Prob moteur de recherche
Résolu/Fermé
killian
-
24 mai 2009 à 16:43
sKe69 Messages postés 21360 Date d'inscription samedi 15 mars 2008 Statut Contributeur sécurité Dernière intervention 30 décembre 2012 - 14 juin 2009 à 18:29
sKe69 Messages postés 21360 Date d'inscription samedi 15 mars 2008 Statut Contributeur sécurité Dernière intervention 30 décembre 2012 - 14 juin 2009 à 18:29
A voir également:
- Prob moteur de recherche
- Recherche automatique des chaînes ne fonctionne pas - Guide
- Google moteur de recherche page d'accueil - Guide
- Copernic moteur de recherche - Télécharger - Navigateurs
- Safari moteur de recherche - Télécharger - Navigateurs
- Installer qwant moteur de recherche - Télécharger - Navigateurs
92 réponses
je n"ai pas de fichier qui porte ce nom là!! je suis aller sur le site, j'ai entrer c:\windows\system32\drivers\fssfltr_tdi.sys mais l me demande de vérifier du fait que je n'ai pas de fichier qui s'appelle de la sorte!!
par contre sa marche pour le reste!! c'est a dire :
c:\windows\system32\Niagara.scr
c:\windows\system32\sound32.dll
c:\windows\mickey32.dll
c:\windows\Matrix Code.scr
c:\windows\Matrix Code.exe
mais pas:
c:\windows\system32\drivers\fssfltr_tdi.sys
c:\windows\system32\Niagara.scr
c:\windows\system32\sound32.dll
c:\windows\mickey32.dll
c:\windows\Matrix Code.scr
c:\windows\Matrix Code.exe
mais pas:
c:\windows\system32\drivers\fssfltr_tdi.sys
je t'envoi déja les autre au fur et a mesure!! ^^
cleui de c:\windows\system32\Niagara.scr
Antivirus Version Dernière mise à jour Résultat
a-squared 4.0.0.101 2009.05.25 -
AhnLab-V3 5.0.0.2 2009.05.25 -
AntiVir 7.9.0.168 2009.05.25 -
Antiy-AVL 2.0.3.1 2009.05.25 -
Authentium 5.1.2.4 2009.05.25 -
Avast 4.8.1335.0 2009.05.25 -
AVG 8.5.0.339 2009.05.25 -
BitDefender 7.2 2009.05.25 -
CAT-QuickHeal 10.00 2009.05.25 -
ClamAV 0.94.1 2009.05.25 -
Comodo 1199 2009.05.25 -
DrWeb 5.0.0.12182 2009.05.25 -
eSafe 7.0.17.0 2009.05.24 Suspicious File
eTrust-Vet 31.6.6521 2009.05.25 -
F-Prot 4.4.4.56 2009.05.25 -
F-Secure 8.0.14470.0 2009.05.25 -
Fortinet 3.117.0.0 2009.05.25 -
GData 19 2009.05.25 -
Ikarus T3.1.1.49.0 2009.05.25 -
K7AntiVirus 7.10.741 2009.05.21 -
Kaspersky 7.0.0.125 2009.05.25 -
McAfee 5626 2009.05.25 -
McAfee+Artemis 5626 2009.05.25 -
McAfee-GW-Edition 6.7.6 2009.05.25 -
Microsoft 1.4701 2009.05.25 -
NOD32 4101 2009.05.25 -
Norman 6.01.05 2009.05.25 -
nProtect 2009.1.8.0 2009.05.25 -
Panda 10.0.0.14 2009.05.24 -
PCTools 4.4.2.0 2009.05.21 -
Prevx 3.0 2009.05.25 -
Rising 21.31.04.00 2009.05.25 -
Sophos 4.42.0 2009.05.25 -
Sunbelt 3.2.1858.2 2009.05.24 -
Symantec 1.4.4.12 2009.05.25 -
TheHacker 6.3.4.3.331 2009.05.25 -
TrendMicro 8.950.0.1092 2009.05.25 -
VBA32 3.12.10.5 2009.05.25 -
ViRobot 2009.5.25.1751 2009.05.25 -
VirusBuster 4.6.5.0 2009.05.25 -
Information additionnelle
File size: 528384 bytes
MD5...: 3777a95c11bc70c26be98d5b3f1b8f71
SHA1..: b1ed1fe05e928f35251aa234854301e0600d8c40
SHA256: dc995e781b518870f8537a6674785067fdaec22437620a28a6e7ca8835e12d44
ssdeep: 12288:XzKOuMdFo9RW9Thy3iaPeWNbeJCT0775I7atH0sAOtl5aVc:j1Mq9OnTAJ
DeXPOz5aV
PEiD..: -
TrID..: File type identification
UPX compressed Win32 Executable (38.5%)
Win32 EXE Yoda's Crypter (33.4%)
Win32 Executable Generic (10.7%)
Win32 Dynamic Link Library (generic) (9.5%)
Win16/32 Executable Delphi generic (2.6%)
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x127b70
timedatestamp.....: 0x2a425e19 (Fri Jun 19 22:22:17 1992)
machinetype.......: 0x14c (I386)
( 3 sections )
name viradd virsiz rawdsiz ntrpy md5
UPX0 0x1000 0xaf000 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e
UPX1 0xb0000 0x78000 0x77e00 7.93 1fdff68467afb430dd8042f6314f307a
.rsrc 0x128000 0x9000 0x8e00 5.31 efa4481945a117eb1f4ae909bc051d35
( 10 imports )
> KERNEL32.DLL: LoadLibraryA, GetProcAddress, ExitProcess
> advapi32.dll: RegFlushKey
> comctl32.dll: ImageList_Add
> gdi32.dll: SaveDC
> ole32.dll: IsEqualGUID
> oleaut32.dll: VariantClear
> shell32.dll: ShellExecuteA
> user32.dll: GetDC
> version.dll: VerQueryValueA
> winmm.dll: waveOutOpen
( 0 exports )
PDFiD.: -
RDS...: NSRL Reference Data Set
-
packers (Kaspersky): UPX
packers (F-Prot): UPX
cleui de c:\windows\system32\Niagara.scr
Antivirus Version Dernière mise à jour Résultat
a-squared 4.0.0.101 2009.05.25 -
AhnLab-V3 5.0.0.2 2009.05.25 -
AntiVir 7.9.0.168 2009.05.25 -
Antiy-AVL 2.0.3.1 2009.05.25 -
Authentium 5.1.2.4 2009.05.25 -
Avast 4.8.1335.0 2009.05.25 -
AVG 8.5.0.339 2009.05.25 -
BitDefender 7.2 2009.05.25 -
CAT-QuickHeal 10.00 2009.05.25 -
ClamAV 0.94.1 2009.05.25 -
Comodo 1199 2009.05.25 -
DrWeb 5.0.0.12182 2009.05.25 -
eSafe 7.0.17.0 2009.05.24 Suspicious File
eTrust-Vet 31.6.6521 2009.05.25 -
F-Prot 4.4.4.56 2009.05.25 -
F-Secure 8.0.14470.0 2009.05.25 -
Fortinet 3.117.0.0 2009.05.25 -
GData 19 2009.05.25 -
Ikarus T3.1.1.49.0 2009.05.25 -
K7AntiVirus 7.10.741 2009.05.21 -
Kaspersky 7.0.0.125 2009.05.25 -
McAfee 5626 2009.05.25 -
McAfee+Artemis 5626 2009.05.25 -
McAfee-GW-Edition 6.7.6 2009.05.25 -
Microsoft 1.4701 2009.05.25 -
NOD32 4101 2009.05.25 -
Norman 6.01.05 2009.05.25 -
nProtect 2009.1.8.0 2009.05.25 -
Panda 10.0.0.14 2009.05.24 -
PCTools 4.4.2.0 2009.05.21 -
Prevx 3.0 2009.05.25 -
Rising 21.31.04.00 2009.05.25 -
Sophos 4.42.0 2009.05.25 -
Sunbelt 3.2.1858.2 2009.05.24 -
Symantec 1.4.4.12 2009.05.25 -
TheHacker 6.3.4.3.331 2009.05.25 -
TrendMicro 8.950.0.1092 2009.05.25 -
VBA32 3.12.10.5 2009.05.25 -
ViRobot 2009.5.25.1751 2009.05.25 -
VirusBuster 4.6.5.0 2009.05.25 -
Information additionnelle
File size: 528384 bytes
MD5...: 3777a95c11bc70c26be98d5b3f1b8f71
SHA1..: b1ed1fe05e928f35251aa234854301e0600d8c40
SHA256: dc995e781b518870f8537a6674785067fdaec22437620a28a6e7ca8835e12d44
ssdeep: 12288:XzKOuMdFo9RW9Thy3iaPeWNbeJCT0775I7atH0sAOtl5aVc:j1Mq9OnTAJ
DeXPOz5aV
PEiD..: -
TrID..: File type identification
UPX compressed Win32 Executable (38.5%)
Win32 EXE Yoda's Crypter (33.4%)
Win32 Executable Generic (10.7%)
Win32 Dynamic Link Library (generic) (9.5%)
Win16/32 Executable Delphi generic (2.6%)
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x127b70
timedatestamp.....: 0x2a425e19 (Fri Jun 19 22:22:17 1992)
machinetype.......: 0x14c (I386)
( 3 sections )
name viradd virsiz rawdsiz ntrpy md5
UPX0 0x1000 0xaf000 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e
UPX1 0xb0000 0x78000 0x77e00 7.93 1fdff68467afb430dd8042f6314f307a
.rsrc 0x128000 0x9000 0x8e00 5.31 efa4481945a117eb1f4ae909bc051d35
( 10 imports )
> KERNEL32.DLL: LoadLibraryA, GetProcAddress, ExitProcess
> advapi32.dll: RegFlushKey
> comctl32.dll: ImageList_Add
> gdi32.dll: SaveDC
> ole32.dll: IsEqualGUID
> oleaut32.dll: VariantClear
> shell32.dll: ShellExecuteA
> user32.dll: GetDC
> version.dll: VerQueryValueA
> winmm.dll: waveOutOpen
( 0 exports )
PDFiD.: -
RDS...: NSRL Reference Data Set
-
packers (Kaspersky): UPX
packers (F-Prot): UPX
celui de c:\windows\system32\sound32.dll
Antivirus Version Dernière mise à jour Résultat
a-squared 4.0.0.101 2009.05.25 -
AhnLab-V3 5.0.0.2 2009.05.25 -
AntiVir 7.9.0.168 2009.05.25 -
Antiy-AVL 2.0.3.1 2009.05.25 -
Authentium 5.1.2.4 2009.05.25 -
Avast 4.8.1335.0 2009.05.25 -
AVG 8.5.0.339 2009.05.25 -
BitDefender 7.2 2009.05.25 -
CAT-QuickHeal 10.00 2009.05.25 -
ClamAV 0.94.1 2009.05.25 -
Comodo 1199 2009.05.25 -
DrWeb 5.0.0.12182 2009.05.25 -
eSafe 7.0.17.0 2009.05.24 Suspicious File
eTrust-Vet 31.6.6521 2009.05.25 -
F-Prot 4.4.4.56 2009.05.25 -
F-Secure 8.0.14470.0 2009.05.25 -
Fortinet 3.117.0.0 2009.05.25 -
GData 19 2009.05.25 -
Ikarus T3.1.1.49.0 2009.05.25 -
K7AntiVirus 7.10.741 2009.05.21 -
Kaspersky 7.0.0.125 2009.05.25 -
McAfee 5626 2009.05.25 -
McAfee+Artemis 5626 2009.05.25 -
McAfee-GW-Edition 6.7.6 2009.05.25 Win32.Malware.gen (suspicious)
Microsoft 1.4701 2009.05.25 -
NOD32 4101 2009.05.25 -
Norman 6.01.05 2009.05.25 -
nProtect 2009.1.8.0 2009.05.25 -
Panda 10.0.0.14 2009.05.24 -
PCTools 4.4.2.0 2009.05.21 -
Prevx 3.0 2009.05.25 -
Rising 21.31.04.00 2009.05.25 -
Sophos 4.42.0 2009.05.25 -
Sunbelt 3.2.1858.2 2009.05.24 -
Symantec 1.4.4.12 2009.05.25 -
TheHacker 6.3.4.3.331 2009.05.25 -
TrendMicro 8.950.0.1092 2009.05.25 -
VBA32 3.12.10.5 2009.05.25 -
ViRobot 2009.5.25.1751 2009.05.25 -
Information additionnelle
File size: 44239 bytes
MD5...: e085852a4d44047e23bd743329e58a8b
SHA1..: 35303baf82ba671380e640eaad7e5d03e3ef34c8
SHA256: 8075c39acc3205c1d57f450f2e7b98faf2c7544d5f788daf06b7bf8610f75e0a
ssdeep: 768:W8sPmfhR6AXc2n/KGCxbBYtXjchW8SITIGmk0B7HAXe7ZCkCv7NwnWfwR9Y:
/PXCxbBYjcc8Zjj0NHL7wkCxwnWYRi
PEiD..: -
TrID..: File type identification
Win32 EXE Yoda's Crypter (56.9%)
Win32 Executable Generic (18.2%)
Win32 Dynamic Link Library (generic) (16.2%)
Generic Win/DOS Executable (4.2%)
DOS Executable Generic (4.2%)
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x20000
timedatestamp.....: 0x32d587b6 (Fri Jan 10 00:05:10 1997)
machinetype.......: 0x14c (I386)
( 4 sections )
name viradd virsiz rawdsiz ntrpy md5
0x1000 0x1e000 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e
0x1f000 0x1000 0x600 4.95 e3004d1283f1809dd564ccabb02f8c45
0x20000 0x1000 0x1000 7.77 f3e7d445aca4a36284585db2a6d4803f
0x21000 0xa000 0x92cf 7.90 617c83612e440287a60b2b8f7d9ac0ba
( 1 imports )
> kernel32.dll: LoadLibraryA, GetProcAddress
( 47 exports )
ACloseAudio, ACloseVoices, ACreateAudioData, ACreateAudioVoice, ADestroyAudioData, ADestroyAudioVoice, AFreeModuleFile, AFreeWaveFile, AGetAudioDataAvail, AGetAudioDevCaps, AGetAudioNumDevs, AGetErrorText, AGetModulePosition, AGetModuleStatus, AGetModuleVolume, AGetVersion, AGetVoiceFrequency, AGetVoicePanning, AGetVoicePosition, AGetVoiceStatus, AGetVoiceVolume, AInitialize, ALoadModuleFile, ALoadWaveFile, AOpenAudio, AOpenVoices, APauseModule, APingAudio, APlayModule, APlayVoice, APrimeVoice, AResumeModule, ASetAudioCallback, ASetAudioTimerProc, ASetAudioTimerRate, ASetModuleCallback, ASetModulePosition, ASetModuleVolume, ASetVoiceFrequency, ASetVoicePanning, ASetVoicePosition, ASetVoiceVolume, AStartVoice, AStopModule, AStopVoice, AUpdateAudio, AWriteAudioData
PDFiD.: -
RDS...: NSRL Reference Data Set
-
packers (Kaspersky): UPX
ThreatExpert info: <a href='http://www.threatexpert.com/report.aspx?md5=e085852a4d44047e23bd743329e58a8b' target='_blank'>https://www.symantec.com?md5=e085852a4d44047e23bd743329e58a8b</a>
CWSandbox info: <a href='http://research.sunbelt-software.com/partnerresource/MD5.aspx?md5=e085852a4d44047e23bd743329e58a8b' target='_blank'>http://research.sunbelt-software.com/...
packers (F-Prot): UPX
Antivirus Version Dernière mise à jour Résultat
a-squared 4.0.0.101 2009.05.25 -
AhnLab-V3 5.0.0.2 2009.05.25 -
AntiVir 7.9.0.168 2009.05.25 -
Antiy-AVL 2.0.3.1 2009.05.25 -
Authentium 5.1.2.4 2009.05.25 -
Avast 4.8.1335.0 2009.05.25 -
AVG 8.5.0.339 2009.05.25 -
BitDefender 7.2 2009.05.25 -
CAT-QuickHeal 10.00 2009.05.25 -
ClamAV 0.94.1 2009.05.25 -
Comodo 1199 2009.05.25 -
DrWeb 5.0.0.12182 2009.05.25 -
eSafe 7.0.17.0 2009.05.24 Suspicious File
eTrust-Vet 31.6.6521 2009.05.25 -
F-Prot 4.4.4.56 2009.05.25 -
F-Secure 8.0.14470.0 2009.05.25 -
Fortinet 3.117.0.0 2009.05.25 -
GData 19 2009.05.25 -
Ikarus T3.1.1.49.0 2009.05.25 -
K7AntiVirus 7.10.741 2009.05.21 -
Kaspersky 7.0.0.125 2009.05.25 -
McAfee 5626 2009.05.25 -
McAfee+Artemis 5626 2009.05.25 -
McAfee-GW-Edition 6.7.6 2009.05.25 Win32.Malware.gen (suspicious)
Microsoft 1.4701 2009.05.25 -
NOD32 4101 2009.05.25 -
Norman 6.01.05 2009.05.25 -
nProtect 2009.1.8.0 2009.05.25 -
Panda 10.0.0.14 2009.05.24 -
PCTools 4.4.2.0 2009.05.21 -
Prevx 3.0 2009.05.25 -
Rising 21.31.04.00 2009.05.25 -
Sophos 4.42.0 2009.05.25 -
Sunbelt 3.2.1858.2 2009.05.24 -
Symantec 1.4.4.12 2009.05.25 -
TheHacker 6.3.4.3.331 2009.05.25 -
TrendMicro 8.950.0.1092 2009.05.25 -
VBA32 3.12.10.5 2009.05.25 -
ViRobot 2009.5.25.1751 2009.05.25 -
Information additionnelle
File size: 44239 bytes
MD5...: e085852a4d44047e23bd743329e58a8b
SHA1..: 35303baf82ba671380e640eaad7e5d03e3ef34c8
SHA256: 8075c39acc3205c1d57f450f2e7b98faf2c7544d5f788daf06b7bf8610f75e0a
ssdeep: 768:W8sPmfhR6AXc2n/KGCxbBYtXjchW8SITIGmk0B7HAXe7ZCkCv7NwnWfwR9Y:
/PXCxbBYjcc8Zjj0NHL7wkCxwnWYRi
PEiD..: -
TrID..: File type identification
Win32 EXE Yoda's Crypter (56.9%)
Win32 Executable Generic (18.2%)
Win32 Dynamic Link Library (generic) (16.2%)
Generic Win/DOS Executable (4.2%)
DOS Executable Generic (4.2%)
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x20000
timedatestamp.....: 0x32d587b6 (Fri Jan 10 00:05:10 1997)
machinetype.......: 0x14c (I386)
( 4 sections )
name viradd virsiz rawdsiz ntrpy md5
0x1000 0x1e000 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e
0x1f000 0x1000 0x600 4.95 e3004d1283f1809dd564ccabb02f8c45
0x20000 0x1000 0x1000 7.77 f3e7d445aca4a36284585db2a6d4803f
0x21000 0xa000 0x92cf 7.90 617c83612e440287a60b2b8f7d9ac0ba
( 1 imports )
> kernel32.dll: LoadLibraryA, GetProcAddress
( 47 exports )
ACloseAudio, ACloseVoices, ACreateAudioData, ACreateAudioVoice, ADestroyAudioData, ADestroyAudioVoice, AFreeModuleFile, AFreeWaveFile, AGetAudioDataAvail, AGetAudioDevCaps, AGetAudioNumDevs, AGetErrorText, AGetModulePosition, AGetModuleStatus, AGetModuleVolume, AGetVersion, AGetVoiceFrequency, AGetVoicePanning, AGetVoicePosition, AGetVoiceStatus, AGetVoiceVolume, AInitialize, ALoadModuleFile, ALoadWaveFile, AOpenAudio, AOpenVoices, APauseModule, APingAudio, APlayModule, APlayVoice, APrimeVoice, AResumeModule, ASetAudioCallback, ASetAudioTimerProc, ASetAudioTimerRate, ASetModuleCallback, ASetModulePosition, ASetModuleVolume, ASetVoiceFrequency, ASetVoicePanning, ASetVoicePosition, ASetVoiceVolume, AStartVoice, AStopModule, AStopVoice, AUpdateAudio, AWriteAudioData
PDFiD.: -
RDS...: NSRL Reference Data Set
-
packers (Kaspersky): UPX
ThreatExpert info: <a href='http://www.threatexpert.com/report.aspx?md5=e085852a4d44047e23bd743329e58a8b' target='_blank'>https://www.symantec.com?md5=e085852a4d44047e23bd743329e58a8b</a>
CWSandbox info: <a href='http://research.sunbelt-software.com/partnerresource/MD5.aspx?md5=e085852a4d44047e23bd743329e58a8b' target='_blank'>http://research.sunbelt-software.com/...
packers (F-Prot): UPX
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
celui de c:\windows\mickey32.dll
Antivirus Version Dernière mise à jour Résultat
a-squared 4.0.0.101 2009.05.25 -
AhnLab-V3 5.0.0.2 2009.05.25 -
AntiVir 7.9.0.168 2009.05.25 -
Antiy-AVL 2.0.3.1 2009.05.25 -
Authentium 5.1.2.4 2009.05.25 -
Avast 4.8.1335.0 2009.05.25 -
AVG 8.5.0.339 2009.05.25 -
BitDefender 7.2 2009.05.25 -
CAT-QuickHeal 10.00 2009.05.25 -
ClamAV 0.94.1 2009.05.25 -
Comodo 1199 2009.05.25 -
DrWeb 5.0.0.12182 2009.05.25 -
eSafe 7.0.17.0 2009.05.24 -
eTrust-Vet 31.6.6521 2009.05.25 -
F-Prot 4.4.4.56 2009.05.25 -
F-Secure 8.0.14470.0 2009.05.25 -
Fortinet 3.117.0.0 2009.05.25 -
GData 19 2009.05.25 -
Ikarus T3.1.1.49.0 2009.05.25 -
K7AntiVirus 7.10.741 2009.05.21 -
Kaspersky 7.0.0.125 2009.05.25 -
McAfee 5626 2009.05.25 -
McAfee+Artemis 5626 2009.05.25 -
McAfee-GW-Edition 6.7.6 2009.05.25 -
Microsoft 1.4701 2009.05.25 -
NOD32 4101 2009.05.25 -
Norman 6.01.05 2009.05.25 -
nProtect 2009.1.8.0 2009.05.25 -
Panda 10.0.0.14 2009.05.24 -
PCTools 4.4.2.0 2009.05.21 -
Prevx 3.0 2009.05.25 -
Rising 21.31.04.00 2009.05.25 -
Sophos 4.42.0 2009.05.25 -
Sunbelt 3.2.1858.2 2009.05.24 -
Symantec 1.4.4.12 2009.05.25 -
TheHacker 6.3.4.3.331 2009.05.25 -
TrendMicro 8.950.0.1092 2009.05.25 -
VBA32 3.12.10.5 2009.05.25 -
ViRobot 2009.5.25.1751 2009.05.25 -
VirusBuster 4.6.5.0 2009.05.25 -
Information additionnelle
File size: 29696 bytes
MD5...: d19a1017c939dae81785709d127a0e46
SHA1..: a70db87a0d1d8f89a373817450ba5c6d328176fe
SHA256: 1dd1e73e7060c6c8e88a5a534867f68f22e45827309ed52fede9a64b83027a6d
SHA512: ad87e29c57da54d8b2b20b8f653636e905aad459894317628e1d95a85612c98a
a5bb9847fd8a5404c2c1c870b1658d050208557a6fafc1da275700ffbb61e728
ssdeep: 384:JN1/LL8dQ/ng9TVTgKQiFO5NM+85jgRQ2d+QDZIJW:JNtL9SVnHOqxgRV
PEiD..: -
TrID..: File type identification
Win64 Executable Generic (59.6%)
Win32 Executable MS Visual C++ (generic) (26.2%)
Win32 Executable Generic (5.9%)
Win32 Dynamic Link Library (generic) (5.2%)
Generic Win/DOS Executable (1.3%)
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x15f0
timedatestamp.....: 0x36b118f2 (Fri Jan 29 02:12:02 1999)
machinetype.......: 0x14c (I386)
( 7 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x2f00 0x3000 6.27 2dacc5106e670231e4693080bf9f4ccb
.rdata 0x4000 0x467 0x600 4.25 5a1c76e7dca97eda19659a3400962581
.data 0x5000 0x3bb8 0x2800 0.42 e669ace364e7e810d68aa61c5d7b7fa4
.idata 0x9000 0x530 0x600 4.55 e4c8862adbe7a89d36fbf045d67da4f2
.Shared 0xa000 0x24 0x200 0.00 bf619eac0cdf3f68d496ea9344137e8b
.rsrc 0xb000 0x318 0x400 2.75 9782ee6f16e47efe126af9f40151faea
.reloc 0xc000 0x4ca 0x600 4.85 d3b944240ab9866116c5d79674ba0657
( 2 imports )
> KERNEL32.dll: GetModuleFileNameA, GetLastError, GetCPInfo, GetACP, SetStdHandle, CloseHandle, SetFilePointer, LoadLibraryA, GetCommandLineA, GetProcAddress, GetModuleHandleA, GetVersion, ExitProcess, TerminateProcess, GetCurrentProcess, TlsSetValue, TlsAlloc, TlsFree, SetLastError, TlsGetValue, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, DeleteCriticalSection, GetCurrentThreadId, VirtualAlloc, FlushFileBuffers, GetOEMCP, FreeEnvironmentStringsA, FreeEnvironmentStringsW, GetEnvironmentStrings, GetEnvironmentStringsW, WideCharToMultiByte, HeapDestroy, HeapCreate, VirtualFree, WriteFile, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, HeapAlloc, HeapFree
> USER32.dll: SetWindowsHookExA, UnhookWindowsHookEx, CallNextHookEx, ShowCursor, SendMessageA
( 8 exports )
getMickeyVersion, installKeyboardHook, installMessageHook, installMouseHook, pingMickey, uninstallKeyboardHook, uninstallMessageHook, uninstallMouseHook
PDFiD.: -
RDS...: NSRL Reference Data Set
-
Antivirus Version Dernière mise à jour Résultat
a-squared 4.0.0.101 2009.05.25 -
AhnLab-V3 5.0.0.2 2009.05.25 -
AntiVir 7.9.0.168 2009.05.25 -
Antiy-AVL 2.0.3.1 2009.05.25 -
Authentium 5.1.2.4 2009.05.25 -
Avast 4.8.1335.0 2009.05.25 -
AVG 8.5.0.339 2009.05.25 -
BitDefender 7.2 2009.05.25 -
CAT-QuickHeal 10.00 2009.05.25 -
ClamAV 0.94.1 2009.05.25 -
Comodo 1199 2009.05.25 -
DrWeb 5.0.0.12182 2009.05.25 -
eSafe 7.0.17.0 2009.05.24 -
eTrust-Vet 31.6.6521 2009.05.25 -
F-Prot 4.4.4.56 2009.05.25 -
F-Secure 8.0.14470.0 2009.05.25 -
Fortinet 3.117.0.0 2009.05.25 -
GData 19 2009.05.25 -
Ikarus T3.1.1.49.0 2009.05.25 -
K7AntiVirus 7.10.741 2009.05.21 -
Kaspersky 7.0.0.125 2009.05.25 -
McAfee 5626 2009.05.25 -
McAfee+Artemis 5626 2009.05.25 -
McAfee-GW-Edition 6.7.6 2009.05.25 -
Microsoft 1.4701 2009.05.25 -
NOD32 4101 2009.05.25 -
Norman 6.01.05 2009.05.25 -
nProtect 2009.1.8.0 2009.05.25 -
Panda 10.0.0.14 2009.05.24 -
PCTools 4.4.2.0 2009.05.21 -
Prevx 3.0 2009.05.25 -
Rising 21.31.04.00 2009.05.25 -
Sophos 4.42.0 2009.05.25 -
Sunbelt 3.2.1858.2 2009.05.24 -
Symantec 1.4.4.12 2009.05.25 -
TheHacker 6.3.4.3.331 2009.05.25 -
TrendMicro 8.950.0.1092 2009.05.25 -
VBA32 3.12.10.5 2009.05.25 -
ViRobot 2009.5.25.1751 2009.05.25 -
VirusBuster 4.6.5.0 2009.05.25 -
Information additionnelle
File size: 29696 bytes
MD5...: d19a1017c939dae81785709d127a0e46
SHA1..: a70db87a0d1d8f89a373817450ba5c6d328176fe
SHA256: 1dd1e73e7060c6c8e88a5a534867f68f22e45827309ed52fede9a64b83027a6d
SHA512: ad87e29c57da54d8b2b20b8f653636e905aad459894317628e1d95a85612c98a
a5bb9847fd8a5404c2c1c870b1658d050208557a6fafc1da275700ffbb61e728
ssdeep: 384:JN1/LL8dQ/ng9TVTgKQiFO5NM+85jgRQ2d+QDZIJW:JNtL9SVnHOqxgRV
PEiD..: -
TrID..: File type identification
Win64 Executable Generic (59.6%)
Win32 Executable MS Visual C++ (generic) (26.2%)
Win32 Executable Generic (5.9%)
Win32 Dynamic Link Library (generic) (5.2%)
Generic Win/DOS Executable (1.3%)
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x15f0
timedatestamp.....: 0x36b118f2 (Fri Jan 29 02:12:02 1999)
machinetype.......: 0x14c (I386)
( 7 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x2f00 0x3000 6.27 2dacc5106e670231e4693080bf9f4ccb
.rdata 0x4000 0x467 0x600 4.25 5a1c76e7dca97eda19659a3400962581
.data 0x5000 0x3bb8 0x2800 0.42 e669ace364e7e810d68aa61c5d7b7fa4
.idata 0x9000 0x530 0x600 4.55 e4c8862adbe7a89d36fbf045d67da4f2
.Shared 0xa000 0x24 0x200 0.00 bf619eac0cdf3f68d496ea9344137e8b
.rsrc 0xb000 0x318 0x400 2.75 9782ee6f16e47efe126af9f40151faea
.reloc 0xc000 0x4ca 0x600 4.85 d3b944240ab9866116c5d79674ba0657
( 2 imports )
> KERNEL32.dll: GetModuleFileNameA, GetLastError, GetCPInfo, GetACP, SetStdHandle, CloseHandle, SetFilePointer, LoadLibraryA, GetCommandLineA, GetProcAddress, GetModuleHandleA, GetVersion, ExitProcess, TerminateProcess, GetCurrentProcess, TlsSetValue, TlsAlloc, TlsFree, SetLastError, TlsGetValue, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, DeleteCriticalSection, GetCurrentThreadId, VirtualAlloc, FlushFileBuffers, GetOEMCP, FreeEnvironmentStringsA, FreeEnvironmentStringsW, GetEnvironmentStrings, GetEnvironmentStringsW, WideCharToMultiByte, HeapDestroy, HeapCreate, VirtualFree, WriteFile, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, HeapAlloc, HeapFree
> USER32.dll: SetWindowsHookExA, UnhookWindowsHookEx, CallNextHookEx, ShowCursor, SendMessageA
( 8 exports )
getMickeyVersion, installKeyboardHook, installMessageHook, installMouseHook, pingMickey, uninstallKeyboardHook, uninstallMessageHook, uninstallMouseHook
PDFiD.: -
RDS...: NSRL Reference Data Set
-
celui de c:\windows\Matrix Code.scr
Antivirus Version Dernière mise à jour Résultat
a-squared 4.0.0.101 2009.05.25 -
AhnLab-V3 5.0.0.2 2009.05.25 -
AntiVir 7.9.0.168 2009.05.25 -
Antiy-AVL 2.0.3.1 2009.05.25 -
Authentium 5.1.2.4 2009.05.25 -
Avast 4.8.1335.0 2009.05.25 -
AVG 8.5.0.339 2009.05.25 -
BitDefender 7.2 2009.05.25 -
CAT-QuickHeal 10.00 2009.05.25 -
ClamAV 0.94.1 2009.05.25 -
Comodo 1199 2009.05.25 -
DrWeb 5.0.0.12182 2009.05.25 -
eSafe 7.0.17.0 2009.05.24 -
eTrust-Vet 31.6.6521 2009.05.25 -
F-Prot 4.4.4.56 2009.05.25 -
F-Secure 8.0.14470.0 2009.05.25 -
Fortinet 3.117.0.0 2009.05.25 -
GData 19 2009.05.25 -
Ikarus T3.1.1.49.0 2009.05.25 -
K7AntiVirus 7.10.741 2009.05.21 -
Kaspersky 7.0.0.125 2009.05.25 -
McAfee 5626 2009.05.25 -
McAfee+Artemis 5626 2009.05.25 -
McAfee-GW-Edition 6.7.6 2009.05.25 -
Microsoft 1.4701 2009.05.25 -
NOD32 4101 2009.05.25 -
Norman 6.01.05 2009.05.25 -
nProtect 2009.1.8.0 2009.05.25 -
Panda 10.0.0.14 2009.05.24 -
PCTools 4.4.2.0 2009.05.21 -
Prevx 3.0 2009.05.25 -
Rising 21.31.04.00 2009.05.25 -
Sophos 4.42.0 2009.05.25 -
Sunbelt 3.2.1858.2 2009.05.24 -
Symantec 1.4.4.12 2009.05.25 -
TheHacker 6.3.4.3.331 2009.05.25 -
TrendMicro 8.950.0.1092 2009.05.25 -
VBA32 3.12.10.5 2009.05.25 -
ViRobot 2009.5.25.1751 2009.05.25 -
VirusBuster 4.6.5.0 2009.05.25 -
Information additionnelle
File size: 232784 bytes
MD5...: c87ee9ff49bf8b0d9cada154d2a6d900
SHA1..: 996642f66671cf7ea5daa677987934304fb0a100
SHA256: 105f2682872276d0237ecf29e845d21386a1a2b84c2e926f75b5fc7db8b3b174
ssdeep: 1536:YVFzDvc98zGEC3WEOuOqHJeSfmd4iY8WQmZ7HJ4Dt50Ey0gu0HDFfFHjD8S
Muiud:izwZ5md4iY8c7qhBguRse45b
PEiD..: InstallShield 2000
TrID..: File type identification
Win32 Executable MS Visual C++ 4.x (64.8%)
Win32 Executable MS Visual C++ (generic) (18.1%)
Windows Screen Saver (6.3%)
Win32 Executable Generic (4.1%)
Win32 Dynamic Link Library (generic) (3.6%)
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0xa0a0
timedatestamp.....: 0x36db0b79 (Mon Mar 01 21:49:45 1999)
machinetype.......: 0x14c (I386)
( 6 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x11e46 0x12000 6.45 5cfbfeba5157f2e3b3975e05ac986a4b
.rdata 0x13000 0x4e3 0x600 4.59 730fa3392dc7801e9b9a2293d81b83d5
.data 0x14000 0x4e94 0x3800 2.32 ed9079934b22d5aca1a39aabcde9ebf8
.idata 0x19000 0x10d4 0x1200 5.26 d050c860367f534ff37329b7c14dc866
Shared 0x1b000 0x4 0x200 0.07 1d7d80e8b5ce8c86e7c833467964b6ae
.rsrc 0x1c000 0x159ec 0x15a00 3.14 a1a23284528b0ddc722ddbde63e476c0
( 4 imports )
> KERNEL32.dll: InterlockedDecrement, GetShortPathNameA, InterlockedIncrement, GetSystemDirectoryA, GetModuleFileNameA, CloseHandle, GetLastError, CreateProcessA, OutputDebugStringA, GetTickCount, GetPrivateProfileStringA, GetProfileIntA, GetVersion, lstrlenA, lstrcatA, GetWindowsDirectoryA, WriteProfileStringA, GlobalLock, _lclose, GlobalHandle, GlobalUnlock, WritePrivateProfileStringA, FreeLibrary, Sleep, GetCurrentThreadId, FreeResource, LoadLibraryA, GetProcAddress, LockResource, FindResourceA, LoadResource, _lread, _lopen, _llseek, OpenProcess, GlobalAlloc, lstrcmpA, GetExitCodeProcess, HeapReAlloc, MoveFileA, GetLocalTime, CompareStringW, CompareStringA, SetEndOfFile, CreateFileA, FlushFileBuffers, SetStdHandle, GetStringTypeW, GetStringTypeA, LCMapStringW, LCMapStringA, RtlUnwind, GetFileType, GetStdHandle, SetHandleCount, WideCharToMultiByte, GetEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsW, MultiByteToWideChar, FreeEnvironmentStringsA, SetEnvironmentVariableA, GlobalFree, SetFileAttributesA, UnhandledExceptionFilter, SetFilePointer, ReadFile, VirtualAlloc, VirtualFree, HeapCreate, HeapDestroy, GetOEMCP, GetACP, GetCPInfo, GetCurrentDirectoryA, GetFullPathNameA, GetCurrentProcess, TerminateProcess, ExitProcess, DeleteFileA, GetCommandLineA, GetStartupInfoA, GetModuleHandleA, GetSystemTime, GetTimeZoneInformation, HeapFree, HeapAlloc, FindFirstFileA, FindClose, WriteFile, FileTimeToLocalFileTime, GetDriveTypeA, GetFileAttributesA, FileTimeToSystemTime
> USER32.dll: SetRect, ReleaseDC, GetDC, FillRect, GetClientRect, PostThreadMessageA, PeekMessageA, IsWindow, PostMessageA, ShowCursor, GetSystemMetrics, AttachThreadInput, GetWindowThreadProcessId, GetTopWindow, SetWindowPos, SetForegroundWindow, GetForegroundWindow, SystemParametersInfoA, ShowWindow, FindWindowExA, SendMessageA, DestroyWindow, MessageBoxA, GetWindowLongA, GetWindow, LoadStringA, DialogBoxParamA, CheckDlgButton, IsDlgButtonChecked, GetDlgItemTextA, WaitForInputIdle, PostQuitMessage, DefWindowProcA, KillTimer, SetTimer, LoadIconA, RegisterClassA, CreateWindowExA, InvalidateRect, UpdateWindow, GetParent, BeginPaint, GetWindowRect, EndPaint, CreateDialogParamA, GetMessageA, IsDialogMessageA, TranslateMessage, DispatchMessageA, EnableWindow, GetDlgItem
> GDI32.dll: SetDIBitsToDevice, SelectObject, CreateCompatibleDC, StretchBlt, BitBlt, RealizePalette, GetObjectA, TextOutA, SetBkColor, SelectPalette, GetStockObject, GetTextMetricsA, SetTextColor, DeleteObject, CreateDIBitmap, CreatePalette, DeleteDC
> ADVAPI32.dll: RegCloseKey, RegQueryValueExA, RegOpenKeyExA
( 0 exports )
PDFiD.: -
RDS...: NSRL Reference Data Set
-
CWSandbox info: <a href='http://research.sunbelt-software.com/partnerresource/MD5.aspx?md5=c87ee9ff49bf8b0d9cada154d2a6d900' target='_blank'>http://research.sunbelt-software.com/...
ThreatExpert info: <a href='http://www.threatexpert.com/report.aspx?md5=c87ee9ff49bf8b0d9cada154d2a6d900' target='_blank'>https://www.symantec.com?md5=c87ee9ff49bf8b0d9cada154d2a6d900</a>
Antivirus Version Dernière mise à jour Résultat
a-squared 4.0.0.101 2009.05.25 -
AhnLab-V3 5.0.0.2 2009.05.25 -
AntiVir 7.9.0.168 2009.05.25 -
Antiy-AVL 2.0.3.1 2009.05.25 -
Authentium 5.1.2.4 2009.05.25 -
Avast 4.8.1335.0 2009.05.25 -
AVG 8.5.0.339 2009.05.25 -
BitDefender 7.2 2009.05.25 -
CAT-QuickHeal 10.00 2009.05.25 -
ClamAV 0.94.1 2009.05.25 -
Comodo 1199 2009.05.25 -
DrWeb 5.0.0.12182 2009.05.25 -
eSafe 7.0.17.0 2009.05.24 -
eTrust-Vet 31.6.6521 2009.05.25 -
F-Prot 4.4.4.56 2009.05.25 -
F-Secure 8.0.14470.0 2009.05.25 -
Fortinet 3.117.0.0 2009.05.25 -
GData 19 2009.05.25 -
Ikarus T3.1.1.49.0 2009.05.25 -
K7AntiVirus 7.10.741 2009.05.21 -
Kaspersky 7.0.0.125 2009.05.25 -
McAfee 5626 2009.05.25 -
McAfee+Artemis 5626 2009.05.25 -
McAfee-GW-Edition 6.7.6 2009.05.25 -
Microsoft 1.4701 2009.05.25 -
NOD32 4101 2009.05.25 -
Norman 6.01.05 2009.05.25 -
nProtect 2009.1.8.0 2009.05.25 -
Panda 10.0.0.14 2009.05.24 -
PCTools 4.4.2.0 2009.05.21 -
Prevx 3.0 2009.05.25 -
Rising 21.31.04.00 2009.05.25 -
Sophos 4.42.0 2009.05.25 -
Sunbelt 3.2.1858.2 2009.05.24 -
Symantec 1.4.4.12 2009.05.25 -
TheHacker 6.3.4.3.331 2009.05.25 -
TrendMicro 8.950.0.1092 2009.05.25 -
VBA32 3.12.10.5 2009.05.25 -
ViRobot 2009.5.25.1751 2009.05.25 -
VirusBuster 4.6.5.0 2009.05.25 -
Information additionnelle
File size: 232784 bytes
MD5...: c87ee9ff49bf8b0d9cada154d2a6d900
SHA1..: 996642f66671cf7ea5daa677987934304fb0a100
SHA256: 105f2682872276d0237ecf29e845d21386a1a2b84c2e926f75b5fc7db8b3b174
ssdeep: 1536:YVFzDvc98zGEC3WEOuOqHJeSfmd4iY8WQmZ7HJ4Dt50Ey0gu0HDFfFHjD8S
Muiud:izwZ5md4iY8c7qhBguRse45b
PEiD..: InstallShield 2000
TrID..: File type identification
Win32 Executable MS Visual C++ 4.x (64.8%)
Win32 Executable MS Visual C++ (generic) (18.1%)
Windows Screen Saver (6.3%)
Win32 Executable Generic (4.1%)
Win32 Dynamic Link Library (generic) (3.6%)
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0xa0a0
timedatestamp.....: 0x36db0b79 (Mon Mar 01 21:49:45 1999)
machinetype.......: 0x14c (I386)
( 6 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x11e46 0x12000 6.45 5cfbfeba5157f2e3b3975e05ac986a4b
.rdata 0x13000 0x4e3 0x600 4.59 730fa3392dc7801e9b9a2293d81b83d5
.data 0x14000 0x4e94 0x3800 2.32 ed9079934b22d5aca1a39aabcde9ebf8
.idata 0x19000 0x10d4 0x1200 5.26 d050c860367f534ff37329b7c14dc866
Shared 0x1b000 0x4 0x200 0.07 1d7d80e8b5ce8c86e7c833467964b6ae
.rsrc 0x1c000 0x159ec 0x15a00 3.14 a1a23284528b0ddc722ddbde63e476c0
( 4 imports )
> KERNEL32.dll: InterlockedDecrement, GetShortPathNameA, InterlockedIncrement, GetSystemDirectoryA, GetModuleFileNameA, CloseHandle, GetLastError, CreateProcessA, OutputDebugStringA, GetTickCount, GetPrivateProfileStringA, GetProfileIntA, GetVersion, lstrlenA, lstrcatA, GetWindowsDirectoryA, WriteProfileStringA, GlobalLock, _lclose, GlobalHandle, GlobalUnlock, WritePrivateProfileStringA, FreeLibrary, Sleep, GetCurrentThreadId, FreeResource, LoadLibraryA, GetProcAddress, LockResource, FindResourceA, LoadResource, _lread, _lopen, _llseek, OpenProcess, GlobalAlloc, lstrcmpA, GetExitCodeProcess, HeapReAlloc, MoveFileA, GetLocalTime, CompareStringW, CompareStringA, SetEndOfFile, CreateFileA, FlushFileBuffers, SetStdHandle, GetStringTypeW, GetStringTypeA, LCMapStringW, LCMapStringA, RtlUnwind, GetFileType, GetStdHandle, SetHandleCount, WideCharToMultiByte, GetEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsW, MultiByteToWideChar, FreeEnvironmentStringsA, SetEnvironmentVariableA, GlobalFree, SetFileAttributesA, UnhandledExceptionFilter, SetFilePointer, ReadFile, VirtualAlloc, VirtualFree, HeapCreate, HeapDestroy, GetOEMCP, GetACP, GetCPInfo, GetCurrentDirectoryA, GetFullPathNameA, GetCurrentProcess, TerminateProcess, ExitProcess, DeleteFileA, GetCommandLineA, GetStartupInfoA, GetModuleHandleA, GetSystemTime, GetTimeZoneInformation, HeapFree, HeapAlloc, FindFirstFileA, FindClose, WriteFile, FileTimeToLocalFileTime, GetDriveTypeA, GetFileAttributesA, FileTimeToSystemTime
> USER32.dll: SetRect, ReleaseDC, GetDC, FillRect, GetClientRect, PostThreadMessageA, PeekMessageA, IsWindow, PostMessageA, ShowCursor, GetSystemMetrics, AttachThreadInput, GetWindowThreadProcessId, GetTopWindow, SetWindowPos, SetForegroundWindow, GetForegroundWindow, SystemParametersInfoA, ShowWindow, FindWindowExA, SendMessageA, DestroyWindow, MessageBoxA, GetWindowLongA, GetWindow, LoadStringA, DialogBoxParamA, CheckDlgButton, IsDlgButtonChecked, GetDlgItemTextA, WaitForInputIdle, PostQuitMessage, DefWindowProcA, KillTimer, SetTimer, LoadIconA, RegisterClassA, CreateWindowExA, InvalidateRect, UpdateWindow, GetParent, BeginPaint, GetWindowRect, EndPaint, CreateDialogParamA, GetMessageA, IsDialogMessageA, TranslateMessage, DispatchMessageA, EnableWindow, GetDlgItem
> GDI32.dll: SetDIBitsToDevice, SelectObject, CreateCompatibleDC, StretchBlt, BitBlt, RealizePalette, GetObjectA, TextOutA, SetBkColor, SelectPalette, GetStockObject, GetTextMetricsA, SetTextColor, DeleteObject, CreateDIBitmap, CreatePalette, DeleteDC
> ADVAPI32.dll: RegCloseKey, RegQueryValueExA, RegOpenKeyExA
( 0 exports )
PDFiD.: -
RDS...: NSRL Reference Data Set
-
CWSandbox info: <a href='http://research.sunbelt-software.com/partnerresource/MD5.aspx?md5=c87ee9ff49bf8b0d9cada154d2a6d900' target='_blank'>http://research.sunbelt-software.com/...
ThreatExpert info: <a href='http://www.threatexpert.com/report.aspx?md5=c87ee9ff49bf8b0d9cada154d2a6d900' target='_blank'>https://www.symantec.com?md5=c87ee9ff49bf8b0d9cada154d2a6d900</a>
et enfin c:\windows\Matrix Code.exe
Antivirus Version Dernière mise à jour Résultat
a-squared 4.0.0.101 2009.05.25 -
AhnLab-V3 5.0.0.2 2009.05.25 -
AntiVir 7.9.0.168 2009.05.25 -
Antiy-AVL 2.0.3.1 2009.05.25 -
Authentium 5.1.2.4 2009.05.25 -
Avast 4.8.1335.0 2009.05.25 -
AVG 8.5.0.339 2009.05.25 -
BitDefender 7.2 2009.05.25 -
CAT-QuickHeal 10.00 2009.05.25 -
ClamAV 0.94.1 2009.05.25 -
Comodo 1199 2009.05.25 -
DrWeb 5.0.0.12182 2009.05.25 -
eSafe 7.0.17.0 2009.05.24 -
eTrust-Vet 31.6.6521 2009.05.25 -
F-Prot 4.4.4.56 2009.05.25 -
F-Secure 8.0.14470.0 2009.05.25 -
Fortinet 3.117.0.0 2009.05.25 -
GData 19 2009.05.25 -
Ikarus T3.1.1.49.0 2009.05.25 -
K7AntiVirus 7.10.741 2009.05.21 -
Kaspersky 7.0.0.125 2009.05.25 -
McAfee 5626 2009.05.25 -
McAfee+Artemis 5626 2009.05.25 -
McAfee-GW-Edition 6.7.6 2009.05.25 -
Microsoft 1.4701 2009.05.25 -
NOD32 4101 2009.05.25 -
Norman 6.01.05 2009.05.25 -
nProtect 2009.1.8.0 2009.05.25 -
Panda 10.0.0.14 2009.05.24 -
PCTools 4.4.2.0 2009.05.21 -
Prevx 3.0 2009.05.25 -
Rising 21.31.04.00 2009.05.25 -
Sophos 4.42.0 2009.05.25 -
Sunbelt 3.2.1858.2 2009.05.24 -
Symantec 1.4.4.12 2009.05.25 -
TheHacker 6.3.4.3.331 2009.05.25 -
TrendMicro 8.950.0.1092 2009.05.25 -
VBA32 3.12.10.5 2009.05.25 -
ViRobot 2009.5.25.1751 2009.05.25 -
VirusBuster 4.6.5.0 2009.05.25 -
Information additionnelle
File size: 2285222 bytes
MD5...: 9bb7a8d40ae8c2e020746ff0f401e84c
SHA1..: afcec1711913cf08c831d7495deff13a38c8014b
SHA256: 1550ac5bf86dc93fb1b827d75224520f747ba3d9c8b44abd30ea8a885982b06b
ssdeep: 49152:gY2qXM0lyaG+orCDRAxM6kRo/oJ1G0B0im6YWC:r2qXwfXCSJkRb9mRWC
PEiD..: InstallShield 2000
TrID..: File type identification
Macromedia Projector/Flash executable (86.5%)
Windows OCX File (9.5%)
Win32 Executable MS Visual C++ (generic) (2.9%)
Win32 Executable Generic (0.6%)
Generic Win/DOS Executable (0.1%)
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x1000
timedatestamp.....: 0x3664eecb (Wed Dec 02 07:39:55 1998)
machinetype.......: 0x14c (I386)
( 4 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x801e 0x8200 6.08 664f7f88e9591f121a5d1c28e39b5cc7
.rdata 0xa000 0x127d 0x1400 5.94 4face091087b5603b1e6cbc952acddcd
.data 0xc000 0x2204 0x1800 4.95 ad3e5b57631c8a8b52d1633777b2e1b6
.rsrc 0xf000 0xd098 0xd200 4.59 ced87e8e513a77c7285ffc680255102a
( 5 imports )
> MSVCRT.dll: _onexit, _controlfp, __dllonexit, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, _exit, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, strcmp, __2@YAPAXI@Z, __3@YAXPAX@Z, vsprintf, memmove, memcpy, _rmdir, strlen, strcat, _access, remove, strcpy, strrchr, _splitpath, _makepath, memset, strncpy
> KERNEL32.dll: GlobalUnlock, CreateDirectoryA, GetModuleHandleA, GetStartupInfoA, _lclose, _lcreat, GetTempFileNameA, _lwrite, _llseek, _lopen, lstrlenA, OpenFile, Sleep, FreeLibrary, LoadLibraryA, GetModuleFileNameA, _lread, SetErrorMode, GlobalFree, FindClose, GlobalLock, GlobalAlloc, GlobalSize, GlobalReAlloc, GetProcAddress, GetTempPathA, GetShortPathNameA, RemoveDirectoryA, FindNextFileA, DeleteFileA, FindFirstFileA, WinExec
> USER32.dll: GetKeyState, MessageBoxA, WaitMessage, DispatchMessageA, wsprintfA, LoadIconA, SetWindowTextA, GetDlgItem, EndDialog, DialogBoxParamA, ExitWindowsEx, SetWindowPos, GetWindowRect, DestroyWindow, CreateWindowExA, ShowWindow, RegisterClassA, GetClassInfoA, GetWindowTextLengthA, SetFocus, MoveWindow, SendMessageA, CallWindowProcA, DrawTextA, IsDlgButtonChecked, PeekMessageA, TranslateMessage, DefWindowProcA, LoadStringA
> GDI32.dll: GetStockObject
> ADVAPI32.dll: RegCreateKeyExA, RegCloseKey, RegQueryValueA, RegOpenKeyExA, RegQueryValueExA
( 4 exports )
MsgDisplayString, _FindEmbeddedMovie, _GetCurrentEmbeddedMovie, _HandleWaitingMessages
PDFiD.: -
RDS...: NSRL Reference Data Set
-
ThreatExpert info: <a href='http://www.threatexpert.com/report.aspx?md5=9bb7a8d40ae8c2e020746ff0f401e84c' target='_blank'>https://www.symantec.com?md5=9bb7a8d40ae8c2e020746ff0f401e84c</a>
Antivirus Version Dernière mise à jour Résultat
a-squared 4.0.0.101 2009.05.25 -
AhnLab-V3 5.0.0.2 2009.05.25 -
AntiVir 7.9.0.168 2009.05.25 -
Antiy-AVL 2.0.3.1 2009.05.25 -
Authentium 5.1.2.4 2009.05.25 -
Avast 4.8.1335.0 2009.05.25 -
AVG 8.5.0.339 2009.05.25 -
BitDefender 7.2 2009.05.25 -
CAT-QuickHeal 10.00 2009.05.25 -
ClamAV 0.94.1 2009.05.25 -
Comodo 1199 2009.05.25 -
DrWeb 5.0.0.12182 2009.05.25 -
eSafe 7.0.17.0 2009.05.24 -
eTrust-Vet 31.6.6521 2009.05.25 -
F-Prot 4.4.4.56 2009.05.25 -
F-Secure 8.0.14470.0 2009.05.25 -
Fortinet 3.117.0.0 2009.05.25 -
GData 19 2009.05.25 -
Ikarus T3.1.1.49.0 2009.05.25 -
K7AntiVirus 7.10.741 2009.05.21 -
Kaspersky 7.0.0.125 2009.05.25 -
McAfee 5626 2009.05.25 -
McAfee+Artemis 5626 2009.05.25 -
McAfee-GW-Edition 6.7.6 2009.05.25 -
Microsoft 1.4701 2009.05.25 -
NOD32 4101 2009.05.25 -
Norman 6.01.05 2009.05.25 -
nProtect 2009.1.8.0 2009.05.25 -
Panda 10.0.0.14 2009.05.24 -
PCTools 4.4.2.0 2009.05.21 -
Prevx 3.0 2009.05.25 -
Rising 21.31.04.00 2009.05.25 -
Sophos 4.42.0 2009.05.25 -
Sunbelt 3.2.1858.2 2009.05.24 -
Symantec 1.4.4.12 2009.05.25 -
TheHacker 6.3.4.3.331 2009.05.25 -
TrendMicro 8.950.0.1092 2009.05.25 -
VBA32 3.12.10.5 2009.05.25 -
ViRobot 2009.5.25.1751 2009.05.25 -
VirusBuster 4.6.5.0 2009.05.25 -
Information additionnelle
File size: 2285222 bytes
MD5...: 9bb7a8d40ae8c2e020746ff0f401e84c
SHA1..: afcec1711913cf08c831d7495deff13a38c8014b
SHA256: 1550ac5bf86dc93fb1b827d75224520f747ba3d9c8b44abd30ea8a885982b06b
ssdeep: 49152:gY2qXM0lyaG+orCDRAxM6kRo/oJ1G0B0im6YWC:r2qXwfXCSJkRb9mRWC
PEiD..: InstallShield 2000
TrID..: File type identification
Macromedia Projector/Flash executable (86.5%)
Windows OCX File (9.5%)
Win32 Executable MS Visual C++ (generic) (2.9%)
Win32 Executable Generic (0.6%)
Generic Win/DOS Executable (0.1%)
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x1000
timedatestamp.....: 0x3664eecb (Wed Dec 02 07:39:55 1998)
machinetype.......: 0x14c (I386)
( 4 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x801e 0x8200 6.08 664f7f88e9591f121a5d1c28e39b5cc7
.rdata 0xa000 0x127d 0x1400 5.94 4face091087b5603b1e6cbc952acddcd
.data 0xc000 0x2204 0x1800 4.95 ad3e5b57631c8a8b52d1633777b2e1b6
.rsrc 0xf000 0xd098 0xd200 4.59 ced87e8e513a77c7285ffc680255102a
( 5 imports )
> MSVCRT.dll: _onexit, _controlfp, __dllonexit, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, _exit, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, strcmp, __2@YAPAXI@Z, __3@YAXPAX@Z, vsprintf, memmove, memcpy, _rmdir, strlen, strcat, _access, remove, strcpy, strrchr, _splitpath, _makepath, memset, strncpy
> KERNEL32.dll: GlobalUnlock, CreateDirectoryA, GetModuleHandleA, GetStartupInfoA, _lclose, _lcreat, GetTempFileNameA, _lwrite, _llseek, _lopen, lstrlenA, OpenFile, Sleep, FreeLibrary, LoadLibraryA, GetModuleFileNameA, _lread, SetErrorMode, GlobalFree, FindClose, GlobalLock, GlobalAlloc, GlobalSize, GlobalReAlloc, GetProcAddress, GetTempPathA, GetShortPathNameA, RemoveDirectoryA, FindNextFileA, DeleteFileA, FindFirstFileA, WinExec
> USER32.dll: GetKeyState, MessageBoxA, WaitMessage, DispatchMessageA, wsprintfA, LoadIconA, SetWindowTextA, GetDlgItem, EndDialog, DialogBoxParamA, ExitWindowsEx, SetWindowPos, GetWindowRect, DestroyWindow, CreateWindowExA, ShowWindow, RegisterClassA, GetClassInfoA, GetWindowTextLengthA, SetFocus, MoveWindow, SendMessageA, CallWindowProcA, DrawTextA, IsDlgButtonChecked, PeekMessageA, TranslateMessage, DefWindowProcA, LoadStringA
> GDI32.dll: GetStockObject
> ADVAPI32.dll: RegCreateKeyExA, RegCloseKey, RegQueryValueA, RegOpenKeyExA, RegQueryValueExA
( 4 exports )
MsgDisplayString, _FindEmbeddedMovie, _GetCurrentEmbeddedMovie, _HandleWaitingMessages
PDFiD.: -
RDS...: NSRL Reference Data Set
-
ThreatExpert info: <a href='http://www.threatexpert.com/report.aspx?md5=9bb7a8d40ae8c2e020746ff0f401e84c' target='_blank'>https://www.symantec.com?md5=9bb7a8d40ae8c2e020746ff0f401e84c</a>
voila donc au total ca fait 5 rapport par ce qu'il manque celui de c:\windows\system32\drivers\fssfltr_tdi.sys!! ^^
désolé j'ai finalement fini par trouver le fichier demander!!! le voila!! ^^ donc voila tu as maintenant les 6!!
Antivirus Version Dernière mise à jour Résultat
a-squared 4.0.0.101 2009.05.25 -
AhnLab-V3 5.0.0.2 2009.05.25 -
AntiVir 7.9.0.168 2009.05.25 -
Antiy-AVL 2.0.3.1 2009.05.25 -
Authentium 5.1.2.4 2009.05.25 -
Avast 4.8.1335.0 2009.05.25 -
AVG 8.5.0.339 2009.05.25 -
BitDefender 7.2 2009.05.25 -
CAT-QuickHeal 10.00 2009.05.25 -
ClamAV 0.94.1 2009.05.25 -
Comodo 1199 2009.05.25 -
DrWeb 5.0.0.12182 2009.05.25 -
eSafe 7.0.17.0 2009.05.24 -
eTrust-Vet 31.6.6521 2009.05.25 -
F-Prot 4.4.4.56 2009.05.25 -
F-Secure 8.0.14470.0 2009.05.25 -
Fortinet 3.117.0.0 2009.05.25 -
GData 19 2009.05.25 -
Ikarus T3.1.1.49.0 2009.05.25 -
K7AntiVirus 7.10.741 2009.05.21 -
Kaspersky 7.0.0.125 2009.05.25 -
McAfee 5626 2009.05.25 -
McAfee+Artemis 5626 2009.05.25 -
McAfee-GW-Edition 6.7.6 2009.05.25 -
Microsoft 1.4701 2009.05.25 -
NOD32 4101 2009.05.25 -
Norman 6.01.05 2009.05.25 -
nProtect 2009.1.8.0 2009.05.25 -
Panda 10.0.0.14 2009.05.24 -
PCTools 4.4.2.0 2009.05.21 -
Prevx 3.0 2009.05.25 -
Rising 21.31.04.00 2009.05.25 -
Sophos 4.42.0 2009.05.25 -
Sunbelt 3.2.1858.2 2009.05.24 -
Symantec 1.4.4.12 2009.05.25 -
TheHacker 6.3.4.3.331 2009.05.25 -
TrendMicro 8.950.0.1092 2009.05.25 -
VBA32 3.12.10.5 2009.05.25 -
ViRobot 2009.5.25.1751 2009.05.25 -
VirusBuster 4.6.5.0 2009.05.25 -
Information additionnelle
File size: 55152 bytes
MD5...: 960f5e5e4e1f720465311ac68a99c2df
SHA1..: ba51b9a230e21f4c2cfa84b7ba02b7f4cb3f6c10
SHA256: f52e2fb00ca71bb414d97e16be7a65e90e813d73ea0d303dc9af93bfef9f8ade
ssdeep: 768:7iHp1w39JVAaC1H9xllMGCaaakgTc+f1OwAFFyYPcXOtsqsj/c/iR1jIte:7
iJwJJC1TiyktGzR1Ete
PEiD..: -
TrID..: File type identification
Win32 Executable Generic (51.1%)
Win16/32 Executable Delphi generic (12.4%)
Clipper DOS Executable (12.1%)
Generic Win/DOS Executable (12.0%)
DOS Executable Generic (12.0%)
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x9771
timedatestamp.....: 0x498ce6d9 (Sat Feb 07 01:41:45 2009)
machinetype.......: 0x14c (I386)
( 7 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x480 0x5b29 0x5b80 6.51 b4f32d1ae46ab4d378c2a9cfee6e8131
.rdata 0x6000 0xa4d 0xa80 4.78 d5d8209d95329664d252f20353b12b5c
.data 0x6a80 0x670 0x680 0.81 e433486359db396673d38c0fab01ce11
PAGE 0x7100 0x245a 0x2480 6.37 7582a460e28b4605c52202b88a09a721
INIT 0x9580 0x13e4 0x1400 6.23 7db9c10176363063c39bedd226c41561
.rsrc 0xa980 0x918 0x980 5.97 945ed6f7dca17932006587435d7072b1
.reloc 0xb300 0x88a 0x900 6.16 3ef017f43b85a37b21dd8a8591fa9da5
( 4 imports )
> ntoskrnl.exe: MmMapLockedPagesSpecifyCache, IoCsqRemoveNextIrp, IoSetCompletionRoutineEx, MmBuildMdlForNonPagedPool, IoAllocateMdl, ExInitializeNPagedLookasideList, ExDeleteNPagedLookasideList, RtlCompareMemory, RtlInitString, IoFreeMdl, ObfDereferenceObject, IoDeleteDevice, IoDetachDevice, InterlockedPopEntrySList, InterlockedPushEntrySList, ObReferenceObjectByHandle, IoFileObjectType, IoAttachDeviceToDeviceStackSafe, IoGetDeviceObjectPointer, RtlInitUnicodeString, IoCsqInsertIrp, KeTickCount, KeBugCheckEx, IofCallDriver, IoGetRequestorProcessId, SeQueryInformationToken, memcpy, RtlLengthSid, RtlInitializeGenericTableAvl, ExFreePoolWithTag, ExAllocatePoolWithTag, RtlLookupElementGenericTableAvl, IofCompleteRequest, KeSetTimer, KeCancelTimer, KeInsertQueueDpc, KeInitializeTimer, KeInitializeDpc, IoDeleteSymbolicLink, IoWMIRegistrationControl, RtlValidSid, IoCreateSymbolicLink, RtlCopyUnicodeString, IoWMIWriteEvent, MmGetSystemRoutineAddress, IoCsqInitialize, ExAllocatePool, RtlDeleteElementGenericTableAvl, RtlLookupElementGenericTableFullAvl, RtlInsertElementGenericTableFullAvl, memset, IoCreateDevice, ZwClose, ZwSetSecurityObject, ObOpenObjectByPointer, IoDeviceObjectType, RtlGetDaclSecurityDescriptor, RtlGetSaclSecurityDescriptor, RtlGetGroupSecurityDescriptor, RtlGetOwnerSecurityDescriptor, _snwprintf, RtlLengthSecurityDescriptor, SeCaptureSecurityDescriptor, SeExports, IoIsWdmVersionAvailable, _wcsnicmp, RtlAddAccessAllowedAce, wcschr, RtlAbsoluteToSelfRelativeSD, RtlSetDaclSecurityDescriptor, RtlCreateSecurityDescriptor, ZwOpenKey, ZwCreateKey, ZwQueryValueKey, ZwSetValueKey, RtlFreeUnicodeString
> HAL.dll: KeAcquireInStackQueuedSpinLock, KfReleaseSpinLock, KfAcquireSpinLock, KeReleaseInStackQueuedSpinLock
> TDI.SYS: TdiMapUserRequest, TdiDefaultChainedRcvExpeditedHandler, TdiDefaultChainedReceiveHandler, TdiDefaultRcvExpeditedHandler, TdiDefaultReceiveHandler
> WMILIB.SYS: WmiCompleteRequest, WmiSystemControl
( 0 exports )
PDFiD.: -
RDS...: NSRL Reference Data Set
-
Antivirus Version Dernière mise à jour Résultat
a-squared 4.0.0.101 2009.05.25 -
AhnLab-V3 5.0.0.2 2009.05.25 -
AntiVir 7.9.0.168 2009.05.25 -
Antiy-AVL 2.0.3.1 2009.05.25 -
Authentium 5.1.2.4 2009.05.25 -
Avast 4.8.1335.0 2009.05.25 -
AVG 8.5.0.339 2009.05.25 -
BitDefender 7.2 2009.05.25 -
CAT-QuickHeal 10.00 2009.05.25 -
ClamAV 0.94.1 2009.05.25 -
Comodo 1199 2009.05.25 -
DrWeb 5.0.0.12182 2009.05.25 -
eSafe 7.0.17.0 2009.05.24 -
eTrust-Vet 31.6.6521 2009.05.25 -
F-Prot 4.4.4.56 2009.05.25 -
F-Secure 8.0.14470.0 2009.05.25 -
Fortinet 3.117.0.0 2009.05.25 -
GData 19 2009.05.25 -
Ikarus T3.1.1.49.0 2009.05.25 -
K7AntiVirus 7.10.741 2009.05.21 -
Kaspersky 7.0.0.125 2009.05.25 -
McAfee 5626 2009.05.25 -
McAfee+Artemis 5626 2009.05.25 -
McAfee-GW-Edition 6.7.6 2009.05.25 -
Microsoft 1.4701 2009.05.25 -
NOD32 4101 2009.05.25 -
Norman 6.01.05 2009.05.25 -
nProtect 2009.1.8.0 2009.05.25 -
Panda 10.0.0.14 2009.05.24 -
PCTools 4.4.2.0 2009.05.21 -
Prevx 3.0 2009.05.25 -
Rising 21.31.04.00 2009.05.25 -
Sophos 4.42.0 2009.05.25 -
Sunbelt 3.2.1858.2 2009.05.24 -
Symantec 1.4.4.12 2009.05.25 -
TheHacker 6.3.4.3.331 2009.05.25 -
TrendMicro 8.950.0.1092 2009.05.25 -
VBA32 3.12.10.5 2009.05.25 -
ViRobot 2009.5.25.1751 2009.05.25 -
VirusBuster 4.6.5.0 2009.05.25 -
Information additionnelle
File size: 55152 bytes
MD5...: 960f5e5e4e1f720465311ac68a99c2df
SHA1..: ba51b9a230e21f4c2cfa84b7ba02b7f4cb3f6c10
SHA256: f52e2fb00ca71bb414d97e16be7a65e90e813d73ea0d303dc9af93bfef9f8ade
ssdeep: 768:7iHp1w39JVAaC1H9xllMGCaaakgTc+f1OwAFFyYPcXOtsqsj/c/iR1jIte:7
iJwJJC1TiyktGzR1Ete
PEiD..: -
TrID..: File type identification
Win32 Executable Generic (51.1%)
Win16/32 Executable Delphi generic (12.4%)
Clipper DOS Executable (12.1%)
Generic Win/DOS Executable (12.0%)
DOS Executable Generic (12.0%)
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x9771
timedatestamp.....: 0x498ce6d9 (Sat Feb 07 01:41:45 2009)
machinetype.......: 0x14c (I386)
( 7 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x480 0x5b29 0x5b80 6.51 b4f32d1ae46ab4d378c2a9cfee6e8131
.rdata 0x6000 0xa4d 0xa80 4.78 d5d8209d95329664d252f20353b12b5c
.data 0x6a80 0x670 0x680 0.81 e433486359db396673d38c0fab01ce11
PAGE 0x7100 0x245a 0x2480 6.37 7582a460e28b4605c52202b88a09a721
INIT 0x9580 0x13e4 0x1400 6.23 7db9c10176363063c39bedd226c41561
.rsrc 0xa980 0x918 0x980 5.97 945ed6f7dca17932006587435d7072b1
.reloc 0xb300 0x88a 0x900 6.16 3ef017f43b85a37b21dd8a8591fa9da5
( 4 imports )
> ntoskrnl.exe: MmMapLockedPagesSpecifyCache, IoCsqRemoveNextIrp, IoSetCompletionRoutineEx, MmBuildMdlForNonPagedPool, IoAllocateMdl, ExInitializeNPagedLookasideList, ExDeleteNPagedLookasideList, RtlCompareMemory, RtlInitString, IoFreeMdl, ObfDereferenceObject, IoDeleteDevice, IoDetachDevice, InterlockedPopEntrySList, InterlockedPushEntrySList, ObReferenceObjectByHandle, IoFileObjectType, IoAttachDeviceToDeviceStackSafe, IoGetDeviceObjectPointer, RtlInitUnicodeString, IoCsqInsertIrp, KeTickCount, KeBugCheckEx, IofCallDriver, IoGetRequestorProcessId, SeQueryInformationToken, memcpy, RtlLengthSid, RtlInitializeGenericTableAvl, ExFreePoolWithTag, ExAllocatePoolWithTag, RtlLookupElementGenericTableAvl, IofCompleteRequest, KeSetTimer, KeCancelTimer, KeInsertQueueDpc, KeInitializeTimer, KeInitializeDpc, IoDeleteSymbolicLink, IoWMIRegistrationControl, RtlValidSid, IoCreateSymbolicLink, RtlCopyUnicodeString, IoWMIWriteEvent, MmGetSystemRoutineAddress, IoCsqInitialize, ExAllocatePool, RtlDeleteElementGenericTableAvl, RtlLookupElementGenericTableFullAvl, RtlInsertElementGenericTableFullAvl, memset, IoCreateDevice, ZwClose, ZwSetSecurityObject, ObOpenObjectByPointer, IoDeviceObjectType, RtlGetDaclSecurityDescriptor, RtlGetSaclSecurityDescriptor, RtlGetGroupSecurityDescriptor, RtlGetOwnerSecurityDescriptor, _snwprintf, RtlLengthSecurityDescriptor, SeCaptureSecurityDescriptor, SeExports, IoIsWdmVersionAvailable, _wcsnicmp, RtlAddAccessAllowedAce, wcschr, RtlAbsoluteToSelfRelativeSD, RtlSetDaclSecurityDescriptor, RtlCreateSecurityDescriptor, ZwOpenKey, ZwCreateKey, ZwQueryValueKey, ZwSetValueKey, RtlFreeUnicodeString
> HAL.dll: KeAcquireInStackQueuedSpinLock, KfReleaseSpinLock, KfAcquireSpinLock, KeReleaseInStackQueuedSpinLock
> TDI.SYS: TdiMapUserRequest, TdiDefaultChainedRcvExpeditedHandler, TdiDefaultChainedReceiveHandler, TdiDefaultRcvExpeditedHandler, TdiDefaultReceiveHandler
> WMILIB.SYS: WmiCompleteRequest, WmiSystemControl
( 0 exports )
PDFiD.: -
RDS...: NSRL Reference Data Set
-
sKe69
Messages postés
21360
Date d'inscription
samedi 15 mars 2008
Statut
Contributeur sécurité
Dernière intervention
30 décembre 2012
463
25 mai 2009 à 18:10
25 mai 2009 à 18:10
vu ,
je te donne la suite ....
^^
je te donne la suite ....
^^
sKe69
Messages postés
21360
Date d'inscription
samedi 15 mars 2008
Statut
Contributeur sécurité
Dernière intervention
30 décembre 2012
463
25 mai 2009 à 18:13
25 mai 2009 à 18:13
fais ceci :
Télécharge OAD ( par !aur3n7) : http://sosvirus.changelog.fr/OAD.exe
----> Enregistre le sur ton bureau .
Double clique sur l'icone OAD pour le lancer
- nom du fichier à rechercher :
-->tape ou fais un copier coller de : FileZilla Server FTP server
- Type de recherche : sélectionne l'option 7 puis valide ["entrée"]
OAD va maintenant rechercher le fichier. Laisse le travailler jusqu'à ce qu'il en ait terminé.
Le rapport de recherche s'affichera automatiquement à l’écran dès qu'il aura terminé.
Note : suivant la taille des disques durs cette recherche peut prendre plusieurs minutes. Sois patient ...
->Sauvegarde ce rapport sur ton Bureau et fais un copier / coller de celui-ci dans ta prochaine réponse ...
Puis recommence avec :
FileZilla Server
Poste moi donc les deux rapports obtenu ...
Télécharge OAD ( par !aur3n7) : http://sosvirus.changelog.fr/OAD.exe
----> Enregistre le sur ton bureau .
Double clique sur l'icone OAD pour le lancer
- nom du fichier à rechercher :
-->tape ou fais un copier coller de : FileZilla Server FTP server
- Type de recherche : sélectionne l'option 7 puis valide ["entrée"]
OAD va maintenant rechercher le fichier. Laisse le travailler jusqu'à ce qu'il en ait terminé.
Le rapport de recherche s'affichera automatiquement à l’écran dès qu'il aura terminé.
Note : suivant la taille des disques durs cette recherche peut prendre plusieurs minutes. Sois patient ...
->Sauvegarde ce rapport sur ton Bureau et fais un copier / coller de celui-ci dans ta prochaine réponse ...
Puis recommence avec :
FileZilla Server
Poste moi donc les deux rapports obtenu ...
25/05/2009 ---- 18:16:20,15
----------------------------------
§§§§§§ [FileZilla Server FtP server] §§§§§§
----------------------------------
[X] Registre
********************
[Registre]
********************
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Enum\Root\LEGACY_FILEZILLA_SERVER\0000]
"DeviceDesc"="FileZilla Server FTP server"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\FileZilla Server]
"DisplayName"="FileZilla Server FTP server"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet005\Enum\Root\LEGACY_FILEZILLA_SERVER\0000]
"DeviceDesc"="FileZilla Server FTP server"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet005\Services\FileZilla Server]
"DisplayName"="FileZilla Server FTP server"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_FILEZILLA_SERVER\0000]
"DeviceDesc"="FileZilla Server FTP server"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\FileZilla Server]
"DisplayName"="FileZilla Server FTP server"
Outil Aide Diagnostic By !aur3n7 Version 1.1
----------------------------------
§§§§§ Fin Rapport §§§§§
----------------------------------
----------------------------------
§§§§§§ [FileZilla Server FtP server] §§§§§§
----------------------------------
[X] Registre
********************
[Registre]
********************
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Enum\Root\LEGACY_FILEZILLA_SERVER\0000]
"DeviceDesc"="FileZilla Server FTP server"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\FileZilla Server]
"DisplayName"="FileZilla Server FTP server"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet005\Enum\Root\LEGACY_FILEZILLA_SERVER\0000]
"DeviceDesc"="FileZilla Server FTP server"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet005\Services\FileZilla Server]
"DisplayName"="FileZilla Server FTP server"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_FILEZILLA_SERVER\0000]
"DeviceDesc"="FileZilla Server FTP server"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\FileZilla Server]
"DisplayName"="FileZilla Server FTP server"
Outil Aide Diagnostic By !aur3n7 Version 1.1
----------------------------------
§§§§§ Fin Rapport §§§§§
----------------------------------
25/05/2009 ---- 18:19:42,25
----------------------------------
§§§§§§ [FileZilla Server] §§§§§§
----------------------------------
[X] Registre
********************
[Registre]
********************
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Enum\Root\LEGACY_FILEZILLA_SERVER\0000]
"Service"="FileZilla Server"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Enum\Root\LEGACY_FILEZILLA_SERVER\0000]
"DeviceDesc"="FileZilla Server FTP server"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\FileZilla Server]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\FileZilla Server]
"DisplayName"="FileZilla Server FTP server"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\FileZilla Server\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\FileZilla Server\Enum]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet005\Enum\Root\LEGACY_FILEZILLA_SERVER\0000]
"Service"="FileZilla Server"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet005\Enum\Root\LEGACY_FILEZILLA_SERVER\0000]
"DeviceDesc"="FileZilla Server FTP server"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet005\Services\FileZilla Server]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet005\Services\FileZilla Server]
"DisplayName"="FileZilla Server FTP server"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet005\Services\FileZilla Server\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_FILEZILLA_SERVER\0000]
"Service"="FileZilla Server"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_FILEZILLA_SERVER\0000]
"DeviceDesc"="FileZilla Server FTP server"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\FileZilla Server]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\FileZilla Server]
"DisplayName"="FileZilla Server FTP server"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\FileZilla Server\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\FileZilla Server\Enum]
[HKEY_USERS\S-1-5-21-329068152-1454471165-1177238915-1004\Software\Microsoft\Windows\ShellNoRoam\MUICache]
"C:\\WINDOWS\\system\\System\\FZS\\FlashPlayer.exe"="FileZilla Server"
Outil Aide Diagnostic By !aur3n7 Version 1.1
----------------------------------
§§§§§ Fin Rapport §§§§§
----------------------------------
----------------------------------
§§§§§§ [FileZilla Server] §§§§§§
----------------------------------
[X] Registre
********************
[Registre]
********************
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Enum\Root\LEGACY_FILEZILLA_SERVER\0000]
"Service"="FileZilla Server"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Enum\Root\LEGACY_FILEZILLA_SERVER\0000]
"DeviceDesc"="FileZilla Server FTP server"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\FileZilla Server]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\FileZilla Server]
"DisplayName"="FileZilla Server FTP server"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\FileZilla Server\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\FileZilla Server\Enum]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet005\Enum\Root\LEGACY_FILEZILLA_SERVER\0000]
"Service"="FileZilla Server"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet005\Enum\Root\LEGACY_FILEZILLA_SERVER\0000]
"DeviceDesc"="FileZilla Server FTP server"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet005\Services\FileZilla Server]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet005\Services\FileZilla Server]
"DisplayName"="FileZilla Server FTP server"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet005\Services\FileZilla Server\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_FILEZILLA_SERVER\0000]
"Service"="FileZilla Server"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_FILEZILLA_SERVER\0000]
"DeviceDesc"="FileZilla Server FTP server"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\FileZilla Server]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\FileZilla Server]
"DisplayName"="FileZilla Server FTP server"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\FileZilla Server\Security]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\FileZilla Server\Enum]
[HKEY_USERS\S-1-5-21-329068152-1454471165-1177238915-1004\Software\Microsoft\Windows\ShellNoRoam\MUICache]
"C:\\WINDOWS\\system\\System\\FZS\\FlashPlayer.exe"="FileZilla Server"
Outil Aide Diagnostic By !aur3n7 Version 1.1
----------------------------------
§§§§§ Fin Rapport §§§§§
----------------------------------
sKe69
Messages postés
21360
Date d'inscription
samedi 15 mars 2008
Statut
Contributeur sécurité
Dernière intervention
30 décembre 2012
463
25 mai 2009 à 18:21
25 mai 2009 à 18:21
merci ...
je te prépare la suite ... ;)
je te prépare la suite ... ;)
sKe69
Messages postés
21360
Date d'inscription
samedi 15 mars 2008
Statut
Contributeur sécurité
Dernière intervention
30 décembre 2012
463
25 mai 2009 à 18:38
25 mai 2009 à 18:38
la suite :
1-Créer un doc texte sur ton bureau :
pointe ta souris sur ton bureau , clique droit : va dans "nouveau" et choisis "document texte" .
* Rends toi sur cette page > https://www.cjoint.com/?fzsLyEwqGX
* copie/colle tout le texte qui s'y trouve ( et rien d'autre!) dans le fichier texte que tu viens de créer :
* Pour sauvegarder, va dans "fichier" et choisis "enregistrer sous ..." et tu le nommes exactement ainsi :
CFScript puis valide ... ( sauvegarde le bien sur le bureau )
2-Nettoyage :
!! Déconnecte toi, ferme toutes tes applications et désactive TOUTES TES DEFENSES ( tu les réactiveras après ) !!
--->Sur ton bureau, fais glisser avec ta souris le fichier CFScript sur l'icône de ComboFix.exe .
(Regarde ici : http://img.photobucket.com/albums/v666/sUBs/CFScript.gif )
Cette manipulation va relancer combofix .
--> Une fenêtre bleue va apparaître: au message qui apparaît "Type 1 to continue, or 2 to abort" : tape 1 puis valide.
Puis patiente le temps du scan.( Le Bureau va disparaître à plusieurs reprises : c'est normal!)
!! Ne touches à rien tant que le scan n'est pas terminé !!
Note : en fin de scan, il est possible que ComboFix ait besoin de redémarrer le PC pour finaliser la désinfection, laisse-le faire.
Une fois le scan achevé, un rapport va s'afficher : poste le accompagné d' un nouveau rapport RSIT pour analyse ...
( Attention : cette manipe a été fait pour ce PC . Toute réutilisation peut endommager sévèrement le système d'exploitation )
1-Créer un doc texte sur ton bureau :
pointe ta souris sur ton bureau , clique droit : va dans "nouveau" et choisis "document texte" .
* Rends toi sur cette page > https://www.cjoint.com/?fzsLyEwqGX
* copie/colle tout le texte qui s'y trouve ( et rien d'autre!) dans le fichier texte que tu viens de créer :
* Pour sauvegarder, va dans "fichier" et choisis "enregistrer sous ..." et tu le nommes exactement ainsi :
CFScript puis valide ... ( sauvegarde le bien sur le bureau )
2-Nettoyage :
!! Déconnecte toi, ferme toutes tes applications et désactive TOUTES TES DEFENSES ( tu les réactiveras après ) !!
--->Sur ton bureau, fais glisser avec ta souris le fichier CFScript sur l'icône de ComboFix.exe .
(Regarde ici : http://img.photobucket.com/albums/v666/sUBs/CFScript.gif )
Cette manipulation va relancer combofix .
--> Une fenêtre bleue va apparaître: au message qui apparaît "Type 1 to continue, or 2 to abort" : tape 1 puis valide.
Puis patiente le temps du scan.( Le Bureau va disparaître à plusieurs reprises : c'est normal!)
!! Ne touches à rien tant que le scan n'est pas terminé !!
Note : en fin de scan, il est possible que ComboFix ait besoin de redémarrer le PC pour finaliser la désinfection, laisse-le faire.
Une fois le scan achevé, un rapport va s'afficher : poste le accompagné d' un nouveau rapport RSIT pour analyse ...
( Attention : cette manipe a été fait pour ce PC . Toute réutilisation peut endommager sévèrement le système d'exploitation )
ComboFix 09-05-24.07 - Killan 25/05/2009 18:48.2 - NTFSx86
Microsoft Windows XP Édition familiale 5.1.2600.3.1252.33.1036.18.1919.1412 [GMT 2:00]
Lancé depuis: c:\documents and settings\Killan\Bureau\CFix.exe
Commutateurs utilisés :: c:\documents and settings\Killan\Bureau\CFScript.txt
AV: avast! antivirus 4.8.1335 [VPS 090524-0] *On-access scanning enabled* (Updated) {7591DB91-41F0-48A3-B128-1A293FD8233D}
.
(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
((((((((((((((((((((((((((((((((((((((( Pilotes/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
-------\Legacy_FILEZILLA_SERVER
-------\Service_msqpdxserv.sys
((((((((((((((((((((((((((((( Fichiers créés du 2009-04-25 au 2009-05-25 ))))))))))))))))))))))))))))))))))))
.
2009-05-25 14:46 . 2009-05-25 14:51 -------- d-s---w C:\ComboFix
2009-05-24 17:53 . 2009-05-25 05:49 -------- d-----w C:\UsbFix
2009-05-24 16:52 . 2009-05-24 16:52 -------- d-----w C:\rsit
2009-05-24 15:45 . 2009-05-24 16:51 -------- d-----w c:\program files\Ad-remover
2009-05-24 15:19 . 2009-05-24 16:37 -------- d-----w C:\ToolBar SD
2009-05-24 15:05 . 2009-05-24 15:05 -------- d-----w c:\program files\Trend Micro
2009-05-24 14:16 . 2009-02-06 16:08 55152 ----a-w c:\windows\system32\drivers\fssfltr_tdi.sys
2009-05-24 14:15 . 2009-05-24 14:15 -------- d-----w c:\program files\Microsoft Sync Framework
2009-05-16 20:24 . 2009-05-16 20:24 -------- d-----w C:\NVIDIA
2009-05-15 17:31 . 2009-03-19 14:32 23400 ----a-w c:\windows\system32\drivers\GEARAspiWDM.sys
2009-05-15 17:31 . 2008-04-17 10:12 107368 ----a-w c:\windows\system32\GEARAspi.dll
2009-05-15 17:30 . 2009-05-15 17:30 -------- d-----w c:\program files\iPod
2009-05-15 17:30 . 2009-05-15 17:31 -------- d-----w c:\program files\iTunes
2009-05-15 17:30 . 2009-05-15 17:31 -------- d-----w c:\documents and settings\All Users\Application Data\{8CD7F5AF-ECFA-4793-BF40-D8F42DBFF906}
2009-05-15 17:30 . 2009-05-15 17:30 -------- d-----w c:\program files\Bonjour
2009-05-15 17:29 . 2009-05-15 17:30 -------- d-----w c:\program files\Fichiers communs\Apple
2009-05-12 11:04 . 2009-05-14 13:38 -------- d-----w c:\program files\eMule
2009-05-06 16:57 . 2003-09-19 13:45 21248 ----a-w c:\windows\system32\drivers\pfc.sys
2009-04-30 22:31 . 2009-04-30 22:31 1657376 ----a-w c:\windows\system32\nwiz.exe
2009-04-30 22:31 . 2009-04-30 22:31 449056 ----a-w c:\windows\system32\nvappbar.exe
2009-04-30 22:31 . 2009-04-30 22:31 436768 ----a-w c:\windows\system32\keystone.exe
2009-04-30 22:31 . 2009-04-30 22:31 466944 ----a-w c:\windows\system32\nvshell.dll
2009-04-30 22:31 . 2009-04-30 22:31 1724416 ----a-w c:\windows\system32\nvwdmcpl.dll
2009-04-30 22:31 . 2009-04-30 22:31 1507328 ----a-w c:\windows\system32\nview.dll
2009-04-30 22:31 . 2009-04-30 22:31 1101824 ----a-w c:\windows\system32\nvwimg.dll
2009-04-30 20:02 . 2009-04-30 20:02 1579630 ----a-w c:\windows\system32\nvdata.bin
2009-04-30 20:02 . 2009-04-30 20:02 1314816 ----a-w c:\windows\system32\nvcuvenc.dll
2009-04-30 16:12 . 2009-04-30 16:14 -------- dc-h--w c:\windows\ie8
2009-04-28 15:32 . 2009-05-25 14:43 -------- d-----w c:\documents and settings\Killan\Application Data\uTorrent
.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-05-25 16:46 . 2009-02-07 09:52 -------- d-----w c:\documents and settings\Killan\Application Data\Spyware Terminator
2009-05-24 17:50 . 2009-02-01 16:59 -------- d-----w c:\program files\CCleaner
2009-05-24 16:02 . 2008-12-31 22:13 -------- d-----w c:\program files\Spybot - Search & Destroy
2009-05-24 16:01 . 2008-11-05 10:55 -------- d-----w c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2009-05-24 15:52 . 2008-04-14 12:00 84874 ----a-w c:\windows\system32\perfc00C.dat
2009-05-24 15:52 . 2008-04-14 12:00 510656 ----a-w c:\windows\system32\perfh00C.dat
2009-05-24 14:26 . 2009-02-19 11:51 -------- d-----w c:\program files\WinClamAVShield
2009-05-24 14:26 . 2009-02-07 09:52 -------- d-----w c:\documents and settings\All Users\Application Data\Spyware Terminator
2009-05-24 14:24 . 2009-02-07 09:52 -------- d-----w c:\program files\Spyware Terminator
2009-05-24 14:16 . 2008-11-09 13:36 -------- d-----w c:\program files\Windows Live
2009-05-24 10:15 . 2009-02-27 16:01 1 ----a-w c:\documents and settings\Killan\Application Data\OpenOffice.org\3\user\uno_packages\cache\stamp.sys
2009-05-23 13:34 . 2009-02-02 08:19 -------- d-----w c:\program files\URUSoft
2009-05-09 19:06 . 2009-02-05 21:56 -------- d-----w c:\program files\MSN Messenger
2009-05-06 17:01 . 2009-03-04 17:14 -------- d-----w c:\documents and settings\Killan\Application Data\ArcSoft
2009-05-06 16:54 . 2009-03-04 17:08 -------- d-----w c:\program files\ArcSoft
2009-05-06 16:54 . 2008-11-04 15:56 -------- d--h--w c:\program files\InstallShield Installation Information
2009-04-30 20:02 . 2009-02-09 12:18 663552 ----a-w c:\windows\system32\nvcuvid.dll
2009-04-30 20:02 . 2009-01-15 07:19 1720320 ----a-w c:\windows\system32\nvcuda.dll
2009-04-30 20:02 . 2008-11-04 15:57 457248 ----a-w c:\windows\system32\nvudisp.exe
2009-04-30 20:02 . 2006-10-30 22:35 9994240 ----a-w c:\windows\system32\nvoglnt.dll
2009-04-30 20:02 . 2006-10-30 22:35 806912 ----a-w c:\windows\system32\nvapi.dll
2009-04-30 20:02 . 2006-10-30 22:35 8055584 ----a-w c:\windows\system32\drivers\nv4_mini.sys
2009-04-30 20:02 . 2006-10-30 22:35 5896320 ----a-w c:\windows\system32\nv4_disp.dll
2009-04-30 20:02 . 2006-10-30 22:35 143360 ----a-w c:\windows\system32\nvcodins.dll
2009-04-30 20:02 . 2006-10-30 22:35 143360 ----a-w c:\windows\system32\nvcod.dll
2009-04-26 22:42 . 2009-01-24 13:24 457248 ----a-w c:\windows\system32\NVUNINST.EXE
2009-04-25 23:29 . 2008-11-07 09:58 13568 ----a-w c:\windows\system32\drivers\USBCRFT.SYS
2009-04-06 15:11 . 2009-04-06 15:11 -------- d-----w c:\program files\uTorrent
2009-04-03 08:25 . 2009-04-03 08:21 -------- d-----w c:\program files\GlobFX Technologies
2009-04-02 14:29 . 2009-04-02 14:29 75048 ----a-w c:\documents and settings\All Users\Application Data\Apple Computer\Installer Cache\iTunes 8.1.1.10\SetupAdmin.exe
2009-04-01 14:30 . 2009-04-01 14:30 528384 ----a-w c:\windows\system32\Niagara.scr
2009-04-01 08:43 . 2009-03-26 15:42 44239 ----a-w c:\windows\system32\sound32.dll
2009-03-30 14:12 . 2009-02-27 18:19 410984 ----a-w c:\windows\system32\deploytk.dll
2009-03-30 14:12 . 2009-02-27 15:57 -------- d-----w c:\program files\Java
2009-03-30 14:11 . 2009-03-26 18:48 152576 ----a-w c:\documents and settings\Killan\Application Data\Sun\Java\jre1.6.0_13\lzma.dll
2009-03-28 20:51 . 2008-11-04 17:12 22440 ----a-w c:\documents and settings\Killan\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-03-27 08:03 . 2006-10-30 22:35 45056 ----a-w c:\windows\system32\nvmccsrs.dll
2009-03-27 08:03 . 2006-10-30 22:35 1346080 ----a-w c:\windows\system32\nvdspsch.exe
2009-03-26 15:36 . 2009-03-26 15:32 29696 ----a-w c:\windows\mickey32.dll
2009-03-26 15:36 . 2009-03-26 15:32 232784 ----a-w c:\windows\Matrix Code.scr
2009-03-26 15:36 . 2009-03-26 15:32 2285222 ----a-w c:\windows\Matrix Code.exe
2009-03-19 14:32 . 2009-03-19 14:32 23400 ----a-w c:\documents and settings\All Users\Application Data\{8CD7F5AF-ECFA-4793-BF40-D8F42DBFF906}\x86\x86\GEARAspiWDM.sys
2009-03-08 02:34 . 2008-04-14 12:00 914944 ----a-w c:\windows\system32\wininet.dll
2009-03-08 02:34 . 2008-04-14 12:00 43008 ----a-w c:\windows\system32\licmgr10.dll
2009-03-08 02:33 . 2008-04-14 12:00 18944 ----a-w c:\windows\system32\corpol.dll
2009-03-08 02:33 . 2008-04-14 12:00 420352 ----a-w c:\windows\system32\vbscript.dll
2009-03-08 02:32 . 2008-04-14 12:00 72704 ----a-w c:\windows\system32\admparse.dll
2009-03-08 02:32 . 2008-04-14 12:00 71680 ----a-w c:\windows\system32\iesetup.dll
2009-03-08 02:31 . 2008-04-14 12:00 34816 ----a-w c:\windows\system32\imgutil.dll
2009-03-08 02:31 . 2008-04-14 12:00 48128 ----a-w c:\windows\system32\mshtmler.dll
2009-03-08 02:31 . 2008-04-14 12:00 45568 ----a-w c:\windows\system32\mshta.exe
2009-03-08 02:22 . 2008-04-14 12:00 156160 ----a-w c:\windows\system32\msls31.dll
2009-03-06 14:20 . 2008-04-14 12:00 286720 ----a-w c:\windows\system32\pdh.dll
2009-03-05 15:23 . 2009-03-05 15:23 14676 ----a-w c:\windows\system32\drivers\l0phtpkt.sys
2009-02-27 18:15 . 2009-02-27 18:15 152576 ----a-w c:\documents and settings\Killan\Application Data\Sun\Java\jre1.6.0_11\lzma.dll
2009-02-27 15:59 . 2009-02-27 15:59 7424000 ----a-r c:\documents and settings\Killan\Application Data\Microsoft\Installer\{6860B340-530D-46B3-91F8-1AE1F70F7C33}\soffice.exe
2009-01-27 01:34 . 2009-01-27 01:34 1044480 ----a-w c:\program files\mozilla firefox\plugins\libdivx.dll
2009-01-27 01:34 . 2009-01-27 01:34 200704 ----a-w c:\program files\mozilla firefox\plugins\ssldivx.dll
2009-02-01 16:30 . 2009-02-01 16:30 848 --sha-w c:\windows\system32\KGyGaAvL.sys
.
((((((((((((((((((((((((((((( SnapShot@2009-05-25_15.11.13 )))))))))))))))))))))))))))))))))))))))))
.
+ 2009-05-25 16:51 . 2009-05-25 16:51 16384 c:\windows\Temp\Perflib_Perfdata_694.dat
+ 2009-05-25 16:51 . 2009-05-25 16:51 16384 c:\windows\Temp\Perflib_Perfdata_65c.dat
.
((((((((((((((((((((((((((((((((( Points de chargement Reg ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* les éléments vides & les éléments initiaux légitimes ne sont pas listés
REGEDIT4
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{0e6d7a5d-b560-4d1c-9713-18dd1ade6011}]
2008-06-24 01:30 1568792 ----a-w c:\program files\My-Tool\tbMy-T.dll
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"Neuf Media Center"="c:\program files\SFR\Media Center\MediaCenter.exe" [2008-10-10 726336]
"ccleaner"="c:\program files\CCleaner\CCleaner.exe" [2009-04-30 1562352]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SpywareTerminator"="c:\program files\Spyware Terminator\SpywareTerminatorShield.exe" [2009-03-26 2176000]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-04-02 342312]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2009-04-30 13750272]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2009-04-30 86016]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-02-27 35696]
"nwiz"="nwiz.exe" - c:\windows\system32\nwiz.exe [2009-04-30 1657376]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-14 15360]
c:\documents and settings\Killan\Menu D‚marrer\Programmes\D‚marrage\
OpenOffice.org 3.0.lnk - c:\program files\OpenOffice.org 3\program\quickstart.exe [2008-12-15 384000]
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\eMule\\emule.exe"=
"c:\\WINDOWS\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\program files\SFR\Media Center\httpd\httpd.exe"= c:\program files\SFR\Media Center\httpd\httpd.exe:172.16.255.0/255.255.255.0,192.168.1.0/255.255.255.0:Enabled:Serveur de partage Media Center (Player SFR)
R1 aswSP;avast! Self Protection;c:\windows\system32\drivers\aswSP.sys [01/01/2009 00:43 114768]
R1 sp_rsdrv2;Spyware Terminator Driver 2;c:\windows\system32\drivers\sp_rsdrv2.sys [07/02/2009 11:52 142592]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [01/01/2009 00:43 20560]
R2 fssfltr;FssFltr;c:\windows\system32\drivers\fssfltr_tdi.sys [24/05/2009 16:16 55152]
S3 CardReaderFilter;Card Reader Filter;c:\windows\system32\drivers\USBCRFT.SYS [07/11/2008 11:58 13568]
S3 fsssvc;Windows Live Family Safety;c:\program files\Windows Live\Family Safety\fsssvc.exe [06/02/2009 18:08 533360]
S3 L0phtPkt;L0pht NDIS 3.0 Packet Driver;c:\windows\system32\drivers\l0phtpkt.sys [05/03/2009 17:23 14676]
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\>{60B49E34-C7CC-11D0-8953-00A0C90347FF}]
"c:\windows\system32\rundll32.exe" "c:\windows\system32\iedkcs32.dll",BrandIEActiveSetup SIGNUP
.
.
------- Examen supplémentaire -------
.
mWindow Title =
uInternet Settings,ProxyOverride = *.local
FF - ProfilePath - c:\documents and settings\Killan\Application Data\Mozilla\Firefox\Profiles\60ibveeb.default\
FF - prefs.js: keyword.URL - hxxp://search.live.com/results.aspx?mkt=fr-FR&FORM=MIMWA2&q=
FF - prefs.js: network.proxy.type - 4
FF - component: c:\program files\BS.Player ControlBar\FirefoxDTT\components\BSToolbarFF.dll
.
**************************************************************************
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-05-25 18:51
Windows 5.1.2600 Service Pack 3 NTFS
Recherche de processus cachés ...
Recherche d'éléments en démarrage automatique cachés ...
Recherche de fichiers cachés ...
Scan terminé avec succès
Fichiers cachés: 0
**************************************************************************
.
--------------------- DLLs chargées dans les processus actifs ---------------------
- - - - - - - > 'explorer.exe'(1700)
c:\windows\system32\ieframe.dll
c:\windows\system32\eappprxy.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\program files\ArcSoft\Software Suite\PhotoImpression\share\pihook.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Autres processus actifs ------------------------
.
c:\windows\system32\nvsvc32.exe
c:\program files\Alwil Software\Avast4\aswUpdSv.exe
c:\program files\Alwil Software\Avast4\ashServ.exe
c:\program files\Fichiers communs\ArcSoft\Connection Service\Bin\ACService.exe
c:\program files\Fichiers communs\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Fichiers communs\LightScribe\LSSrvc.exe
c:\program files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
c:\program files\Spyware Terminator\sp_rsser.exe
c:\program files\Alwil Software\Avast4\ashMaiSv.exe
c:\program files\Alwil Software\Avast4\ashWebSv.exe
c:\windows\system32\wbem\wmiapsrv.exe
c:\windows\system32\rundll32.exe
c:\program files\OpenOffice.org 3\program\soffice.exe
c:\program files\OpenOffice.org 3\program\soffice.bin
c:\program files\SFR\Media Center\httpd\httpd.exe
c:\program files\SFR\Media Center\httpd\httpd.exe
c:\program files\iPod\bin\iPodService.exe
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Heure de fin: 2009-05-25 18:56 - La machine a redémarré
ComboFix-quarantined-files.txt 2009-05-25 16:56
ComboFix2.txt 2009-05-25 15:13
Avant-CF: 2 243 493 888 octets libres
Après-CF: 2 165 919 744 octets libres
Current=3 Default=3 Failed=0 LastKnownGood=5 Sets=1,2,3,4,5
223 --- E O F --- 2009-05-13 09:15
par contre je n'ai pas eu a faire de choix dans la fenêtre bleu dont tu m'a parler! ça c'est engranger comme la première fois.
Microsoft Windows XP Édition familiale 5.1.2600.3.1252.33.1036.18.1919.1412 [GMT 2:00]
Lancé depuis: c:\documents and settings\Killan\Bureau\CFix.exe
Commutateurs utilisés :: c:\documents and settings\Killan\Bureau\CFScript.txt
AV: avast! antivirus 4.8.1335 [VPS 090524-0] *On-access scanning enabled* (Updated) {7591DB91-41F0-48A3-B128-1A293FD8233D}
.
(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
((((((((((((((((((((((((((((((((((((((( Pilotes/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
-------\Legacy_FILEZILLA_SERVER
-------\Service_msqpdxserv.sys
((((((((((((((((((((((((((((( Fichiers créés du 2009-04-25 au 2009-05-25 ))))))))))))))))))))))))))))))))))))
.
2009-05-25 14:46 . 2009-05-25 14:51 -------- d-s---w C:\ComboFix
2009-05-24 17:53 . 2009-05-25 05:49 -------- d-----w C:\UsbFix
2009-05-24 16:52 . 2009-05-24 16:52 -------- d-----w C:\rsit
2009-05-24 15:45 . 2009-05-24 16:51 -------- d-----w c:\program files\Ad-remover
2009-05-24 15:19 . 2009-05-24 16:37 -------- d-----w C:\ToolBar SD
2009-05-24 15:05 . 2009-05-24 15:05 -------- d-----w c:\program files\Trend Micro
2009-05-24 14:16 . 2009-02-06 16:08 55152 ----a-w c:\windows\system32\drivers\fssfltr_tdi.sys
2009-05-24 14:15 . 2009-05-24 14:15 -------- d-----w c:\program files\Microsoft Sync Framework
2009-05-16 20:24 . 2009-05-16 20:24 -------- d-----w C:\NVIDIA
2009-05-15 17:31 . 2009-03-19 14:32 23400 ----a-w c:\windows\system32\drivers\GEARAspiWDM.sys
2009-05-15 17:31 . 2008-04-17 10:12 107368 ----a-w c:\windows\system32\GEARAspi.dll
2009-05-15 17:30 . 2009-05-15 17:30 -------- d-----w c:\program files\iPod
2009-05-15 17:30 . 2009-05-15 17:31 -------- d-----w c:\program files\iTunes
2009-05-15 17:30 . 2009-05-15 17:31 -------- d-----w c:\documents and settings\All Users\Application Data\{8CD7F5AF-ECFA-4793-BF40-D8F42DBFF906}
2009-05-15 17:30 . 2009-05-15 17:30 -------- d-----w c:\program files\Bonjour
2009-05-15 17:29 . 2009-05-15 17:30 -------- d-----w c:\program files\Fichiers communs\Apple
2009-05-12 11:04 . 2009-05-14 13:38 -------- d-----w c:\program files\eMule
2009-05-06 16:57 . 2003-09-19 13:45 21248 ----a-w c:\windows\system32\drivers\pfc.sys
2009-04-30 22:31 . 2009-04-30 22:31 1657376 ----a-w c:\windows\system32\nwiz.exe
2009-04-30 22:31 . 2009-04-30 22:31 449056 ----a-w c:\windows\system32\nvappbar.exe
2009-04-30 22:31 . 2009-04-30 22:31 436768 ----a-w c:\windows\system32\keystone.exe
2009-04-30 22:31 . 2009-04-30 22:31 466944 ----a-w c:\windows\system32\nvshell.dll
2009-04-30 22:31 . 2009-04-30 22:31 1724416 ----a-w c:\windows\system32\nvwdmcpl.dll
2009-04-30 22:31 . 2009-04-30 22:31 1507328 ----a-w c:\windows\system32\nview.dll
2009-04-30 22:31 . 2009-04-30 22:31 1101824 ----a-w c:\windows\system32\nvwimg.dll
2009-04-30 20:02 . 2009-04-30 20:02 1579630 ----a-w c:\windows\system32\nvdata.bin
2009-04-30 20:02 . 2009-04-30 20:02 1314816 ----a-w c:\windows\system32\nvcuvenc.dll
2009-04-30 16:12 . 2009-04-30 16:14 -------- dc-h--w c:\windows\ie8
2009-04-28 15:32 . 2009-05-25 14:43 -------- d-----w c:\documents and settings\Killan\Application Data\uTorrent
.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-05-25 16:46 . 2009-02-07 09:52 -------- d-----w c:\documents and settings\Killan\Application Data\Spyware Terminator
2009-05-24 17:50 . 2009-02-01 16:59 -------- d-----w c:\program files\CCleaner
2009-05-24 16:02 . 2008-12-31 22:13 -------- d-----w c:\program files\Spybot - Search & Destroy
2009-05-24 16:01 . 2008-11-05 10:55 -------- d-----w c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2009-05-24 15:52 . 2008-04-14 12:00 84874 ----a-w c:\windows\system32\perfc00C.dat
2009-05-24 15:52 . 2008-04-14 12:00 510656 ----a-w c:\windows\system32\perfh00C.dat
2009-05-24 14:26 . 2009-02-19 11:51 -------- d-----w c:\program files\WinClamAVShield
2009-05-24 14:26 . 2009-02-07 09:52 -------- d-----w c:\documents and settings\All Users\Application Data\Spyware Terminator
2009-05-24 14:24 . 2009-02-07 09:52 -------- d-----w c:\program files\Spyware Terminator
2009-05-24 14:16 . 2008-11-09 13:36 -------- d-----w c:\program files\Windows Live
2009-05-24 10:15 . 2009-02-27 16:01 1 ----a-w c:\documents and settings\Killan\Application Data\OpenOffice.org\3\user\uno_packages\cache\stamp.sys
2009-05-23 13:34 . 2009-02-02 08:19 -------- d-----w c:\program files\URUSoft
2009-05-09 19:06 . 2009-02-05 21:56 -------- d-----w c:\program files\MSN Messenger
2009-05-06 17:01 . 2009-03-04 17:14 -------- d-----w c:\documents and settings\Killan\Application Data\ArcSoft
2009-05-06 16:54 . 2009-03-04 17:08 -------- d-----w c:\program files\ArcSoft
2009-05-06 16:54 . 2008-11-04 15:56 -------- d--h--w c:\program files\InstallShield Installation Information
2009-04-30 20:02 . 2009-02-09 12:18 663552 ----a-w c:\windows\system32\nvcuvid.dll
2009-04-30 20:02 . 2009-01-15 07:19 1720320 ----a-w c:\windows\system32\nvcuda.dll
2009-04-30 20:02 . 2008-11-04 15:57 457248 ----a-w c:\windows\system32\nvudisp.exe
2009-04-30 20:02 . 2006-10-30 22:35 9994240 ----a-w c:\windows\system32\nvoglnt.dll
2009-04-30 20:02 . 2006-10-30 22:35 806912 ----a-w c:\windows\system32\nvapi.dll
2009-04-30 20:02 . 2006-10-30 22:35 8055584 ----a-w c:\windows\system32\drivers\nv4_mini.sys
2009-04-30 20:02 . 2006-10-30 22:35 5896320 ----a-w c:\windows\system32\nv4_disp.dll
2009-04-30 20:02 . 2006-10-30 22:35 143360 ----a-w c:\windows\system32\nvcodins.dll
2009-04-30 20:02 . 2006-10-30 22:35 143360 ----a-w c:\windows\system32\nvcod.dll
2009-04-26 22:42 . 2009-01-24 13:24 457248 ----a-w c:\windows\system32\NVUNINST.EXE
2009-04-25 23:29 . 2008-11-07 09:58 13568 ----a-w c:\windows\system32\drivers\USBCRFT.SYS
2009-04-06 15:11 . 2009-04-06 15:11 -------- d-----w c:\program files\uTorrent
2009-04-03 08:25 . 2009-04-03 08:21 -------- d-----w c:\program files\GlobFX Technologies
2009-04-02 14:29 . 2009-04-02 14:29 75048 ----a-w c:\documents and settings\All Users\Application Data\Apple Computer\Installer Cache\iTunes 8.1.1.10\SetupAdmin.exe
2009-04-01 14:30 . 2009-04-01 14:30 528384 ----a-w c:\windows\system32\Niagara.scr
2009-04-01 08:43 . 2009-03-26 15:42 44239 ----a-w c:\windows\system32\sound32.dll
2009-03-30 14:12 . 2009-02-27 18:19 410984 ----a-w c:\windows\system32\deploytk.dll
2009-03-30 14:12 . 2009-02-27 15:57 -------- d-----w c:\program files\Java
2009-03-30 14:11 . 2009-03-26 18:48 152576 ----a-w c:\documents and settings\Killan\Application Data\Sun\Java\jre1.6.0_13\lzma.dll
2009-03-28 20:51 . 2008-11-04 17:12 22440 ----a-w c:\documents and settings\Killan\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-03-27 08:03 . 2006-10-30 22:35 45056 ----a-w c:\windows\system32\nvmccsrs.dll
2009-03-27 08:03 . 2006-10-30 22:35 1346080 ----a-w c:\windows\system32\nvdspsch.exe
2009-03-26 15:36 . 2009-03-26 15:32 29696 ----a-w c:\windows\mickey32.dll
2009-03-26 15:36 . 2009-03-26 15:32 232784 ----a-w c:\windows\Matrix Code.scr
2009-03-26 15:36 . 2009-03-26 15:32 2285222 ----a-w c:\windows\Matrix Code.exe
2009-03-19 14:32 . 2009-03-19 14:32 23400 ----a-w c:\documents and settings\All Users\Application Data\{8CD7F5AF-ECFA-4793-BF40-D8F42DBFF906}\x86\x86\GEARAspiWDM.sys
2009-03-08 02:34 . 2008-04-14 12:00 914944 ----a-w c:\windows\system32\wininet.dll
2009-03-08 02:34 . 2008-04-14 12:00 43008 ----a-w c:\windows\system32\licmgr10.dll
2009-03-08 02:33 . 2008-04-14 12:00 18944 ----a-w c:\windows\system32\corpol.dll
2009-03-08 02:33 . 2008-04-14 12:00 420352 ----a-w c:\windows\system32\vbscript.dll
2009-03-08 02:32 . 2008-04-14 12:00 72704 ----a-w c:\windows\system32\admparse.dll
2009-03-08 02:32 . 2008-04-14 12:00 71680 ----a-w c:\windows\system32\iesetup.dll
2009-03-08 02:31 . 2008-04-14 12:00 34816 ----a-w c:\windows\system32\imgutil.dll
2009-03-08 02:31 . 2008-04-14 12:00 48128 ----a-w c:\windows\system32\mshtmler.dll
2009-03-08 02:31 . 2008-04-14 12:00 45568 ----a-w c:\windows\system32\mshta.exe
2009-03-08 02:22 . 2008-04-14 12:00 156160 ----a-w c:\windows\system32\msls31.dll
2009-03-06 14:20 . 2008-04-14 12:00 286720 ----a-w c:\windows\system32\pdh.dll
2009-03-05 15:23 . 2009-03-05 15:23 14676 ----a-w c:\windows\system32\drivers\l0phtpkt.sys
2009-02-27 18:15 . 2009-02-27 18:15 152576 ----a-w c:\documents and settings\Killan\Application Data\Sun\Java\jre1.6.0_11\lzma.dll
2009-02-27 15:59 . 2009-02-27 15:59 7424000 ----a-r c:\documents and settings\Killan\Application Data\Microsoft\Installer\{6860B340-530D-46B3-91F8-1AE1F70F7C33}\soffice.exe
2009-01-27 01:34 . 2009-01-27 01:34 1044480 ----a-w c:\program files\mozilla firefox\plugins\libdivx.dll
2009-01-27 01:34 . 2009-01-27 01:34 200704 ----a-w c:\program files\mozilla firefox\plugins\ssldivx.dll
2009-02-01 16:30 . 2009-02-01 16:30 848 --sha-w c:\windows\system32\KGyGaAvL.sys
.
((((((((((((((((((((((((((((( SnapShot@2009-05-25_15.11.13 )))))))))))))))))))))))))))))))))))))))))
.
+ 2009-05-25 16:51 . 2009-05-25 16:51 16384 c:\windows\Temp\Perflib_Perfdata_694.dat
+ 2009-05-25 16:51 . 2009-05-25 16:51 16384 c:\windows\Temp\Perflib_Perfdata_65c.dat
.
((((((((((((((((((((((((((((((((( Points de chargement Reg ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* les éléments vides & les éléments initiaux légitimes ne sont pas listés
REGEDIT4
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{0e6d7a5d-b560-4d1c-9713-18dd1ade6011}]
2008-06-24 01:30 1568792 ----a-w c:\program files\My-Tool\tbMy-T.dll
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"Neuf Media Center"="c:\program files\SFR\Media Center\MediaCenter.exe" [2008-10-10 726336]
"ccleaner"="c:\program files\CCleaner\CCleaner.exe" [2009-04-30 1562352]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SpywareTerminator"="c:\program files\Spyware Terminator\SpywareTerminatorShield.exe" [2009-03-26 2176000]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-04-02 342312]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2009-04-30 13750272]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2009-04-30 86016]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-02-27 35696]
"nwiz"="nwiz.exe" - c:\windows\system32\nwiz.exe [2009-04-30 1657376]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-14 15360]
c:\documents and settings\Killan\Menu D‚marrer\Programmes\D‚marrage\
OpenOffice.org 3.0.lnk - c:\program files\OpenOffice.org 3\program\quickstart.exe [2008-12-15 384000]
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\eMule\\emule.exe"=
"c:\\WINDOWS\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\program files\SFR\Media Center\httpd\httpd.exe"= c:\program files\SFR\Media Center\httpd\httpd.exe:172.16.255.0/255.255.255.0,192.168.1.0/255.255.255.0:Enabled:Serveur de partage Media Center (Player SFR)
R1 aswSP;avast! Self Protection;c:\windows\system32\drivers\aswSP.sys [01/01/2009 00:43 114768]
R1 sp_rsdrv2;Spyware Terminator Driver 2;c:\windows\system32\drivers\sp_rsdrv2.sys [07/02/2009 11:52 142592]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [01/01/2009 00:43 20560]
R2 fssfltr;FssFltr;c:\windows\system32\drivers\fssfltr_tdi.sys [24/05/2009 16:16 55152]
S3 CardReaderFilter;Card Reader Filter;c:\windows\system32\drivers\USBCRFT.SYS [07/11/2008 11:58 13568]
S3 fsssvc;Windows Live Family Safety;c:\program files\Windows Live\Family Safety\fsssvc.exe [06/02/2009 18:08 533360]
S3 L0phtPkt;L0pht NDIS 3.0 Packet Driver;c:\windows\system32\drivers\l0phtpkt.sys [05/03/2009 17:23 14676]
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\>{60B49E34-C7CC-11D0-8953-00A0C90347FF}]
"c:\windows\system32\rundll32.exe" "c:\windows\system32\iedkcs32.dll",BrandIEActiveSetup SIGNUP
.
.
------- Examen supplémentaire -------
.
mWindow Title =
uInternet Settings,ProxyOverride = *.local
FF - ProfilePath - c:\documents and settings\Killan\Application Data\Mozilla\Firefox\Profiles\60ibveeb.default\
FF - prefs.js: keyword.URL - hxxp://search.live.com/results.aspx?mkt=fr-FR&FORM=MIMWA2&q=
FF - prefs.js: network.proxy.type - 4
FF - component: c:\program files\BS.Player ControlBar\FirefoxDTT\components\BSToolbarFF.dll
.
**************************************************************************
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-05-25 18:51
Windows 5.1.2600 Service Pack 3 NTFS
Recherche de processus cachés ...
Recherche d'éléments en démarrage automatique cachés ...
Recherche de fichiers cachés ...
Scan terminé avec succès
Fichiers cachés: 0
**************************************************************************
.
--------------------- DLLs chargées dans les processus actifs ---------------------
- - - - - - - > 'explorer.exe'(1700)
c:\windows\system32\ieframe.dll
c:\windows\system32\eappprxy.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\program files\ArcSoft\Software Suite\PhotoImpression\share\pihook.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Autres processus actifs ------------------------
.
c:\windows\system32\nvsvc32.exe
c:\program files\Alwil Software\Avast4\aswUpdSv.exe
c:\program files\Alwil Software\Avast4\ashServ.exe
c:\program files\Fichiers communs\ArcSoft\Connection Service\Bin\ACService.exe
c:\program files\Fichiers communs\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Fichiers communs\LightScribe\LSSrvc.exe
c:\program files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
c:\program files\Spyware Terminator\sp_rsser.exe
c:\program files\Alwil Software\Avast4\ashMaiSv.exe
c:\program files\Alwil Software\Avast4\ashWebSv.exe
c:\windows\system32\wbem\wmiapsrv.exe
c:\windows\system32\rundll32.exe
c:\program files\OpenOffice.org 3\program\soffice.exe
c:\program files\OpenOffice.org 3\program\soffice.bin
c:\program files\SFR\Media Center\httpd\httpd.exe
c:\program files\SFR\Media Center\httpd\httpd.exe
c:\program files\iPod\bin\iPodService.exe
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Heure de fin: 2009-05-25 18:56 - La machine a redémarré
ComboFix-quarantined-files.txt 2009-05-25 16:56
ComboFix2.txt 2009-05-25 15:13
Avant-CF: 2 243 493 888 octets libres
Après-CF: 2 165 919 744 octets libres
Current=3 Default=3 Failed=0 LastKnownGood=5 Sets=1,2,3,4,5
223 --- E O F --- 2009-05-13 09:15
par contre je n'ai pas eu a faire de choix dans la fenêtre bleu dont tu m'a parler! ça c'est engranger comme la première fois.
et voila le scan de RSIT :
Logfile of random's system information tool 1.06 (written by random/random)
Run by Killan at 2009-05-25 18:56:51
Microsoft Windows XP Édition familiale Service Pack 3
System drive C: has 2 GB (3%) free of 60 GB
Total RAM: 1919 MB (76% free)
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 18:57:01, on 25/05/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Fichiers communs\ArcSoft\Connection Service\Bin\ACService.exe
C:\Program Files\Fichiers communs\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\Program Files\Spyware Terminator\sp_rsser.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\system32\wbem\wmiapsrv.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Spyware Terminator\SpywareTerminatorShield.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\SFR\Media Center\MediaCenter.exe
C:\Program Files\OpenOffice.org 3\program\soffice.exe
C:\Program Files\OpenOffice.org 3\program\soffice.bin
C:\Program Files\SFR\Media Center\httpd\httpd.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\SFR\Media Center\httpd\httpd.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\notepad.exe
C:\Documents and Settings\Killan\Bureau\RSIT.exe
C:\Program Files\Trend Micro\HijackThis\Killan.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,CustomizeSearch = http://dnl.crawler.com/support/sa_customize.aspx?TbId=60076
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.msn.com/fr-fr
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
R3 - URLSearchHook: (no name) - {1d1b60fd-b21f-4b9a-8a5f-64e8544828d7} - (no file)
R3 - URLSearchHook: My-Tool Toolbar - {0e6d7a5d-b560-4d1c-9713-18dd1ade6011} - C:\Program Files\My-Tool\tbMy-T.dll
O2 - BHO: My-Tool Toolbar - {0e6d7a5d-b560-4d1c-9713-18dd1ade6011} - C:\Program Files\My-Tool\tbMy-T.dll
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
O2 - BHO: Search Helper - {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - C:\Program Files\Microsoft\Search Enhancement Pack\Search Helper\SearchHelper.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.0.926.3450\swg.dll
O2 - BHO: Google Dictionary Compression sdch - {C84D72FE-E17D-4195-BB24-76C02E2E7C4E} - C:\Program Files\Google\Google Toolbar\Component\fastsearch_219B3E1547538286.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: Windows Live Toolbar Helper - {E15A8DC0-8516-42A1-81EA-DC94EC1ACF10} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O3 - Toolbar: Share Accelerator - {FA34EE7E-55EB-41DB-9718-1AE6EA1CF9A5} - (no file)
O3 - Toolbar: (no name) - {1d1b60fd-b21f-4b9a-8a5f-64e8544828d7} - (no file)
O3 - Toolbar: My-Tool Toolbar - {0e6d7a5d-b560-4d1c-9713-18dd1ade6011} - C:\Program Files\My-Tool\tbMy-T.dll
O3 - Toolbar: BS.Player ControlBar - {2C688203-7EB3-4327-9995-1CB417BA23F9} - C:\Program Files\BS.Player ControlBar\BSToolbar.dll
O3 - Toolbar: &Windows Live Toolbar - {21FA44EF-376D-4D53-9B0F-8A89D3229068} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
O4 - HKLM\..\Run: [SpywareTerminator] "C:\Program Files\Spyware Terminator\SpywareTerminatorShield.exe"
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Neuf Media Center] "C:\Program Files\SFR\Media Center\MediaCenter.exe"
O4 - HKCU\..\Run: [ccleaner] "C:\Program Files\CCleaner\CCleaner.exe" /AUTO
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Startup: OpenOffice.org 3.0.lnk = C:\Program Files\OpenOffice.org 3\program\quickstart.exe
O9 - Extra button: Blog This - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra 'Tools' menuitem: &Blog This in Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx1.hotmail.com/mail/w3/resources/MSNPUpld.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/...
O23 - Service: ArcSoft Connect Daemon (ACDaemon) - ArcSoft Inc. - C:\Program Files\Fichiers communs\ArcSoft\Connection Service\Bin\ACService.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Fichiers communs\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: Service Bonjour (Bonjour Service) - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: Service de l’iPod (iPod Service) - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Spyware Terminator Realtime Shield Service (sp_rssrv) - Crawler.com - C:\Program Files\Spyware Terminator\sp_rsser.exe
Logfile of random's system information tool 1.06 (written by random/random)
Run by Killan at 2009-05-25 18:56:51
Microsoft Windows XP Édition familiale Service Pack 3
System drive C: has 2 GB (3%) free of 60 GB
Total RAM: 1919 MB (76% free)
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 18:57:01, on 25/05/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Fichiers communs\ArcSoft\Connection Service\Bin\ACService.exe
C:\Program Files\Fichiers communs\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\Program Files\Spyware Terminator\sp_rsser.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\system32\wbem\wmiapsrv.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Spyware Terminator\SpywareTerminatorShield.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\SFR\Media Center\MediaCenter.exe
C:\Program Files\OpenOffice.org 3\program\soffice.exe
C:\Program Files\OpenOffice.org 3\program\soffice.bin
C:\Program Files\SFR\Media Center\httpd\httpd.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\SFR\Media Center\httpd\httpd.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\notepad.exe
C:\Documents and Settings\Killan\Bureau\RSIT.exe
C:\Program Files\Trend Micro\HijackThis\Killan.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,CustomizeSearch = http://dnl.crawler.com/support/sa_customize.aspx?TbId=60076
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.msn.com/fr-fr
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
R3 - URLSearchHook: (no name) - {1d1b60fd-b21f-4b9a-8a5f-64e8544828d7} - (no file)
R3 - URLSearchHook: My-Tool Toolbar - {0e6d7a5d-b560-4d1c-9713-18dd1ade6011} - C:\Program Files\My-Tool\tbMy-T.dll
O2 - BHO: My-Tool Toolbar - {0e6d7a5d-b560-4d1c-9713-18dd1ade6011} - C:\Program Files\My-Tool\tbMy-T.dll
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
O2 - BHO: Search Helper - {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - C:\Program Files\Microsoft\Search Enhancement Pack\Search Helper\SearchHelper.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.0.926.3450\swg.dll
O2 - BHO: Google Dictionary Compression sdch - {C84D72FE-E17D-4195-BB24-76C02E2E7C4E} - C:\Program Files\Google\Google Toolbar\Component\fastsearch_219B3E1547538286.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: Windows Live Toolbar Helper - {E15A8DC0-8516-42A1-81EA-DC94EC1ACF10} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O3 - Toolbar: Share Accelerator - {FA34EE7E-55EB-41DB-9718-1AE6EA1CF9A5} - (no file)
O3 - Toolbar: (no name) - {1d1b60fd-b21f-4b9a-8a5f-64e8544828d7} - (no file)
O3 - Toolbar: My-Tool Toolbar - {0e6d7a5d-b560-4d1c-9713-18dd1ade6011} - C:\Program Files\My-Tool\tbMy-T.dll
O3 - Toolbar: BS.Player ControlBar - {2C688203-7EB3-4327-9995-1CB417BA23F9} - C:\Program Files\BS.Player ControlBar\BSToolbar.dll
O3 - Toolbar: &Windows Live Toolbar - {21FA44EF-376D-4D53-9B0F-8A89D3229068} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
O4 - HKLM\..\Run: [SpywareTerminator] "C:\Program Files\Spyware Terminator\SpywareTerminatorShield.exe"
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Neuf Media Center] "C:\Program Files\SFR\Media Center\MediaCenter.exe"
O4 - HKCU\..\Run: [ccleaner] "C:\Program Files\CCleaner\CCleaner.exe" /AUTO
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Startup: OpenOffice.org 3.0.lnk = C:\Program Files\OpenOffice.org 3\program\quickstart.exe
O9 - Extra button: Blog This - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra 'Tools' menuitem: &Blog This in Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx1.hotmail.com/mail/w3/resources/MSNPUpld.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/...
O23 - Service: ArcSoft Connect Daemon (ACDaemon) - ArcSoft Inc. - C:\Program Files\Fichiers communs\ArcSoft\Connection Service\Bin\ACService.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Fichiers communs\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: Service Bonjour (Bonjour Service) - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: Service de l’iPod (iPod Service) - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Spyware Terminator Realtime Shield Service (sp_rssrv) - Crawler.com - C:\Program Files\Spyware Terminator\sp_rsser.exe
sKe69
Messages postés
21360
Date d'inscription
samedi 15 mars 2008
Statut
Contributeur sécurité
Dernière intervention
30 décembre 2012
463
25 mai 2009 à 20:00
25 mai 2009 à 20:00
impec...
dis moi coment va le PC maintenant ... du mieux ?
puis fais ceci dans l'ordre :
1- refais un coup de CCleaner ( registre compris ) .
==================
2- Télécharge GenProc (de Jean-Chretien1 et Narco4) sur ton bureau (et pas ailleur !) :
http://www.genproc.com/GenProc.exe
!!Déconnecte toi et ferme tes applications en cours !!
* double-clique sur GenProc.exe pour lancer le scan et laisse faire ...
* A la question "faites vous aidez sur un forum..." > clique sur " oui " .
-> poste le contenu du rapport qui s'ouvre ...
Aide en images ici : http://www.alt-shift-return.org/Info/GenProc-HowTo.html
IMPORTANT : poste le rapport et ne fais rien d'autre pour l'instant ( souvant il faut ajouter des consignes à la manipe indiquée pour que cela fonctionne parfaitement ) .
dis moi coment va le PC maintenant ... du mieux ?
puis fais ceci dans l'ordre :
1- refais un coup de CCleaner ( registre compris ) .
==================
2- Télécharge GenProc (de Jean-Chretien1 et Narco4) sur ton bureau (et pas ailleur !) :
http://www.genproc.com/GenProc.exe
!!Déconnecte toi et ferme tes applications en cours !!
* double-clique sur GenProc.exe pour lancer le scan et laisse faire ...
* A la question "faites vous aidez sur un forum..." > clique sur " oui " .
-> poste le contenu du rapport qui s'ouvre ...
Aide en images ici : http://www.alt-shift-return.org/Info/GenProc-HowTo.html
IMPORTANT : poste le rapport et ne fais rien d'autre pour l'instant ( souvant il faut ajouter des consignes à la manipe indiquée pour que cela fonctionne parfaitement ) .
oui bien sur j'ai noter quelque amélioration c'est vrai mais mon probléme n'est toujours pas résolut par ce que je n'arrive toujours pas a mettre la page d'accueil que je souhaite c'est vrai que maintenant sa ne souvre plus sur lo.dt mais sur la page de mozilla !! et le rapport je le poste ou ici ou sur le site internet indiqué dedans??