OVH Cloud OVH Cloud

Agobot

3 réponses
Avatar
Zbrissglass
Bonjour
Je suis infecté par un ver Agobot
coment le supprimer de mon système ?
Merci
Zb


begin 666 Zbrissglass.vcf
M0D5'24XZ5D-!4D0-"E9%4E-)3TXZ,BXQ#0I..CM:8G)I<W-G;&%S<PT*1DXZ
M6F)R:7-S9VQA<W,-"D5-04E,.U!2148[24Y415).150Z9'5C:&UO;&Q <F5K
H82YC;VT-"E)%5CHR,# T,#DQ,50P.3$W-#A:#0I%3D0Z5D-!4D0-"@``
`
end

3 réponses

Avatar
Jceel
Bonjour ...Zbrissglass qui nous as a dit
* Bonjour
* Je suis infecté par un ver Agobot
* coment le supprimer de mon système ?
* Merci


www.secuser.com




--
@++++Jceel - MVP Win, I E, Media Player

En vérité je te le dis mais sous O E
internaute indécis pour le HacheuTeuMeuLeu
seul le click droit Control+F deux
la lumière t'apportera C'est ce qu'il y a de mieux
netevangile..selon Jceel.livre du windows.psaume alt-255..verset ÿp
Jceel http://jceel.free.fr l'hyper du gratuit du net
Founding Chairman of the International Pebkac Busters Company

Avatar
Zbrissglass
Super
très bien ce site !
un regret je n'ai rien trouvé sur protoride, autre ver
solitaire qui me tuurmente :)
-----Message d'origine-----
Bonjour ...Zbrissglass qui nous as a dit
* Bonjour
* Je suis infecté par un ver Agobot
* coment le supprimer de mon système ?
* Merci


www.secuser.com




--
@++++Jceel - MVP Win, I E, Media Player

En vérité je te le dis mais
sous O E

internaute indécis pour le
HacheuTeuMeuLeu

seul le click droit
Control+F deux

la lumière t'apportera C'est ce qu'il y
a de mieux

netevangile..selon Jceel.livre du windows.psaume alt-
255..verset ÿp

Jceel http://jceel.free.fr l'hyper du gratuit
du net

Founding Chairman of the International Pebkac Busters
Company


.




Avatar
Zbrissglass
Ok
je vais voir ça
mais ça va être long vu que j'ai toutes les variantes !
merci
"jackie" <no_spam_jackiechezwdoo.fr> a écrit dans le message de news:

Salut à tous ! Quelques liens pour te faire une idée, trouvés sur
http://www.trendmicro.com/vinfo/virusencyclo/default2.asp?m=q&virus=PROTORIDE&alt=PROTORIDE

Virus Encyclopedia Search Results
<< Search Again **1 - 10 of 15 records match your query

WORM_PROTORIDE.J
Aliases: W32.PROTORIDE.worm, Worm.Win32.PROTORIDE.e
This memory-resident worm attempts to drop a copy of itself as
MSUPDATE.EXE on a list of paths if they exist. It spreads via local
netw...

WORM_PROTORIDE.E
Aliases: Worm.Win32.PROTORIDE.e, Win32/HLLW.PROTORIDE.F
This memory-resident worm drops a copy of itself in several startup
folders, thus enabling it to run everytime Windows is restarted. It
propagates through local networks by dropping a copy of itsel...

WORM_PROTORIDE.O
Aliases: W32.PROTORIDE.Worm
This worm spreads via network shares by attempting to access target
systems using user names and passwords hardcoded it its body. It then
drops
a copy of itself in the accessed machines as the file...

WORM_PROTORIDE.F
Aliases: Worm.Win32.PROTORIDE.f, W32/PROTORIDE.E
This memory-resident worm propagates through the local network by
dropping copies of itself in write-enabled shares, which it accesses using
gathered user names and passwords. It also has an ...

WORM_PROTORIDE.H
This memory-resident worm propagates through network shares by
dropping a copy of itself as WINUPDATE32.EXE in write-enabled shared
folders. It also has a built-in Internet Relay Chat (I...

WORM_PROTORIDE.L
Aliases: Worm.Win32.PROTORIDE.e
This worm propages via the network by dropping a copy of itself in
write-enabled shares. It modifies the registry so that it executes every
time the user runs a .EXE file. This worm is compre...

WORM_PROTORIDE.R
Aliases: W32.PROTORIDE.Worm
This worm propagates through the local network. It drops copies of
itself in write-enabled shares. If the shares are password-protected, this
worm attempts to access the said folder using a list of...

WORM_PROTORIDE.S
This worm arrives via network shares. Upon execution, it modifies the
system registry to enable its automatic execution every time an .EXE file
is
executed. It propagates accross a local netw...

WORM_PROTORIDE.A
Aliases: W32.PROTORIDE.worm, Worm.Win32.PROTORIDE
This memory-resident worm propagates through the local network by
dropping itself in write-enabled shares. It has the following
capabilities:
Open a random port Connect to ...

WORM_PROTORIDE.K
Aliases: Win32/PROTORIDE.Worm, Worm.Win32.PROTORIDE.k,
W32.PROTORIDE.Worm
This memory-resident worm attempts to drop itself as WINUPDATE.EXE or
MSUPDATE.EXE in several startup folders. To spread, it also checks if the
said startup folders are located in shared dir...

<< Search Again *** 11 - 15 of 15 records match your query

WORM_PROTORIDE.D
This worm spreads across the network by dropping copies
of
itself as INTERNAT.EXE in certain write-enabled shares. It has a built-in
Internet Relay Chat (IRC) engine, which it uses for its b...

WORM_PROTORIDE.C
This memory-resident worm propagates via local network by
dropping copies of itself in write-enabled shares. It attempts to drop the
file WINUPD32.EXE in a list of paths if they exist. It has...

WORM_PROTORIDE.G
Aliases: Win32/HLLW.PROTORIDE.G, W32/PROTORIDE.F,
Win32:PROTORIDE-G [Wrm], Worm/PROTORIDE.E.1, Worm/PROTORIDE.I
This memory-resident worm attempts to drop its copy on an
infected machine, however, a bug in its code prevents some samples of this
worm to do perform this operation. It adds a registry entry so t...

WORM_PROTORIDE.B
Aliases: Worm.Win32.PROTORIDE.e
This memory-resident worm propagates through the local
network by dropping itself in write-enabled shares. It has an Internet
Relay
Chat (IRC) client engine, which it utilizes for its backdoo...

WORM_PROTORIDE.N
Aliases: W32.PROTORIDE.Worm, Worm.Win32.PROTORIDE.n
This memory-resident worm propagates through the network
by dropping itself in write-enabled shares. It has its own Internet Relay
Chat (IRC) client engine, which gives a remote malicious use...

:-D tu as le choix !!! en cliquant sur le nom du tien tu auras sa vie
et
comment s'en débarasser... bon courage! ;-) @+