:\Windows\SysWOW64\winlogon.exe;i
C:\Windows\System32\kernel32.dll;i
C:\Windows\SysWOW64\kernel32.dll;i
C:\Windows\System32\rpcss.dll;i
C:\Windows\SysWOW64\rpcss.dll;i
C:\Windows\System32\user32.dll;i
C:\Windows\SysWOW64\user32.dll;i
%temp%\*.exe;vs
%SYSTEMDRIVE%\*.exe;v
%ALLUSERSPROFILE%\Application Data;v
%ALLUSERSPROFILE%\Application Data\*.exe;vs
%APPDATA%;v
%APPDATA%\*.exe;vs
C:\Windows\system32\consrv.dll;i
%SystemDrive%\$RECYCLE.BIN;vs
%SystemDrive%\RECYCLER;vs
%SystemRoot%\assembly\GAC;v
%SystemRoot%\assembly\GAC_32;v
%SystemRoot%\assembly\GAC_64;v
reg query "HKEY_CURRENT_USER\Software\Classes\clsid\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Classes\Wow6432node\clsid\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Classes\clsid\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Classes\Wow6432node\clsid\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Classes\clsid\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Wow6432Node\Classes\clsid\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Classes\clsid\{5839FCA9-774D-42A1-ACDA-D6A79037F57F}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Wow6432Node\Classes\clsid\{5839FCA9-774D-42A1-ACDA-D6A79037F57F}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Classes\clsid\{F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Wow6432Node\Classes\clsid\{F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1}\InProcServer32" >> C:\zoek-results.log;b
%WINDIR%\pss;v
%LOCALAPPDATA%;v
%LOCALAPPDATA%\Google\Desktop;vs
C:\Program Files\Google\Desktop;vs
C:\Program Files (x86)\Google\Desktop;vs
reg query "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce" >> C:\zoek-results.log;b
%systemroot%\System32\config\*.sav;v
reg query "HKEY_LOCAL_MACHINE\SOFTWARE" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node" >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\SOFTWARE" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet" /s >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Clients\StartMenuInternet" /s >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\SubSystems" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl" /s /f "svchost.exe" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl" /s /f "svchost.exe" >> C:\zoek-results.log;b
reg query "HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main\FeatureControl" /s /f "svchost.exe" >> C:\zoek-results.log;b
reg query "HKEY_USERS\S-1-5-18\Software\Microsoft\Internet Explorer\Main\FeatureControl" /s /f "svchost.exe" >> C:\zoek-results.log;b
reg query "HKEY_USERS\S-1-5-19\Software\Microsoft\Internet Explorer\Main\FeatureControl" /s /f "svchost.exe" >> C:\zoek-results.log;b
reg query "HKEY_USERS\S-1-5-20\Software\Microsoft\Internet Explorer\Main\FeatureControl" /s /f "svchost.exe" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center" /s >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Unknown\shell\openas\command" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules" /f "{*}" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules" /f "TCP Query User" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules" /f "UDP Query User" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters" /v DhcpNameServer >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters" /v NameServer >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces" /s /v DhcpNameServer >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces" /s /v NameServer >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Shell >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify" /s /v DLLName >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Shell >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify" /s /v DLLName >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Shell >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options" /s /v Debugger >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options" /s /v Debugger >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options" /s /v BreakOnDllLoad >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options" /s /v BreakOnDllLoad >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2" /s /f "command" > %LOCALAPPDATA%\Temp\mount.txt;b
for /f %%i in (%LOCALAPPDATA%\Temp\mount.txt) do reg query %%i >> C:\zoek-results.log;b
nslookup www.google.fr >> C:\zoek-results.log;b
dir /AL /S C:\ >> C:\zoek-results.log;b
guugues a écrit:Hello !
Je vais te prendre en charge pour la désinfection, mais d'abord, je vais te demander de prendre connaissance de ces quelques règles :La désinfection ne sera terminée que lorsque je le dirai. Merci de continuer jusqu'au bout, même si les symptômes apparents ont disparu.
Les outils que je te demanderai de télécharger devront être enregistrés sur ton bureau : aide en images
(merci à H.A.W.X).
Tous les rapports devront être joints sur le forum comme mentionné dans ce tutoriel.
Ne suis pas plusieurs procédures de désinfection sur différents forums, au risque d'endommager ton système d'exploitation.
Ne fais rien de ta propre initiative.
Je suis bénévole : je ne pourrai donc pas toujours te répondre de suite.
Zoek – Analyse :Sous Windows Vista/Seven/8, clique droit sur Zoek.exe puis Exécuter en tant qu'administrateur
- Désactive temporairement ton antivirus : aide en images.
- Télécharge Zoek.exe sur ton bureau.
- Ferme toutes les applications en cours, puis lance Zoek.exe.
- Copie le contenu du cadre ci-dessous en cliquant sur Tout sélectionner, clique-droit sur la zone sélectionnée puis choisis Copier :
- Code: Tout sélectionner
standardsearch;
drivers-services-list;
installedprogs;
installer-list;
uninstall-list;
torpigcheck;
srinfo;
fakechrprofiles;
hostslook;
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost" /v netsvcs /se "─" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components" /s >> C:\zoek-results.log;b
C:\Windows\System32\drivers\afd.sys;i
C:\Windows\System32\drivers\atapi.sys;i
C:\Windows\System32\drivers\cdfs.sys;i
C:\Windows\System32\drivers\cdrom.sys;i
C:\Windows\System32\drivers\dfsc.sys;i
C:\Windows\System32\drivers\hdaudbus.sys;i
C:\Windows\System32\drivers\i8042prt.sys;i
C:\Windows\System32\drivers\ipnat.sys;i
C:\Windows\System32\drivers\ipsec.sys;i
C:\Windows\System32\drivers\mrxsmb.sys;i
C:\Windows\System32\drivers\netbt.sys;i
C:\Windows\System32\drivers\ntfs.sys;i
C:\Windows\System32\drivers\parport.sys;i
C:\Windows\System32\drivers\rasl2tp.sys;i
C:\Windows\System32\drivers\rdpdr.sys;i
C:\Windows\System32\drivers\smb.sys;i
C:\Windows\System32\drivers\sptd.sys;i
C:\Windows\System32\drivers\tcpip.sys;i
C:\Windows\System32\drivers\tdx.sys;i
C:\Windows\System32\drivers\volsnap.sys;i
C:\Windows\System32\cmd.exe;i
C:\Windows\SysWOW64\cmd.exe;i
C:\Windows\explorer.exe;i
C:\Windows\SysWOW64\explorer.exe;i
C:\Windows\System32\services.exe;i
C:\Windows\SysWOW64\services.exe;i
C:\Windows\System32\svchost.exe;i
C:\Windows\SysWOW64\svchost.exe;i
C:\Windows\System32\userinit.exe;i
C:\Windows\SysWOW64\userinit.exe;i
C:\Windows\System32\wininit.exe;i
C:\Windows\SysWOW64\wininit.exe;i
C:\Windows\System32\winlogon.exe;i
C:\Windows\SysWOW64\winlogon.exe;i
C:\Windows\System32\kernel32.dll;i
C:\Windows\SysWOW64\kernel32.dll;i
C:\Windows\System32\rpcss.dll;i
C:\Windows\SysWOW64\rpcss.dll;i
C:\Windows\System32\user32.dll;i
C:\Windows\SysWOW64\user32.dll;i
%temp%\*.exe;vs
%SYSTEMDRIVE%\*.exe;v
%ALLUSERSPROFILE%\Application Data;v
%ALLUSERSPROFILE%\Application Data\*.exe;vs
%APPDATA%;v
%APPDATA%\*.exe;vs
C:\Windows\system32\consrv.dll;i
%SystemDrive%\$RECYCLE.BIN;vs
%SystemDrive%\RECYCLER;vs
%SystemRoot%\assembly\GAC;v
%SystemRoot%\assembly\GAC_32;v
%SystemRoot%\assembly\GAC_64;v
reg query "HKEY_CURRENT_USER\Software\Classes\clsid\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Classes\Wow6432node\clsid\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Classes\clsid\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Classes\Wow6432node\clsid\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Classes\clsid\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Wow6432Node\Classes\clsid\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Classes\clsid\{5839FCA9-774D-42A1-ACDA-D6A79037F57F}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Wow6432Node\Classes\clsid\{5839FCA9-774D-42A1-ACDA-D6A79037F57F}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Classes\clsid\{F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1}\InProcServer32" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Wow6432Node\Classes\clsid\{F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1}\InProcServer32" >> C:\zoek-results.log;b
%WINDIR%\pss;v
%LOCALAPPDATA%;v
%LOCALAPPDATA%\Google\Desktop;vs
C:\Program Files\Google\Desktop;vs
C:\Program Files (x86)\Google\Desktop;vs
reg query "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce" >> C:\zoek-results.log;b
%systemroot%\System32\config\*.sav;v
reg query "HKEY_LOCAL_MACHINE\SOFTWARE" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node" >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\SOFTWARE" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet" /s >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Clients\StartMenuInternet" /s >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\SubSystems" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl" /s /f "svchost.exe" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl" /s /f "svchost.exe" >> C:\zoek-results.log;b
reg query "HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main\FeatureControl" /s /f "svchost.exe" >> C:\zoek-results.log;b
reg query "HKEY_USERS\S-1-5-18\Software\Microsoft\Internet Explorer\Main\FeatureControl" /s /f "svchost.exe" >> C:\zoek-results.log;b
reg query "HKEY_USERS\S-1-5-19\Software\Microsoft\Internet Explorer\Main\FeatureControl" /s /f "svchost.exe" >> C:\zoek-results.log;b
reg query "HKEY_USERS\S-1-5-20\Software\Microsoft\Internet Explorer\Main\FeatureControl" /s /f "svchost.exe" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center" /s >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Unknown\shell\openas\command" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules" /f "{*}" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules" /f "TCP Query User" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules" /f "UDP Query User" >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters" /v DhcpNameServer >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters" /v NameServer >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces" /s /v DhcpNameServer >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces" /s /v NameServer >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Shell >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify" /s /v DLLName >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Shell >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify" /s /v DLLName >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Shell >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options" /s /v Debugger >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options" /s /v Debugger >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options" /s /v BreakOnDllLoad >> C:\zoek-results.log;b
reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options" /s /v BreakOnDllLoad >> C:\zoek-results.log;b
reg query "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2" /s /f "command" > %LOCALAPPDATA%\Temp\mount.txt;b
for /f %%i in (%LOCALAPPDATA%\Temp\mount.txt) do reg query %%i >> C:\zoek-results.log;b
nslookup www.google.fr >> C:\zoek-results.log;b
dir /AL /S C:\ >> C:\zoek-results.log;b
- Colle ensuite les lignes précédemment copiées dans la fenêtre de Zoek :
- Puis clique sur le bouton Run Script. Patiente jusqu'à ce que le logiciel se ferme tout seul.
- A la fin du scan, un rapport s'ouvrira : zoek-result.log.
- Celui-ci est disponible ici : C:\zoek-result.log.
- Joins ce rapport dans ta prochaine réponse en suivant ce tutoriel.
-------------------------------------------
Est attendu le rapport de Zoek.
peut étre que mon pc n'est pas totalement infécté ce n'est pas grave ?
il ny a pas de risque si je fait la procédure quand même ?
Utilisateurs parcourant ce forum: Google Adsense [Bot] et 18 invités
.: Nous contacter :: Flux RSS :: Données personnelles :. |