j ai un virus wormnachi.b.1 aide moi!
pas chez moi
pas cher moi mon plus
Fait une recherche via cette page : http://www.trendmicro.com/vinfo/virusencyclo/
Tu devrais tomber dessus 😉
pas de bole mais je n arrive pas a afficher la pages du site c est peu etre du au virus :angry:
Removing the Malware Service
This removes the running malware service from memory on systems running Windows NT, 2000, and XP.
Open a command prompt window. Click Start>Run, type CMD and then press the Enter key.
At the command prompt, type the following:
NET STOP "Network Connections Sharing"
Press the Enter key. A message should indicate that the service has been stopped successfully.
Again, at the command prompt, type the following:
NET STOP "Wkspatch"
Press the Enter key. A message should indicate that the service has been stopped successfully.
Close the command prompt window.
Open Registry Editor. To do this, click Start>Run, type REGEDIT, then press Enter.
In the left panel, double-click the following:
HKEY_LOCAL_MACHINE>System>CurrentControlSetServices>
Still in the left panel, delete the subkey:
WksPatch
Close Registry Editor.
Additional Windows ME/XP Cleaning Instructions
Running Trend Micro Antivirus
Scan your system with Trend Micro antivirus and delete all files detected as WORM_NACHI.B. To do this, Trend Micro customers must download the latest pattern file and scan their system. Other Internet users can use HouseCall, Trend Micro’s free online virus scanner.
RPC DCOM Buffer Flow Vulnerability Scanning Tool
TrendLabs advises users to download the scanning tool released by Microsoft that can identify host machines in the network that do not have the Microsoft Security Bulletin MS03-026 security patch installed.
This Microsoft Scanning Tool is available for download at:
http://support.microsoft.com?kbid=826369
Applying Patches
TrendLabs advises all affected users to apply the patch issued by Microsoft at the following page:
For the RPC DCOM Buffer Overflow Vulnerability:
http://www.microsoft.com/technet/treeview/...in/MS03-026.asp
For the IIS5/WEBDAV Buffer Overrun Vulnerability:
http://www.microsoft.com/technet/security/...in/ms03-007.asp
For the MS Workstation Service Vulnerability:
http://www.microsoft.com/technet/treeview/...in/MS03-049.asp
For the Locator Service Vulnerability:
http://www.microsoft.com/technet/treeview/default.asp ?