Infection bien cachée :s : HELP ME PLEASE!!!

Résolu/Fermé
asseforlife Messages postés 658 Date d'inscription jeudi 28 février 2008 Statut Membre Dernière intervention 23 décembre 2019 - 6 juil. 2009 à 11:12
 Utilisateur anonyme - 27 juil. 2009 à 07:51
Bonjours a tous,

Alors voila, depuis quelque jours, le gestionnaire des taches , Firefox et Internet explorer ne veulent pas toujours s'ouvrir même si je supprimes la tache de Firefox et Internet explorer dans le gestionnaire des Taches ( quand il veux s'ouvrir), j'ai scanné mon pc avec Antivir, Mbam & le logiciel mrt.exe de Windows, cela n'y change rien ( tous ne détectent rien).

Pourriez-vous m'aidez svp à ce qui est à l'origine de tout ceci?

Merci à vous.

A voir également:

112 réponses

asseforlife Messages postés 658 Date d'inscription jeudi 28 février 2008 Statut Membre Dernière intervention 23 décembre 2019 24
7 juil. 2009 à 11:14
Voila le lien demandé:

http://www.cijoint.fr/cjlink.php?file=cj200907/cijiDkbuUp.txt
0
Utilisateur anonyme
7 juil. 2009 à 11:27
peux tu faire pareil option 5 stp ?
0
asseforlife Messages postés 658 Date d'inscription jeudi 28 février 2008 Statut Membre Dernière intervention 23 décembre 2019 24
7 juil. 2009 à 11:30
Voila le rapport:

http://www.cijoint.fr/cjlink.php?file=cj200907/cij0THVTUv.txt
0
Utilisateur anonyme
7 juil. 2009 à 12:26
bien....j' ai trouvé plusieurs anomalies et fichiers douteux :

Clique sur le menu Demarrer /Panneau de configuration/Options des dossiers/ puis dans l'onglet Affichage
- Coche Afficher les fichiers et dossiers cachés
- Décoche Masquer les extensions des fichiers dont le type est connu
- Décoche Masquer les fichiers protégés du système d'exploitation (recommandé)
clique sur Appliquer, puis OK.

N'oublie pas de recacher à nouveau les fichiers cachés et protégés du système d'exploitation en fin de désinfection, c'est important

Fais analyser le(s) fichier(s) suivants sur Virustotal :

Virus Total

* Clique sur Parcourir en haut, choisis Poste de travail et cherche ces fichiers :

C:\WINDOWS\system32\lvci11901262.dll
C:\WINDOWS\system32\ipsec6.exe
C:\WINDOWS\system32\dllcache\esentutl.exe
C:\WINDOWS\system32\dllcache\mstsc.exe
C:\WINDOWS\system32\dllcache\rsvp.exe
C:\WINDOWS\system32\Rtl60.bpl


* Clique maintenant sur Envoyer le fichier. et laisse travailler tant que "Situation actuelle : en cours d'analyse" est affiché.
* Il est possible que le fichier soit mis en file d'attente en raison d'un grand nombre de demandes d'analyses. En ce cas, il te faudra patienter sans actualiser la page.
* Lorsque l'analyse est terminée ("Situation actuelle: terminé"), clique sur Formaté
* Une nouvelle fenêtre de ton navigateur va apparaître
* Clique alors sur les deux fleches
* Fais un clic droit sur la page, et choisis Sélectionner tout, puis copier
* Enfin colle le résultat dans ta prochaine réponse.

ensuite :

---> Désactive ton antivirus le temps de la manipulation car OTM est détecté comme une infection à tort.

---> Télécharge OTM (OldTimer) sur ton Bureau :

---> Double-clique sur OTM.exe afin de le lancer.

---> Copie (Ctrl+C) le texte suivant ci-dessous :





:processes
explorer.exe
iexplore.exe
firefox.exe
msnmsgr.exe
TeaTimer.exe

:files
C:\WINDOWS\system32\drivers\etc\host.msn
C:\WINDOWS\system32\drivers\etc\hosts.msn
C:\WINDOWS\system32\drivers\etc\hosts.txt
C:\WINDOWS\system32\reg.exe
C:\WINDOWS\system32\results.txt
C:\WINDOWS\system32\SET56.tmp
C:\WINDOWS\system32\SET58.tmp
C:\WINDOWS\system32\SET5D.tmp
C:\WINDOWS\system32\SET64.tmp
C:\WINDOWS\system32\SETAA.tmp
C:\WINDOWS\system32\shell32(3).dll
C:\WINDOWS\system32\wdmaud(2).drv
C:\WINDOWS\system32\wdmaud(3).drv
C:\WINDOWS\system32\wdmaud(4).drv
C:\WINDOWS\system32\wdmaud(5).drv
C:\WINDOWS\system32\wdmaud(6).drv

:commands
[purity]
[emptytemp]
[start explorer]
[reboot]





---> Colle (Ctrl+V) le texte précédemment copié dans le cadre Paste Instructions for Items to be Moved.

---> Clique maintenant sur le bouton MoveIt! puis ferme OTM

Si un fichier ou dossier ne peut pas être supprimé immédiatement, le logiciel te demandera de redémarrer.
Accepte en cliquant sur YES.

---> Poste le rapport situé dans ce dossier : C:\_OTM\MovedFiles\
Le nom du rapport correspond au moment de sa création : date_heure.log
0

Vous n’avez pas trouvé la réponse que vous recherchez ?

Posez votre question
asseforlife Messages postés 658 Date d'inscription jeudi 28 février 2008 Statut Membre Dernière intervention 23 décembre 2019 24
7 juil. 2009 à 13:00
Alors voila les rapport des dll pour virustotal:

1)
Fichier lvci11901262.dll reçu le 2009.07.07 10:36:38 (UTC)
Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.18 2009.07.07 -
AhnLab-V3 5.0.0.2 2009.07.06 -
AntiVir 7.9.0.204 2009.07.07 -
Antiy-AVL 2.0.3.1 2009.07.07 -
Authentium 5.1.2.4 2009.07.07 -
Avast 4.8.1335.0 2009.07.06 -
AVG 8.5.0.386 2009.07.07 -
BitDefender 7.2 2009.07.07 -
CAT-QuickHeal 10.00 2009.07.07 -
ClamAV 0.94.1 2009.07.06 -
Comodo 1538 2009.07.02 -
DrWeb 5.0.0.12182 2009.07.07 -
eSafe 7.0.17.0 2009.07.06 -
eTrust-Vet 31.6.6601 2009.07.07 -
F-Prot 4.4.4.56 2009.07.06 -
F-Secure 8.0.14470.0 2009.07.07 -
Fortinet 3.117.0.0 2009.07.03 -
GData 19 2009.07.07 -
Ikarus T3.1.1.64.0 2009.07.07 -
Jiangmin 11.0.706 2009.07.07 -
K7AntiVirus 7.10.785 2009.07.06 -
Kaspersky 7.0.0.125 2009.07.07 -
McAfee 5668 2009.07.06 -
McAfee+Artemis 5668 2009.07.06 -
McAfee-GW-Edition 6.8.5 2009.07.07 -
Microsoft 1.4803 2009.07.07 -
NOD32 4221 2009.07.06 -
Norman 6.01.09 2009.07.06 -
nProtect 2009.1.8.0 2009.07.07 -
Panda 10.0.0.14 2009.07.06 -
PCTools 4.4.2.0 2009.07.06 -
Prevx 3.0 2009.07.07 -
Rising 21.37.12.00 2009.07.07 -
Sophos 4.43.0 2009.07.07 -
Sunbelt 3.2.1858.2 2009.07.07 -
Symantec 1.4.4.12 2009.07.07 -
TheHacker 6.3.4.3.364 2009.07.06 -
TrendMicro 8.950.0.1094 2009.07.07 -
VBA32 3.12.10.7 2009.07.07 -
ViRobot 2009.7.7.1821 2009.07.07 -
VirusBuster 4.6.5.0 2009.07.06 -
Information additionnelle
File size: 195096 bytes
MD5...: 2505566a4b34a3e990c51994fbcff57b
SHA1..: f1693bd0d137a5129aa6d7755f1a36295f424b03
SHA256: 48603c12c2d28d0f907be046d61be423d1fb3c39442e0c78e85115b2aec63710
ssdeep: 3072:yUTfB9tAKzOewg5RpdO4DWN9LirnPPsNJpbu5TlJb9gttYllYlE/gbeI:nf<br>B9tACO5g5R+NUnOQ5N0<br>
PEiD..: -
TrID..: File type identification<br>Win32 Executable MS Visual C++ (generic) (65.2%)<br>Win32 Executable Generic (14.7%)<br>Win32 Dynamic Link Library (generic) (13.1%)<br>Generic Win/DOS Executable (3.4%)<br>DOS Executable Generic (3.4%)
PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0xa46c<br>timedatestamp.....: 0x494890f7 (Wed Dec 17 05:41:11 2008)<br>machinetype.......: 0x14c (I386)<br><br>( 5 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>.text 0x1000 0x21bba 0x22000 6.66 7f8f4d89bf7b7743abfa4d430bb98ef0<br>.rdata 0x23000 0x5c37 0x6000 5.57 eac788144b940d77ebb574e545feff04<br>.data 0x29000 0x2d8c 0x2000 1.56 79baa67a7eb8422d2646b3f7e354558e<br>.rsrc 0x2c000 0xa04 0x1000 4.17 1a01f9c2fcad969672bf5f97b7808ea5<br>.reloc 0x2d000 0x17fe 0x2000 5.67 97e89b1b6a6eadbb89e5404c8b2514b6<br><br>( 8 imports ) <br>> VERSION.dll: GetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA<br>> SETUPAPI.dll: SetupDiOpenClassRegKey, SetupDiGetDriverInfoDetailA, SetupDiGetSelectedDriverA, SetupCloseInfFile, SetupGetLineTextA, SetupOpenInfFileA, SetupDiGetDeviceRegistryPropertyA, SetupDiGetDeviceInstallParamsA, SetupDiOpenDevRegKey, SetupDiSetDeviceInstallParamsA, SetupFindFirstLineA, SetupGetStringFieldA, SetupGetSourceInfoA<br>> SHLWAPI.dll: SHDeleteValueA<br>> KERNEL32.dll: EnumSystemLocalesA, GetLocaleInfoA, GetUserDefaultLCID, GetDateFormatA, GetTimeFormatA, GetStringTypeW, CreateMutexA, CloseHandle, ReleaseMutex, WaitForMultipleObjectsEx, GetLastError, GetFileAttributesA, GetSystemDirectoryA, GetPrivateProfileStringA, GetVersionExA, CreateProcessA, GlobalFree, GetFullPathNameA, GlobalAlloc, lstrcmpiA, lstrcpynA, GetSystemWindowsDirectoryA, IsValidLocale, WaitForMultipleObjects, GetLocalTime, InterlockedDecrement, InterlockedIncrement, SetErrorMode, ExpandEnvironmentStringsA, SetEnvironmentVariableA, GetProcAddress, LoadLibraryA, GetPrivateProfileSectionA, GetWindowsDirectoryA, GetVersion, FindClose, FindNextFileA, FindFirstFileA, MoveFileA, DeleteFileA, CopyFileA, SetFileAttributesA, GetStringTypeA, InitializeCriticalSection, GetConsoleCP, GetConsoleMode, SetConsoleCtrlHandler, FreeLibrary, InterlockedExchange, SetStdHandle, FlushFileBuffers, CreateFileA, GetTimeZoneInformation, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, FormatMessageA, CompareStringW, GetSystemTimeAsFileTime, GetCurrentProcessId, GetTickCount, QueryPerformanceCounter, CompareStringA, SetEndOfFile, GetLocaleInfoW, GetEnvironmentStringsW, HeapAlloc, HeapFree, GetCurrentThreadId, GetCommandLineA, GetProcessHeap, EnterCriticalSection, LeaveCriticalSection, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, DeleteCriticalSection, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, GetModuleHandleA, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThread, LCMapStringA, WideCharToMultiByte, MultiByteToWideChar, LCMapStringW, FatalAppExitA, VirtualFree, VirtualAlloc, HeapReAlloc, HeapDestroy, HeapCreate, ExitProcess, WriteFile, GetModuleFileNameA, RtlUnwind, SetFilePointer, ReadFile, Sleep, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, HeapSize<br>> USER32.dll: CharLowerA<br>> ADVAPI32.dll: RegEnumValueA, RegDeleteKeyA, RegCreateKeyExA, RegOpenKeyExA, RegEnumKeyA, RegQueryValueExA, RegDeleteValueA, RegCloseKey, RegSetValueExA, OpenSCManagerA, OpenServiceA, CloseServiceHandle, RegOpenKeyA<br>> SHELL32.dll: ShellExecuteExA, SHGetSpecialFolderPathA, SHFileOperationA<br>> ole32.dll: CoFreeLibrary, CoUninitialize, CoInitialize<br><br>( 2 exports ) <br>LvCoInstaller, SetupEntryPoint<br>
PDFiD.: -
RDS...: NSRL Reference Data Set<br>-

Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.18 2009.07.07 -
AhnLab-V3 5.0.0.2 2009.07.06 -
AntiVir 7.9.0.204 2009.07.07 -
Antiy-AVL 2.0.3.1 2009.07.07 -
Authentium 5.1.2.4 2009.07.07 -
Avast 4.8.1335.0 2009.07.06 -
AVG 8.5.0.386 2009.07.07 -
BitDefender 7.2 2009.07.07 -
CAT-QuickHeal 10.00 2009.07.07 -
ClamAV 0.94.1 2009.07.06 -
Comodo 1538 2009.07.02 -
DrWeb 5.0.0.12182 2009.07.07 -
eSafe 7.0.17.0 2009.07.06 -
eTrust-Vet 31.6.6601 2009.07.07 -
F-Prot 4.4.4.56 2009.07.06 -
F-Secure 8.0.14470.0 2009.07.07 -
Fortinet 3.117.0.0 2009.07.03 -
GData 19 2009.07.07 -
Ikarus T3.1.1.64.0 2009.07.07 -
Jiangmin 11.0.706 2009.07.07 -
K7AntiVirus 7.10.785 2009.07.06 -
Kaspersky 7.0.0.125 2009.07.07 -
McAfee 5668 2009.07.06 -
McAfee+Artemis 5668 2009.07.06 -
McAfee-GW-Edition 6.8.5 2009.07.07 -
Microsoft 1.4803 2009.07.07 -
NOD32 4221 2009.07.06 -
Norman 6.01.09 2009.07.06 -
nProtect 2009.1.8.0 2009.07.07 -
Panda 10.0.0.14 2009.07.06 -
PCTools 4.4.2.0 2009.07.06 -
Prevx 3.0 2009.07.07 -
Rising 21.37.12.00 2009.07.07 -
Sophos 4.43.0 2009.07.07 -
Sunbelt 3.2.1858.2 2009.07.07 -
Symantec 1.4.4.12 2009.07.07 -
TheHacker 6.3.4.3.364 2009.07.06 -
TrendMicro 8.950.0.1094 2009.07.07 -
VBA32 3.12.10.7 2009.07.07 -
ViRobot 2009.7.7.1821 2009.07.07 -
VirusBuster 4.6.5.0 2009.07.06 -

Information additionnelle
File size: 195096 bytes
MD5...: 2505566a4b34a3e990c51994fbcff57b
SHA1..: f1693bd0d137a5129aa6d7755f1a36295f424b03
SHA256: 48603c12c2d28d0f907be046d61be423d1fb3c39442e0c78e85115b2aec63710
ssdeep: 3072:yUTfB9tAKzOewg5RpdO4DWN9LirnPPsNJpbu5TlJb9gttYllYlE/gbeI:nf<br>B9tACO5g5R+NUnOQ5N0<br>
PEiD..: -
TrID..: File type identification<br>Win32 Executable MS Visual C++ (generic) (65.2%)<br>Win32 Executable Generic (14.7%)<br>Win32 Dynamic Link Library (generic) (13.1%)<br>Generic Win/DOS Executable (3.4%)<br>DOS Executable Generic (3.4%)
PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0xa46c<br>timedatestamp.....: 0x494890f7 (Wed Dec 17 05:41:11 2008)<br>machinetype.......: 0x14c (I386)<br><br>( 5 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>.text 0x1000 0x21bba 0x22000 6.66 7f8f4d89bf7b7743abfa4d430bb98ef0<br>.rdata 0x23000 0x5c37 0x6000 5.57 eac788144b940d77ebb574e545feff04<br>.data 0x29000 0x2d8c 0x2000 1.56 79baa67a7eb8422d2646b3f7e354558e<br>.rsrc 0x2c000 0xa04 0x1000 4.17 1a01f9c2fcad969672bf5f97b7808ea5<br>.reloc 0x2d000 0x17fe 0x2000 5.67 97e89b1b6a6eadbb89e5404c8b2514b6<br><br>( 8 imports ) <br>> VERSION.dll: GetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA<br>> SETUPAPI.dll: SetupDiOpenClassRegKey, SetupDiGetDriverInfoDetailA, SetupDiGetSelectedDriverA, SetupCloseInfFile, SetupGetLineTextA, SetupOpenInfFileA, SetupDiGetDeviceRegistryPropertyA, SetupDiGetDeviceInstallParamsA, SetupDiOpenDevRegKey, SetupDiSetDeviceInstallParamsA, SetupFindFirstLineA, SetupGetStringFieldA, SetupGetSourceInfoA<br>> SHLWAPI.dll: SHDeleteValueA<br>> KERNEL32.dll: EnumSystemLocalesA, GetLocaleInfoA, GetUserDefaultLCID, GetDateFormatA, GetTimeFormatA, GetStringTypeW, CreateMutexA, CloseHandle, ReleaseMutex, WaitForMultipleObjectsEx, GetLastError, GetFileAttributesA, GetSystemDirectoryA, GetPrivateProfileStringA, GetVersionExA, CreateProcessA, GlobalFree, GetFullPathNameA, GlobalAlloc, lstrcmpiA, lstrcpynA, GetSystemWindowsDirectoryA, IsValidLocale, WaitForMultipleObjects, GetLocalTime, InterlockedDecrement, InterlockedIncrement, SetErrorMode, ExpandEnvironmentStringsA, SetEnvironmentVariableA, GetProcAddress, LoadLibraryA, GetPrivateProfileSectionA, GetWindowsDirectoryA, GetVersion, FindClose, FindNextFileA, FindFirstFileA, MoveFileA, DeleteFileA, CopyFileA, SetFileAttributesA, GetStringTypeA, InitializeCriticalSection, GetConsoleCP, GetConsoleMode, SetConsoleCtrlHandler, FreeLibrary, InterlockedExchange, SetStdHandle, FlushFileBuffers, CreateFileA, GetTimeZoneInformation, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, FormatMessageA, CompareStringW, GetSystemTimeAsFileTime, GetCurrentProcessId, GetTickCount, QueryPerformanceCounter, CompareStringA, SetEndOfFile, GetLocaleInfoW, GetEnvironmentStringsW, HeapAlloc, HeapFree, GetCurrentThreadId, GetCommandLineA, GetProcessHeap, EnterCriticalSection, LeaveCriticalSection, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, DeleteCriticalSection, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, GetModuleHandleA, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThread, LCMapStringA, WideCharToMultiByte, MultiByteToWideChar, LCMapStringW, FatalAppExitA, VirtualFree, VirtualAlloc, HeapReAlloc, HeapDestroy, HeapCreate, ExitProcess, WriteFile, GetModuleFileNameA, RtlUnwind, SetFilePointer, ReadFile, Sleep, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, HeapSize<br>> USER32.dll: CharLowerA<br>> ADVAPI32.dll: RegEnumValueA, RegDeleteKeyA, RegCreateKeyExA, RegOpenKeyExA, RegEnumKeyA, RegQueryValueExA, RegDeleteValueA, RegCloseKey, RegSetValueExA, OpenSCManagerA, OpenServiceA, CloseServiceHandle, RegOpenKeyA<br>> SHELL32.dll: ShellExecuteExA, SHGetSpecialFolderPathA, SHFileOperationA<br>> ole32.dll: CoFreeLibrary, CoUninitialize, CoInitialize<br><br>( 2 exports ) <br>LvCoInstaller, SetupEntryPoint<br>
PDFiD.: -
RDS...: NSRL Reference Data Set<br>-

2)
Fichier ipsec6.exe reçu le 2009.07.07 10:43:12 (UTC)
Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.18 2009.07.07 -
AhnLab-V3 5.0.0.2 2009.07.06 -
AntiVir 7.9.0.204 2009.07.07 -
Antiy-AVL 2.0.3.1 2009.07.07 Worm/Win32.Otwycal.gen
Authentium 5.1.2.4 2009.07.07 -
Avast 4.8.1335.0 2009.07.06 -
AVG 8.5.0.386 2009.07.07 -
BitDefender 7.2 2009.07.07 -
CAT-QuickHeal 10.00 2009.07.07 -
ClamAV 0.94.1 2009.07.06 -
Comodo 1538 2009.07.02 -
DrWeb 5.0.0.12182 2009.07.07 -
eSafe 7.0.17.0 2009.07.06 -
eTrust-Vet 31.6.6601 2009.07.07 -
F-Prot 4.4.4.56 2009.07.06 -
F-Secure 8.0.14470.0 2009.07.07 -
Fortinet 3.117.0.0 2009.07.03 -
GData 19 2009.07.07 -
Ikarus T3.1.1.64.0 2009.07.07 -
Jiangmin 11.0.706 2009.07.07 -
K7AntiVirus 7.10.785 2009.07.06 -
Kaspersky 7.0.0.125 2009.07.07 -
McAfee 5668 2009.07.06 -
McAfee+Artemis 5668 2009.07.06 -
McAfee-GW-Edition 6.8.5 2009.07.07 -
Microsoft 1.4803 2009.07.07 -
NOD32 4221 2009.07.06 -
Norman 6.01.09 2009.07.06 -
nProtect 2009.1.8.0 2009.07.07 -
Panda 10.0.0.14 2009.07.06 -
PCTools 4.4.2.0 2009.07.06 -
Prevx 3.0 2009.07.07 -
Rising 21.37.12.00 2009.07.07 -
Sophos 4.43.0 2009.07.07 -
Sunbelt 3.2.1858.2 2009.07.07 -
Symantec 1.4.4.12 2009.07.07 -
TheHacker 6.3.4.3.364 2009.07.06 -
TrendMicro 8.950.0.1094 2009.07.07 -
VBA32 3.12.10.7 2009.07.07 -
ViRobot 2009.7.7.1821 2009.07.07 -
VirusBuster 4.6.5.0 2009.07.06 -
Information additionnelle
File size: 46080 bytes
MD5...: 61a8b3012e28c8e8ac5d5fa8ef084738
SHA1..: 61efeb4a7d3705daecc0ae729183b479bb80d10b
SHA256: e390a2e4476f3e9d273b8e63641f917a26a298eab208e5b9bb7a7ca8a28d4483
ssdeep: 768:l/Dv3iDR916L0TvKK0OYdT74/lK2FpYMkfDpI1NCugsVck5R7:xPi1916wvN<br>e7OK2FpYMkfG10ug6cG7<br>
PEiD..: -
TrID..: File type identification<br>Win32 Executable MS Visual C++ (generic) (65.2%)<br>Win32 Executable Generic (14.7%)<br>Win32 Dynamic Link Library (generic) (13.1%)<br>Generic Win/DOS Executable (3.4%)<br>DOS Executable Generic (3.4%)
PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0x3d63<br>timedatestamp.....: 0x3b7d8531 (Fri Aug 17 20:57:21 2001)<br>machinetype.......: 0x14c (I386)<br><br>( 3 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>.text 0x1000 0x8024 0x8200 6.58 75124744eafbde3e2cc06137cf66fda1<br>.data 0xa000 0x2cdc 0x800 1.68 ccae1f14d8f3485bf2148330a9265311<br>.rsrc 0xd000 0x249c 0x2600 3.59 afe28b7ea6492410c8288bb304fd415c<br><br>( 3 imports ) <br>> KERNEL32.dll: FormatMessageW, GetLastError, DeviceIoControl, CreateFileW, GetModuleHandleA, GetCommandLineA, GetVersionExA, ExitProcess, GetProcAddress, WriteFile, GetStdHandle, GetModuleFileNameA, UnhandledExceptionFilter, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, GetFileType, GetStartupInfoA, HeapDestroy, HeapCreate, VirtualFree, HeapFree, LCMapStringA, MultiByteToWideChar, LCMapStringW, CloseHandle, ReadFile, HeapAlloc, LoadLibraryA, GetACP, GetOEMCP, GetCPInfo, VirtualAlloc, HeapReAlloc, GetLocaleInfoA, VirtualProtect, GetSystemInfo, VirtualQuery, GetStringTypeA, GetStringTypeW, SetStdHandle, FlushFileBuffers, SetFilePointer, CreateFileA, RtlUnwind, SetEndOfFile, GetProcessHeap, FormatMessageA, LocalFree<br>> WS2_32.dll: freeaddrinfo, -, WSAAddressToStringA, getaddrinfo, getnameinfo<br>> USER32.dll: CharToOemBuffA<br><br>( 0 exports ) <br>
PDFiD.: -
RDS...: NSRL Reference Data Set<br><br>( Microsoft )<br><br>> MSDN Disc 2041: ipsec6.exe<br>> MSDN Disc 2307: ipsec6.exe<br>> MSDN Disc 3264: ipsec6.exe<br>> Platforms, SDK/DDK: ipsec6.exe<br>> Windows XP Home Edition: ipsec6.exe<br>> MSDN Disc 2439.3: ipsec6.exe<br>> MSDN Disc 2439.2: ipsec6.exe<br>> MSDN Disc 2439.1: ipsec6.exe<br>> MSDN Disc 2439.7: ipsec6.exe<br>> MSDN Disc 2439.6: ipsec6.exe<br>> MSDN Disc 2439: ipsec6.exe<br>> MSDN Disc 2439.8: ipsec6.exe<br>> Applications, Platforms, Servers: ipsec6.exe<br><br>

Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.18 2009.07.07 -
AhnLab-V3 5.0.0.2 2009.07.06 -
AntiVir 7.9.0.204 2009.07.07 -
Antiy-AVL 2.0.3.1 2009.07.07 Worm/Win32.Otwycal.gen
Authentium 5.1.2.4 2009.07.07 -
Avast 4.8.1335.0 2009.07.06 -
AVG 8.5.0.386 2009.07.07 -
BitDefender 7.2 2009.07.07 -
CAT-QuickHeal 10.00 2009.07.07 -
ClamAV 0.94.1 2009.07.06 -
Comodo 1538 2009.07.02 -
DrWeb 5.0.0.12182 2009.07.07 -
eSafe 7.0.17.0 2009.07.06 -
eTrust-Vet 31.6.6601 2009.07.07 -
F-Prot 4.4.4.56 2009.07.06 -
F-Secure 8.0.14470.0 2009.07.07 -
Fortinet 3.117.0.0 2009.07.03 -
GData 19 2009.07.07 -
Ikarus T3.1.1.64.0 2009.07.07 -
Jiangmin 11.0.706 2009.07.07 -
K7AntiVirus 7.10.785 2009.07.06 -
Kaspersky 7.0.0.125 2009.07.07 -
McAfee 5668 2009.07.06 -
McAfee+Artemis 5668 2009.07.06 -
McAfee-GW-Edition 6.8.5 2009.07.07 -
Microsoft 1.4803 2009.07.07 -
NOD32 4221 2009.07.06 -
Norman 6.01.09 2009.07.06 -
nProtect 2009.1.8.0 2009.07.07 -
Panda 10.0.0.14 2009.07.06 -
PCTools 4.4.2.0 2009.07.06 -
Prevx 3.0 2009.07.07 -
Rising 21.37.12.00 2009.07.07 -
Sophos 4.43.0 2009.07.07 -
Sunbelt 3.2.1858.2 2009.07.07 -
Symantec 1.4.4.12 2009.07.07 -
TheHacker 6.3.4.3.364 2009.07.06 -
TrendMicro 8.950.0.1094 2009.07.07 -
VBA32 3.12.10.7 2009.07.07 -
ViRobot 2009.7.7.1821 2009.07.07 -
VirusBuster 4.6.5.0 2009.07.06 -

Information additionnelle
File size: 46080 bytes
MD5...: 61a8b3012e28c8e8ac5d5fa8ef084738
SHA1..: 61efeb4a7d3705daecc0ae729183b479bb80d10b
SHA256: e390a2e4476f3e9d273b8e63641f917a26a298eab208e5b9bb7a7ca8a28d4483
ssdeep: 768:l/Dv3iDR916L0TvKK0OYdT74/lK2FpYMkfDpI1NCugsVck5R7:xPi1916wvN<br>e7OK2FpYMkfG10ug6cG7<br>
PEiD..: -
TrID..: File type identification<br>Win32 Executable MS Visual C++ (generic) (65.2%)<br>Win32 Executable Generic (14.7%)<br>Win32 Dynamic Link Library (generic) (13.1%)<br>Generic Win/DOS Executable (3.4%)<br>DOS Executable Generic (3.4%)
PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0x3d63<br>timedatestamp.....: 0x3b7d8531 (Fri Aug 17 20:57:21 2001)<br>machinetype.......: 0x14c (I386)<br><br>( 3 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>.text 0x1000 0x8024 0x8200 6.58 75124744eafbde3e2cc06137cf66fda1<br>.data 0xa000 0x2cdc 0x800 1.68 ccae1f14d8f3485bf2148330a9265311<br>.rsrc 0xd000 0x249c 0x2600 3.59 afe28b7ea6492410c8288bb304fd415c<br><br>( 3 imports ) <br>> KERNEL32.dll: FormatMessageW, GetLastError, DeviceIoControl, CreateFileW, GetModuleHandleA, GetCommandLineA, GetVersionExA, ExitProcess, GetProcAddress, WriteFile, GetStdHandle, GetModuleFileNameA, UnhandledExceptionFilter, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, GetFileType, GetStartupInfoA, HeapDestroy, HeapCreate, VirtualFree, HeapFree, LCMapStringA, MultiByteToWideChar, LCMapStringW, CloseHandle, ReadFile, HeapAlloc, LoadLibraryA, GetACP, GetOEMCP, GetCPInfo, VirtualAlloc, HeapReAlloc, GetLocaleInfoA, VirtualProtect, GetSystemInfo, VirtualQuery, GetStringTypeA, GetStringTypeW, SetStdHandle, FlushFileBuffers, SetFilePointer, CreateFileA, RtlUnwind, SetEndOfFile, GetProcessHeap, FormatMessageA, LocalFree<br>> WS2_32.dll: freeaddrinfo, -, WSAAddressToStringA, getaddrinfo, getnameinfo<br>> USER32.dll: CharToOemBuffA<br><br>( 0 exports ) <br>
PDFiD.: -
RDS...: NSRL Reference Data Set<br><br>( Microsoft )<br><br>> MSDN Disc 2041: ipsec6.exe<br>> MSDN Disc 2307: ipsec6.exe<br>> MSDN Disc 3264: ipsec6.exe<br>> Platforms, SDK/DDK: ipsec6.exe<br>> Windows XP Home Edition: ipsec6.exe<br>> MSDN Disc 2439.3: ipsec6.exe<br>> MSDN Disc 2439.2: ipsec6.exe<br>> MSDN Disc 2439.1: ipsec6.exe<br>> MSDN Disc 2439.7: ipsec6.exe<br>> MSDN Disc 2439.6: ipsec6.exe<br>> MSDN Disc 2439: ipsec6.exe<br>> MSDN Disc 2439.8: ipsec6.exe<br>> Applications, Platforms, Servers: ipsec6.exe<br><br>


3)
Fichier esentutl.exe reçu le 2009.07.07 10:52:45 (UTC)
Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.18 2009.07.07 -
AhnLab-V3 5.0.0.2 2009.07.06 -
AntiVir 7.9.0.204 2009.07.07 -
Antiy-AVL 2.0.3.1 2009.07.07 -
Authentium 5.1.2.4 2009.07.07 -
Avast 4.8.1335.0 2009.07.06 -
AVG 8.5.0.386 2009.07.07 -
BitDefender 7.2 2009.07.07 -
CAT-QuickHeal 10.00 2009.07.07 -
ClamAV 0.94.1 2009.07.06 -
Comodo 1538 2009.07.02 -
DrWeb 5.0.0.12182 2009.07.07 -
eSafe 7.0.17.0 2009.07.06 -
eTrust-Vet 31.6.6601 2009.07.07 -
F-Prot 4.4.4.56 2009.07.06 -
F-Secure 8.0.14470.0 2009.07.07 -
Fortinet 3.117.0.0 2009.07.03 -
GData 19 2009.07.07 -
Ikarus T3.1.1.64.0 2009.07.07 -
Jiangmin 11.0.706 2009.07.07 -
K7AntiVirus 7.10.785 2009.07.06 -
Kaspersky 7.0.0.125 2009.07.07 -
McAfee 5668 2009.07.06 -
McAfee+Artemis 5668 2009.07.06 -
McAfee-GW-Edition 6.8.5 2009.07.07 -
Microsoft 1.4803 2009.07.07 -
NOD32 4221 2009.07.06 -
Norman 6.01.09 2009.07.06 -
nProtect 2009.1.8.0 2009.07.07 -
Panda 10.0.0.14 2009.07.06 -
PCTools 4.4.2.0 2009.07.06 -
Prevx 3.0 2009.07.07 -
Rising 21.37.12.00 2009.07.07 -
Sophos 4.43.0 2009.07.07 -
Sunbelt 3.2.1858.2 2009.07.07 -
Symantec 1.4.4.12 2009.07.07 -
TheHacker 6.3.4.3.364 2009.07.06 -
TrendMicro 8.950.0.1094 2009.07.07 -
VBA32 3.12.10.7 2009.07.07 -
ViRobot 2009.7.7.1821 2009.07.07 -
VirusBuster 4.6.5.0 2009.07.06 -
Information additionnelle
File size: 39424 bytes
MD5...: 6c03c3a8381ba7e87f4528826f5120bc
SHA1..: 2ce272494eb624f4b7f5bda374aab75acea52b12
SHA256: 7afa8ecce1b75f8cffea4202df1bf82d48a38d58af7eacde1b70c4d6d21e8570
ssdeep: 768:BmSyByyBbcGtRe3NeLsSAgswe+uECdqHxWm+8NO1SJjhwYZ5fG:IJyyBbcGt<br>PK+uNd8UIMyG<br>
PEiD..: -
TrID..: File type identification<br>Win32 Executable MS Visual C++ (generic) (65.2%)<br>Win32 Executable Generic (14.7%)<br>Win32 Dynamic Link Library (generic) (13.1%)<br>Generic Win/DOS Executable (3.4%)<br>DOS Executable Generic (3.4%)
PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0x8883<br>timedatestamp.....: 0x3b7d84ad (Fri Aug 17 20:55:09 2001)<br>machinetype.......: 0x14c (I386)<br><br>( 3 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>.text 0x1000 0x8b6a 0x8c00 6.19 f93f9024d511150296c432a8c797e844<br>.data 0xa000 0x5458 0x200 0.83 c9c7d247a2529a1a83cf22232333757a<br>.rsrc 0x10000 0x760 0x800 3.20 efadf3bf4365e8376b2edfa90463ee7c<br><br>( 5 imports ) <br>> msvcrt.dll: _except_handler3, _controlfp, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, __initenv, _cexit, _XcptFilter, _exit, _c_exit, _strupr, fwprintf, _iob, iswascii, atoi, atol, swprintf, _wctime, wprintf, wcslen, wcscpy, strchr, _fullpath, _strcmpi, _splitpath, _makepath, _getch, sprintf, exit, printf, _mbsnbcpy<br>> ADVAPI32.dll: OpenProcessToken, LookupPrivilegeValueA, AdjustTokenPrivileges<br>> KERNEL32.dll: SetEvent, ReadFile, InterlockedIncrement, SetThreadAffinityMask, GetCurrentThread, GetSystemInfo, GetQueuedCompletionStatus, SetThreadPriorityBoost, VirtualFree, WaitForSingleObjectEx, CreateEventW, VirtualAlloc, GetFileSize, GetCurrentProcessId, GetComputerNameA, FreeLibrary, CreateThread, CreateIoCompletionPort, CreateFileW, MoveFileExA, GetProcAddress, LoadLibraryExA, GetLastError, FormatMessageA, GetTickCount, GetModuleHandleA, CopyFileA, MoveFileA, DeleteFileA, FormatMessageW, FindClose, FindFirstFileA, CloseHandle, GetCurrentProcess, MultiByteToWideChar, LocalFree, LocalAlloc, LoadLibraryA<br>> USER32.dll: MessageBoxA<br>> ESENT.dll: JetDBUtilities, JetBackup, JetRestore2, JetEndSession, JetDetachDatabase, JetBeginSession, JetCompact, JetGetSystemParameter, JetSetSystemParameter, JetTerm2, JetInit2, JetInit, JetGetDatabaseFileInfo<br><br>( 0 exports ) <br>
PDFiD.: -
RDS...: NSRL Reference Data Set<br><br>( Microsoft )<br><br>> MSDN Disc 2041: esentutl.exe<br>> MSDN Disc 2307: esentutl.exe<br>> MSDN Disc 3264: esentutl.exe<br>> Platforms, SDK/DDK: esentutl.exe<br>> Windows XP Home Edition: esentutl.exe<br>> MSDN Disc 2439.3: esentutl.exe<br>> MSDN Disc 2439.2: esentutl.exe<br>> MSDN Disc 2439.1: esentutl.exe<br>> MSDN Disc 2439.7: esentutl.exe<br>> MSDN Disc 2439.6: esentutl.exe<br>> MSDN Disc 2439: esentutl.exe<br>> MSDN Disc 2439.8: esentutl.exe<br>> Applications, Platforms, Servers: esentutl.exe<br><br>

Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.18 2009.07.07 -
AhnLab-V3 5.0.0.2 2009.07.06 -
AntiVir 7.9.0.204 2009.07.07 -
Antiy-AVL 2.0.3.1 2009.07.07 -
Authentium 5.1.2.4 2009.07.07 -
Avast 4.8.1335.0 2009.07.06 -
AVG 8.5.0.386 2009.07.07 -
BitDefender 7.2 2009.07.07 -
CAT-QuickHeal 10.00 2009.07.07 -
ClamAV 0.94.1 2009.07.06 -
Comodo 1538 2009.07.02 -
DrWeb 5.0.0.12182 2009.07.07 -
eSafe 7.0.17.0 2009.07.06 -
eTrust-Vet 31.6.6601 2009.07.07 -
F-Prot 4.4.4.56 2009.07.06 -
F-Secure 8.0.14470.0 2009.07.07 -
Fortinet 3.117.0.0 2009.07.03 -
GData 19 2009.07.07 -
Ikarus T3.1.1.64.0 2009.07.07 -
Jiangmin 11.0.706 2009.07.07 -
K7AntiVirus 7.10.785 2009.07.06 -
Kaspersky 7.0.0.125 2009.07.07 -
McAfee 5668 2009.07.06 -
McAfee+Artemis 5668 2009.07.06 -
McAfee-GW-Edition 6.8.5 2009.07.07 -
Microsoft 1.4803 2009.07.07 -
NOD32 4221 2009.07.06 -
Norman 6.01.09 2009.07.06 -
nProtect 2009.1.8.0 2009.07.07 -
Panda 10.0.0.14 2009.07.06 -
PCTools 4.4.2.0 2009.07.06 -
Prevx 3.0 2009.07.07 -
Rising 21.37.12.00 2009.07.07 -
Sophos 4.43.0 2009.07.07 -
Sunbelt 3.2.1858.2 2009.07.07 -
Symantec 1.4.4.12 2009.07.07 -
TheHacker 6.3.4.3.364 2009.07.06 -
TrendMicro 8.950.0.1094 2009.07.07 -
VBA32 3.12.10.7 2009.07.07 -
ViRobot 2009.7.7.1821 2009.07.07 -
VirusBuster 4.6.5.0 2009.07.06 -

Information additionnelle
File size: 39424 bytes
MD5...: 6c03c3a8381ba7e87f4528826f5120bc
SHA1..: 2ce272494eb624f4b7f5bda374aab75acea52b12
SHA256: 7afa8ecce1b75f8cffea4202df1bf82d48a38d58af7eacde1b70c4d6d21e8570
ssdeep: 768:BmSyByyBbcGtRe3NeLsSAgswe+uECdqHxWm+8NO1SJjhwYZ5fG:IJyyBbcGt<br>PK+uNd8UIMyG<br>
PEiD..: -
TrID..: File type identification<br>Win32 Executable MS Visual C++ (generic) (65.2%)<br>Win32 Executable Generic (14.7%)<br>Win32 Dynamic Link Library (generic) (13.1%)<br>Generic Win/DOS Executable (3.4%)<br>DOS Executable Generic (3.4%)
PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0x8883<br>timedatestamp.....: 0x3b7d84ad (Fri Aug 17 20:55:09 2001)<br>machinetype.......: 0x14c (I386)<br><br>( 3 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>.text 0x1000 0x8b6a 0x8c00 6.19 f93f9024d511150296c432a8c797e844<br>.data 0xa000 0x5458 0x200 0.83 c9c7d247a2529a1a83cf22232333757a<br>.rsrc 0x10000 0x760 0x800 3.20 efadf3bf4365e8376b2edfa90463ee7c<br><br>( 5 imports ) <br>> msvcrt.dll: _except_handler3, _controlfp, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, __initenv, _cexit, _XcptFilter, _exit, _c_exit, _strupr, fwprintf, _iob, iswascii, atoi, atol, swprintf, _wctime, wprintf, wcslen, wcscpy, strchr, _fullpath, _strcmpi, _splitpath, _makepath, _getch, sprintf, exit, printf, _mbsnbcpy<br>> ADVAPI32.dll: OpenProcessToken, LookupPrivilegeValueA, AdjustTokenPrivileges<br>> KERNEL32.dll: SetEvent, ReadFile, InterlockedIncrement, SetThreadAffinityMask, GetCurrentThread, GetSystemInfo, GetQueuedCompletionStatus, SetThreadPriorityBoost, VirtualFree, WaitForSingleObjectEx, CreateEventW, VirtualAlloc, GetFileSize, GetCurrentProcessId, GetComputerNameA, FreeLibrary, CreateThread, CreateIoCompletionPort, CreateFileW, MoveFileExA, GetProcAddress, LoadLibraryExA, GetLastError, FormatMessageA, GetTickCount, GetModuleHandleA, CopyFileA, MoveFileA, DeleteFileA, FormatMessageW, FindClose, FindFirstFileA, CloseHandle, GetCurrentProcess, MultiByteToWideChar, LocalFree, LocalAlloc, LoadLibraryA<br>> USER32.dll: MessageBoxA<br>> ESENT.dll: JetDBUtilities, JetBackup, JetRestore2, JetEndSession, JetDetachDatabase, JetBeginSession, JetCompact, JetGetSystemParameter, JetSetSystemParameter, JetTerm2, JetInit2, JetInit, JetGetDatabaseFileInfo<br><br>( 0 exports ) <br>
PDFiD.: -
RDS...: NSRL Reference Data Set<br><br>( Microsoft )<br><br>> MSDN Disc 2041: esentutl.exe<br>> MSDN Disc 2307: esentutl.exe<br>> MSDN Disc 3264: esentutl.exe<br>> Platforms, SDK/DDK: esentutl.exe<br>> Windows XP Home Edition: esentutl.exe<br>> MSDN Disc 2439.3: esentutl.exe<br>> MSDN Disc 2439.2: esentutl.exe<br>> MSDN Disc 2439.1: esentutl.exe<br>> MSDN Disc 2439.7: esentutl.exe<br>> MSDN Disc 2439.6: esentutl.exe<br>> MSDN Disc 2439: esentutl.exe<br>> MSDN Disc 2439.8: esentutl.exe<br>> Applications, Platforms, Servers: esentutl.exe<br><br>


4)
Fichier mstsc.exe reçu le 2009.07.07 10:54:59 (UTC)
Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.18 2009.07.07 -
AhnLab-V3 5.0.0.2 2009.07.06 -
AntiVir 7.9.0.204 2009.07.07 -
Antiy-AVL 2.0.3.1 2009.07.07 -
Authentium 5.1.2.4 2009.07.07 -
Avast 4.8.1335.0 2009.07.06 -
AVG 8.5.0.386 2009.07.07 -
BitDefender 7.2 2009.07.07 -
CAT-QuickHeal 10.00 2009.07.07 -
ClamAV 0.94.1 2009.07.06 -
Comodo 1538 2009.07.02 -
DrWeb 5.0.0.12182 2009.07.07 -
eSafe 7.0.17.0 2009.07.06 -
eTrust-Vet 31.6.6601 2009.07.07 -
F-Prot 4.4.4.56 2009.07.06 -
F-Secure 8.0.14470.0 2009.07.07 -
Fortinet 3.117.0.0 2009.07.03 -
GData 19 2009.07.07 -
Ikarus T3.1.1.64.0 2009.07.07 -
Jiangmin 11.0.706 2009.07.07 -
K7AntiVirus 7.10.785 2009.07.06 -
Kaspersky 7.0.0.125 2009.07.07 -
McAfee 5668 2009.07.06 -
McAfee+Artemis 5668 2009.07.06 -
McAfee-GW-Edition 6.8.5 2009.07.07 -
Microsoft 1.4803 2009.07.07 -
NOD32 4221 2009.07.06 -
Norman 6.01.09 2009.07.06 -
nProtect 2009.1.8.0 2009.07.07 -
Panda 10.0.0.14 2009.07.06 -
PCTools 4.4.2.0 2009.07.06 -
Prevx 3.0 2009.07.07 -
Rising 21.37.12.00 2009.07.07 -
Sophos 4.43.0 2009.07.07 -
Sunbelt 3.2.1858.2 2009.07.07 -
Symantec 1.4.4.12 2009.07.07 -
TheHacker 6.3.4.3.364 2009.07.06 -
TrendMicro 8.950.0.1094 2009.07.07 -
VBA32 3.12.10.7 2009.07.07 -
ViRobot 2009.7.7.1821 2009.07.07 -
VirusBuster 4.6.5.0 2009.07.06 -
Information additionnelle
File size: 411648 bytes
MD5...: 72d638651bad29eb0a50dd7a359375b9
SHA1..: 0e9e4a8fa1f58366ebfd1b7b2beb813016a95404
SHA256: 5a6aa805c8cc1c04f63a3e554a416615216b5ea0ac240c5fdab3814c9b79ee68
ssdeep: 6144:BCNbLqcVTpwikcpFaTIXluqmO5MpODEmthwTY:B2LzVTpwr2FuqmO5MpODE<br>mrwTY<br>
PEiD..: -
TrID..: File type identification<br>Win32 Executable MS Visual C++ (generic) (65.2%)<br>Win32 Executable Generic (14.7%)<br>Win32 Dynamic Link Library (generic) (13.1%)<br>Generic Win/DOS Executable (3.4%)<br>DOS Executable Generic (3.4%)
PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0x14026<br>timedatestamp.....: 0x41107b35 (Wed Aug 04 05:59:17 2004)<br>machinetype.......: 0x14c (I386)<br><br>( 3 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>.text 0x1000 0x25d24 0x25e00 6.46 05d37b8e59c8be0a133e5042be798737<br>.data 0x27000 0x3a34 0x1c00 2.29 071891ff7ee1c00f896e7693113ca4b8<br>.rsrc 0x2b000 0x3c834 0x3ca00 6.30 acd25f24f40c429a99feb8539d70e010<br><br>( 10 imports ) <br>> ADVAPI32.dll: RegCloseKey, RegSetValueExW, RegQueryValueExW, RegOpenKeyExW, RegOpenKeyExA, RegEnumValueW, RegEnumValueA, RegEnumKeyExW, RegEnumKeyExA, RegDeleteValueW, RegDeleteValueA, RegCreateKeyExW, GetUserNameW, RegSetValueExA, RegQueryValueExA, RegCreateKeyExA, GetUserNameA<br>> KERNEL32.dll: FlushFileBuffers, ExitProcess, SetStdHandle, GetLocaleInfoA, GetStringTypeW, GetStringTypeA, SetFilePointer, InterlockedExchange, RtlUnwind, IsBadWritePtr, HeapReAlloc, VirtualAlloc, InitializeCriticalSection, GetCPInfo, GetOEMCP, LoadLibraryA, EnterCriticalSection, LeaveCriticalSection, VirtualQuery, GetSystemInfo, VirtualProtect, LCMapStringW, LCMapStringA, HeapAlloc, HeapFree, VirtualFree, HeapCreate, HeapDestroy, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, DeleteCriticalSection, GetFileType, SetHandleCount, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsA, lstrcpynA, GetVersionExW, GetModuleFileNameA, GetStdHandle, GetCommandLineA, SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetSystemTimeAsFileTime, GetCurrentProcessId, GetCurrentThreadId, GetTickCount, QueryPerformanceCounter, GetCommandLineW, ReadFile, WriteFile, WideCharToMultiByte, SetLastError, GetACP, CreateThread, SetEvent, LocalAlloc, lstrlenA, LoadResource, LockResource, LocalFree, CloseHandle, GetLastError, InterlockedDecrement, FreeLibrary, InterlockedIncrement, GetStartupInfoA, DebugBreak, GetCurrentProcess, TerminateProcess, MultiByteToWideChar, GetProcAddress, GetVersionExA, GetModuleHandleA, GetComputerNameA, GetDiskFreeSpaceA, GlobalMemoryStatus, GetLocalTime, GetModuleHandleW, lstrlenW, GetProcessHeap, WaitForSingleObject, CreateDirectoryA, CreateDirectoryW, CreateEventA, CreateEventW, CreateFileA, CreateFileW, FindResourceA, FindResourceW, FormatMessageA, FormatMessageW, GetCurrentDirectoryA, GetCurrentDirectoryW, GetFileAttributesA, GetFileAttributesW, ExpandEnvironmentStringsA, ExpandEnvironmentStringsW, LoadLibraryW<br>> GDI32.dll: CreateFontIndirectA, CreateFontIndirectW, GetObjectA, GetObjectW, GetDIBColorTable, UpdateColors, StretchBlt, CreatePalette, CreateCompatibleBitmap, CreateSolidBrush, SetTextColor, SetBkMode, SetMapMode, SelectPalette, RealizePalette, TranslateCharsetInfo, CreateCompatibleDC, SelectObject, BitBlt, DeleteDC, GetDeviceCaps, GetStockObject, CreateRectRgn, CreateRectRgnIndirect, DeleteObject, SetRectRgn, GetDCOrgEx, GetClipBox, CombineRgn, EqualRgn<br>> USER32.dll: TranslateMessage, GetWindowDC, MapDialogRect, GetWindow, FillRect, CheckDlgButton, IsDlgButtonChecked, BeginPaint, DrawIcon, EndPaint, EndDialog, MapWindowPoints, GetDesktopWindow, GetDC, ReleaseDC, GetDlgItem, EnableWindow, SetRect, LockWindowUpdate, SetFocus, SetWindowPlacement, SetWindowPos, GetClientRect, MoveWindow, EqualRect, CopyRect, IsWindowVisible, InvalidateRect, UpdateWindow, EnableMenuItem, ShowWindow, SetForegroundWindow, AdjustWindowRect, IsZoomed, SetCursor, GetSystemMenu, CreateMenu, IsWindow, PostQuitMessage, OffsetRect, IntersectRect, SystemParametersInfoA, IsIconic, GetWindowPlacement, GetMessageTime, GetCursorPos, CreateDialogIndirectParamA, CreateDialogIndirectParamW, CreateDialogParamA, CreateDialogParamW, CreateWindowExA, CreateWindowExW, DefWindowProcA, DefWindowProcW, DialogBoxParamA, DialogBoxParamW, DispatchMessageA, DispatchMessageW, DrawTextA, DrawTextW, GetDlgItemTextA, GetDlgItemTextW, GetMessageA, GetMessageW, MessageBoxA, MessageBoxW, GetWindowLongA, GetWindowLongW, InsertMenuA, InsertMenuW, IsDialogMessageA, IsDialogMessageW, LoadAcceleratorsA, LoadAcceleratorsW, LoadCursorA, LoadCursorW, LoadIconA, LoadIconW, LoadImageA, LoadImageW, LoadStringW, ModifyMenuA, ModifyMenuW, PostMessageA, PostMessageW, SendMessageA, SendMessageW, SetDlgItemTextA, SetDlgItemTextW, SetWindowLongA, SetWindowLongW, SetWindowTextA, SetWindowTextW, TranslateAcceleratorA, TranslateAcceleratorW, RegisterClassExA, RegisterClassExW, SendDlgItemMessageW, DestroyIcon, SetTimer, KillTimer, DestroyWindow, GetSystemMetrics, GetWindowRect<br>> SHELL32.dll: SHGetDesktopFolder, SHGetMalloc, SHGetPathFromIDListA, ExtractIconW, ExtractIconA, SHGetSpecialFolderLocation<br>> ole32.dll: CoTaskMemAlloc, CoCreateInstance, CoInitialize, CoUninitialize, CoTaskMemFree<br>> OLEAUT32.dll: -, -<br>> COMCTL32.dll: ImageList_Create, InitCommonControlsEx, ImageList_GetImageCount, ImageList_ReplaceIcon<br>> WSOCK32.dll: -, -, -<br>> comdlg32.dll: GetFileTitleW, GetSaveFileNameW, GetOpenFileNameA, GetSaveFileNameA, GetFileTitleA, GetOpenFileNameW<br><br>( 0 exports ) <br>
PDFiD.: -
RDS...: NSRL Reference Data Set<br><br>( Microsoft )<br><br>> MSDN Disc 2439.8: mstsc.exe<br>> MSDN Disc 2439.7: mstsc.exe<br>> MSDN Disc 2439.6: mstsc.exe<br><br>
ThreatExpert info: <a href='http://www.threatexpert.com/report.aspx?md5=72d638651bad29eb0a50dd7a359375b9' target='_blank'>https://www.symantec.com?md5=72d638651bad29eb0a50dd7a359375b9</a>

Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.18 2009.07.07 -
AhnLab-V3 5.0.0.2 2009.07.06 -
AntiVir 7.9.0.204 2009.07.07 -
Antiy-AVL 2.0.3.1 2009.07.07 -
Authentium 5.1.2.4 2009.07.07 -
Avast 4.8.1335.0 2009.07.06 -
AVG 8.5.0.386 2009.07.07 -
BitDefender 7.2 2009.07.07 -
CAT-QuickHeal 10.00 2009.07.07 -
ClamAV 0.94.1 2009.07.06 -
Comodo 1538 2009.07.02 -
DrWeb 5.0.0.12182 2009.07.07 -
eSafe 7.0.17.0 2009.07.06 -
eTrust-Vet 31.6.6601 2009.07.07 -
F-Prot 4.4.4.56 2009.07.06 -
F-Secure 8.0.14470.0 2009.07.07 -
Fortinet 3.117.0.0 2009.07.03 -
GData 19 2009.07.07 -
Ikarus T3.1.1.64.0 2009.07.07 -
Jiangmin 11.0.706 2009.07.07 -
K7AntiVirus 7.10.785 2009.07.06 -
Kaspersky 7.0.0.125 2009.07.07 -
McAfee 5668 2009.07.06 -
McAfee+Artemis 5668 2009.07.06 -
McAfee-GW-Edition 6.8.5 2009.07.07 -
Microsoft 1.4803 2009.07.07 -
NOD32 4221 2009.07.06 -
Norman 6.01.09 2009.07.06 -
nProtect 2009.1.8.0 2009.07.07 -
Panda 10.0.0.14 2009.07.06 -
PCTools 4.4.2.0 2009.07.06 -
Prevx 3.0 2009.07.07 -
Rising 21.37.12.00 2009.07.07 -
Sophos 4.43.0 2009.07.07 -
Sunbelt 3.2.1858.2 2009.07.07 -
Symantec 1.4.4.12 2009.07.07 -
TheHacker 6.3.4.3.364 2009.07.06 -
TrendMicro 8.950.0.1094 2009.07.07 -
VBA32 3.12.10.7 2009.07.07 -
ViRobot 2009.7.7.1821 2009.07.07 -
VirusBuster 4.6.5.0 2009.07.06 -

Information additionnelle
File size: 411648 bytes
MD5...: 72d638651bad29eb0a50dd7a359375b9
SHA1..: 0e9e4a8fa1f58366ebfd1b7b2beb813016a95404
SHA256: 5a6aa805c8cc1c04f63a3e554a416615216b5ea0ac240c5fdab3814c9b79ee68
ssdeep: 6144:BCNbLqcVTpwikcpFaTIXluqmO5MpODEmthwTY:B2LzVTpwr2FuqmO5MpODE<br>mrwTY<br>
PEiD..: -
TrID..: File type identification<br>Win32 Executable MS Visual C++ (generic) (65.2%)<br>Win32 Executable Generic (14.7%)<br>Win32 Dynamic Link Library (generic) (13.1%)<br>Generic Win/DOS Executable (3.4%)<br>DOS Executable Generic (3.4%)
PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0x14026<br>timedatestamp.....: 0x41107b35 (Wed Aug 04 05:59:17 2004)<br>machinetype.......: 0x14c (I386)<br><br>( 3 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>.text 0x1000 0x25d24 0x25e00 6.46 05d37b8e59c8be0a133e5042be798737<br>.data 0x27000 0x3a34 0x1c00 2.29 071891ff7ee1c00f896e7693113ca4b8<br>.rsrc 0x2b000 0x3c834 0x3ca00 6.30 acd25f24f40c429a99feb8539d70e010<br><br>( 10 imports ) <br>> ADVAPI32.dll: RegCloseKey, RegSetValueExW, RegQueryValueExW, RegOpenKeyExW, RegOpenKeyExA, RegEnumValueW, RegEnumValueA, RegEnumKeyExW, RegEnumKeyExA, RegDeleteValueW, RegDeleteValueA, RegCreateKeyExW, GetUserNameW, RegSetValueExA, RegQueryValueExA, RegCreateKeyExA, GetUserNameA<br>> KERNEL32.dll: FlushFileBuffers, ExitProcess, SetStdHandle, GetLocaleInfoA, GetStringTypeW, GetStringTypeA, SetFilePointer, InterlockedExchange, RtlUnwind, IsBadWritePtr, HeapReAlloc, VirtualAlloc, InitializeCriticalSection, GetCPInfo, GetOEMCP, LoadLibraryA, EnterCriticalSection, LeaveCriticalSection, VirtualQuery, GetSystemInfo, VirtualProtect, LCMapStringW, LCMapStringA, HeapAlloc, HeapFree, VirtualFree, HeapCreate, HeapDestroy, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, DeleteCriticalSection, GetFileType, SetHandleCount, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsA, lstrcpynA, GetVersionExW, GetModuleFileNameA, GetStdHandle, GetCommandLineA, SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetSystemTimeAsFileTime, GetCurrentProcessId, GetCurrentThreadId, GetTickCount, QueryPerformanceCounter, GetCommandLineW, ReadFile, WriteFile, WideCharToMultiByte, SetLastError, GetACP, CreateThread, SetEvent, LocalAlloc, lstrlenA, LoadResource, LockResource, LocalFree, CloseHandle, GetLastError, InterlockedDecrement, FreeLibrary, InterlockedIncrement, GetStartupInfoA, DebugBreak, GetCurrentProcess, TerminateProcess, MultiByteToWideChar, GetProcAddress, GetVersionExA, GetModuleHandleA, GetComputerNameA, GetDiskFreeSpaceA, GlobalMemoryStatus, GetLocalTime, GetModuleHandleW, lstrlenW, GetProcessHeap, WaitForSingleObject, CreateDirectoryA, CreateDirectoryW, CreateEventA, CreateEventW, CreateFileA, CreateFileW, FindResourceA, FindResourceW, FormatMessageA, FormatMessageW, GetCurrentDirectoryA, GetCurrentDirectoryW, GetFileAttributesA, GetFileAttributesW, ExpandEnvironmentStringsA, ExpandEnvironmentStringsW, LoadLibraryW<br>> GDI32.dll: CreateFontIndirectA, CreateFontIndirectW, GetObjectA, GetObjectW, GetDIBColorTable, UpdateColors, StretchBlt, CreatePalette, CreateCompatibleBitmap, CreateSolidBrush, SetTextColor, SetBkMode, SetMapMode, SelectPalette, RealizePalette, TranslateCharsetInfo, CreateCompatibleDC, SelectObject, BitBlt, DeleteDC, GetDeviceCaps, GetStockObject, CreateRectRgn, CreateRectRgnIndirect, DeleteObject, SetRectRgn, GetDCOrgEx, GetClipBox, CombineRgn, EqualRgn<br>> USER32.dll: TranslateMessage, GetWindowDC, MapDialogRect, GetWindow, FillRect, CheckDlgButton, IsDlgButtonChecked, BeginPaint, DrawIcon, EndPaint, EndDialog, MapWindowPoints, GetDesktopWindow, GetDC, ReleaseDC, GetDlgItem, EnableWindow, SetRect, LockWindowUpdate, SetFocus, SetWindowPlacement, SetWindowPos, GetClientRect, MoveWindow, EqualRect, CopyRect, IsWindowVisible, InvalidateRect, UpdateWindow, EnableMenuItem, ShowWindow, SetForegroundWindow, AdjustWindowRect, IsZoomed, SetCursor, GetSystemMenu, CreateMenu, IsWindow, PostQuitMessage, OffsetRect, IntersectRect, SystemParametersInfoA, IsIconic, GetWindowPlacement, GetMessageTime, GetCursorPos, CreateDialogIndirectParamA, CreateDialogIndirectParamW, CreateDialogParamA, CreateDialogParamW, CreateWindowExA, CreateWindowExW, DefWindowProcA, DefWindowProcW, DialogBoxParamA, DialogBoxParamW, DispatchMessageA, DispatchMessageW, DrawTextA, DrawTextW, GetDlgItemTextA, GetDlgItemTextW, GetMessageA, GetMessageW, MessageBoxA, MessageBoxW, GetWindowLongA, GetWindowLongW, InsertMenuA, InsertMenuW, IsDialogMessageA, IsDialogMessageW, LoadAcceleratorsA, LoadAcceleratorsW, LoadCursorA, LoadCursorW, LoadIconA, LoadIconW, LoadImageA, LoadImageW, LoadStringW, ModifyMenuA, ModifyMenuW, PostMessageA, PostMessageW, SendMessageA, SendMessageW, SetDlgItemTextA, SetDlgItemTextW, SetWindowLongA, SetWindowLongW, SetWindowTextA, SetWindowTextW, TranslateAcceleratorA, TranslateAcceleratorW, RegisterClassExA, RegisterClassExW, SendDlgItemMessageW, DestroyIcon, SetTimer, KillTimer, DestroyWindow, GetSystemMetrics, GetWindowRect<br>> SHELL32.dll: SHGetDesktopFolder, SHGetMalloc, SHGetPathFromIDListA, ExtractIconW, ExtractIconA, SHGetSpecialFolderLocation<br>> ole32.dll: CoTaskMemAlloc, CoCreateInstance, CoInitialize, CoUninitialize, CoTaskMemFree<br>> OLEAUT32.dll: -, -<br>> COMCTL32.dll: ImageList_Create, InitCommonControlsEx, ImageList_GetImageCount, ImageList_ReplaceIcon<br>> WSOCK32.dll: -, -, -<br>> comdlg32.dll: GetFileTitleW, GetSaveFileNameW, GetOpenFileNameA, GetSaveFileNameA, GetFileTitleA, GetOpenFileNameW<br><br>( 0 exports ) <br>
PDFiD.: -
RDS...: NSRL Reference Data Set<br><br>( Microsoft )<br><br>> MSDN Disc 2439.8: mstsc.exe<br>> MSDN Disc 2439.7: mstsc.exe<br>> MSDN Disc 2439.6: mstsc.exe<br><br>
ThreatExpert info: <a href='http://www.threatexpert.com/report.aspx?md5=72d638651bad29eb0a50dd7a359375b9' target='_blank'>https://www.symantec.com?md5=72d638651bad29eb0a50dd7a359375b9</a>


5)
Fichier rsvp.exe reçu le 2009.07.07 10:56:39 (UTC)
Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.18 2009.07.07 -
AhnLab-V3 5.0.0.2 2009.07.07 -
AntiVir 7.9.0.204 2009.07.07 -
Antiy-AVL 2.0.3.1 2009.07.07 -
Authentium 5.1.2.4 2009.07.07 -
Avast 4.8.1335.0 2009.07.06 -
AVG 8.5.0.386 2009.07.07 -
BitDefender 7.2 2009.07.07 -
CAT-QuickHeal 10.00 2009.07.07 -
ClamAV 0.94.1 2009.07.06 -
Comodo 1538 2009.07.02 -
DrWeb 5.0.0.12182 2009.07.07 -
eSafe 7.0.17.0 2009.07.06 -
eTrust-Vet 31.6.6601 2009.07.07 -
F-Prot 4.4.4.56 2009.07.06 -
F-Secure 8.0.14470.0 2009.07.07 -
Fortinet 3.117.0.0 2009.07.03 -
GData 19 2009.07.07 -
Ikarus T3.1.1.64.0 2009.07.07 -
Jiangmin 11.0.706 2009.07.07 -
K7AntiVirus 7.10.785 2009.07.06 -
Kaspersky 7.0.0.125 2009.07.07 -
McAfee 5668 2009.07.06 -
McAfee+Artemis 5668 2009.07.06 -
McAfee-GW-Edition 6.8.5 2009.07.07 -
Microsoft 1.4803 2009.07.07 -
NOD32 4221 2009.07.06 -
Norman 6.01.09 2009.07.06 -
nProtect 2009.1.8.0 2009.07.07 -
Panda 10.0.0.14 2009.07.06 -
PCTools 4.4.2.0 2009.07.06 -
Prevx 3.0 2009.07.07 -
Rising 21.37.12.00 2009.07.07 -
Sophos 4.43.0 2009.07.07 -
Sunbelt 3.2.1858.2 2009.07.07 -
Symantec 1.4.4.12 2009.07.07 -
TheHacker 6.3.4.3.364 2009.07.06 -
TrendMicro 8.950.0.1094 2009.07.07 -
VBA32 3.12.10.7 2009.07.07 -
ViRobot 2009.7.7.1821 2009.07.07 -
VirusBuster 4.6.5.0 2009.07.06 -
Information additionnelle
File size: 132608 bytes
MD5...: 414964844f4793acb868d057e8ed997e
SHA1..: 03ac11a22ca5130db4e1a05c2bf16acb4ad02770
SHA256: 843e0c7761ac001bf1169251167b08da24e227f041f80586f2a54197a166fd13
ssdeep: 3072:f19lG6TZ9WqfkA/ar9xMS/TEcxYPpsCmOPsy3TMELkRB/:fTXTZppyx7hx+<br>rPsGo7RB<br>
PEiD..: -
TrID..: File type identification<br>Win32 Executable MS Visual C++ (generic) (65.2%)<br>Win32 Executable Generic (14.7%)<br>Win32 Dynamic Link Library (generic) (13.1%)<br>Generic Win/DOS Executable (3.4%)<br>DOS Executable Generic (3.4%)
PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0x1ed92<br>timedatestamp.....: 0x3b7d848e (Fri Aug 17 20:54:38 2001)<br>machinetype.......: 0x14c (I386)<br><br>( 3 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>.text 0x1000 0x1ef8a 0x1f000 6.69 b6b94a222874b39978929d0a0cba6534<br>.data 0x20000 0x22bd4 0xe00 3.41 fc8e2377d2ae60a33f4422f36bc3774f<br>.rsrc 0x43000 0x3d0 0x400 3.22 ddc6eb16e5a48e5df14abd7f188d71a7<br><br>( 8 imports ) <br>> msvcrt.dll: sprintf, wcscpy, wcscat, wcslen, wcscmp, _snprintf, floor, strncpy, atoi, _strnicmp, _iob, strtoul, _vsnprintf, fprintf, free, malloc, perror, memmove, _stricmp, _wcsicmp, rand, wcsrchr, _snwprintf, wcsncat, wcschr, wcsstr, _c_exit, _exit, _XcptFilter, _cexit, __initenv, __getmainargs, _initterm, __setusermatherr, _adjust_fdiv, __p__commode, __p__fmode, __set_app_type, _except_handler3, _controlfp, _ftol, exit<br>> ADVAPI32.dll: RegisterServiceCtrlHandlerExA, SetServiceStatus, AllocateAndInitializeSid, GetLengthSid, InitializeAcl, AddAccessAllowedAce, InitializeSecurityDescriptor, SetSecurityDescriptorDacl, FreeSid, RegNotifyChangeKeyValue, RegQueryValueExW, RegSetValueExA, RegCloseKey, CryptAcquireContextA, CryptGenRandom, CryptReleaseContext, OpenSCManagerA, OpenServiceA, QueryServiceStatus, CloseServiceHandle, RegOpenKeyExA, RegQueryValueExA, ReportEventA, RegisterEventSourceA, StartServiceCtrlDispatcherA<br>> KERNEL32.dll: IsBadWritePtr, InterlockedExchangeAdd, InterlockedDecrement, OpenProcess, CreateFileA, ReadFile, GetStdHandle, WriteFile, IsBadReadPtr, GetLocalTime, SystemTimeToFileTime, UnmapViewOfFile, CreateSemaphoreA, CreateFileMappingA, MapViewOfFile, WaitForMultipleObjects, GetTickCount, WaitForSingleObject, DeleteCriticalSection, FormatMessageA, LocalFree, CreateEventA, InitializeCriticalSection, ResetEvent, SetProcessWorkingSetSize, GetCurrentProcess, GetSystemTime, HeapDestroy, HeapCreate, CreateDirectoryW, CompareFileTime, GetFileAttributesExW, SetFilePointer, CreateFileW, WideCharToMultiByte, LoadLibraryExW, GetSystemDirectoryW, GetVersionExA, HeapSize, OpenEventA, FlushViewOfFile, ReleaseSemaphore, GetModuleHandleA, LocalAlloc, OpenFileMappingA, CloseHandle, ExitProcess, HeapAlloc, HeapFree, FreeLibrary, GetProcAddress, GetLastError, MultiByteToWideChar, ExpandEnvironmentStringsW, SetEvent, LeaveCriticalSection, EnterCriticalSection, CreateThread<br>> ntdll.dll: DbgBreakPoint, RtlRandomEx, DbgPrint<br>> RPCRT4.dll: NdrServerCall2, RpcAsyncCompleteCall, UuidCreate, RpcServerUnregisterIfEx, RpcServerListen, RpcServerRegisterIf, RpcServerUseProtseqEpA, RpcServerRegisterAuthInfoA, RpcAsyncAbortCall, RpcServerTestCancel, RpcRevertToSelfEx, RpcImpersonateClient, RpcMgmtWaitServerListen, RpcMgmtStopServerListening, NdrAsyncServerCall<br>> Secur32.dll: GetUserNameExA<br>> USER32.dll: DefWindowProcA, PostQuitMessage, DispatchMessageA, GetMessageA, CreateWindowExA, RegisterClassA<br>> WS2_32.dll: WSACreateEvent, WSAWaitForMultipleEvents, -, -, -, -, -, -, WSACloseEvent, -, -, WSAIoctl, -, WSCEnumProtocols, -, WSASocketW, -, -, -, -, WSAEnumNetworkEvents, WSAEventSelect<br><br>( 0 exports ) <br>
PDFiD.: -
RDS...: NSRL Reference Data Set<br><br>( Microsoft )<br><br>> MSDN Disc 2041: rsvp.exe<br>> MSDN Disc 2307: rsvp.exe<br>> MSDN Disc 3264: rsvp.exe<br>> Platforms, SDK/DDK: rsvp.exe<br>> Windows XP Home Edition: rsvp.exe<br>> MSDN Disc 2439.3: rsvp.exe<br>> MSDN Disc 2439.2: rsvp.exe<br>> MSDN Disc 2439.1: rsvp.exe<br>> MSDN Disc 2439.7: rsvp.exe<br>> MSDN Disc 2439.6: rsvp.exe<br>> MSDN Disc 2439: rsvp.exe<br>> MSDN Disc 2439.8: rsvp.exe<br>> Applications, Platforms, Servers: rsvp.exe<br><br>
ThreatExpert info: <a href='http://www.threatexpert.com/report.aspx?md5=414964844f4793acb868d057e8ed997e' target='_blank'>https://www.symantec.com?md5=414964844f4793acb868d057e8ed997e</a>

Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.18 2009.07.07 -
AhnLab-V3 5.0.0.2 2009.07.07 -
AntiVir 7.9.0.204 2009.07.07 -
Antiy-AVL 2.0.3.1 2009.07.07 -
Authentium 5.1.2.4 2009.07.07 -
Avast 4.8.1335.0 2009.07.06 -
AVG 8.5.0.386 2009.07.07 -
BitDefender 7.2 2009.07.07 -
CAT-QuickHeal 10.00 2009.07.07 -
ClamAV 0.94.1 2009.07.06 -
Comodo 1538 2009.07.02 -
DrWeb 5.0.0.12182 2009.07.07 -
eSafe 7.0.17.0 2009.07.06 -
eTrust-Vet 31.6.6601 2009.07.07 -
F-Prot 4.4.4.56 2009.07.06 -
F-Secure 8.0.14470.0 2009.07.07 -
Fortinet 3.117.0.0 2009.07.03 -
GData 19 2009.07.07 -
Ikarus T3.1.1.64.0 2009.07.07 -
Jiangmin 11.0.706 2009.07.07 -
K7AntiVirus 7.10.785 2009.07.06 -
Kaspersky 7.0.0.125 2009.07.07 -
McAfee 5668 2009.07.06 -
McAfee+Artemis 5668 2009.07.06 -
McAfee-GW-Edition 6.8.5 2009.07.07 -
Microsoft 1.4803 2009.07.07 -
NOD32 4221 2009.07.06 -
Norman 6.01.09 2009.07.06 -
nProtect 2009.1.8.0 2009.07.07 -
Panda 10.0.0.14 2009.07.06 -
PCTools 4.4.2.0 2009.07.06 -
Prevx 3.0 2009.07.07 -
Rising 21.37.12.00 2009.07.07 -
Sophos 4.43.0 2009.07.07 -
Sunbelt 3.2.1858.2 2009.07.07 -
Symantec 1.4.4.12 2009.07.07 -
TheHacker 6.3.4.3.364 2009.07.06 -
TrendMicro 8.950.0.1094 2009.07.07 -
VBA32 3.12.10.7 2009.07.07 -
ViRobot 2009.7.7.1821 2009.07.07 -
VirusBuster 4.6.5.0 2009.07.06 -

Information additionnelle
File size: 132608 bytes
MD5...: 414964844f4793acb868d057e8ed997e
SHA1..: 03ac11a22ca5130db4e1a05c2bf16acb4ad02770
SHA256: 843e0c7761ac001bf1169251167b08da24e227f041f80586f2a54197a166fd13
ssdeep: 3072:f19lG6TZ9WqfkA/ar9xMS/TEcxYPpsCmOPsy3TMELkRB/:fTXTZppyx7hx+<br>rPsGo7RB<br>
PEiD..: -
TrID..: File type identification<br>Win32 Executable MS Visual C++ (generic) (65.2%)<br>Win32 Executable Generic (14.7%)<br>Win32 Dynamic Link Library (generic) (13.1%)<br>Generic Win/DOS Executable (3.4%)<br>DOS Executable Generic (3.4%)
PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0x1ed92<br>timedatestamp.....: 0x3b7d848e (Fri Aug 17 20:54:38 2001)<br>machinetype.......: 0x14c (I386)<br><br>( 3 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>.text 0x1000 0x1ef8a 0x1f000 6.69 b6b94a222874b39978929d0a0cba6534<br>.data 0x20000 0x22bd4 0xe00 3.41 fc8e2377d2ae60a33f4422f36bc3774f<br>.rsrc 0x43000 0x3d0 0x400 3.22 ddc6eb16e5a48e5df14abd7f188d71a7<br><br>( 8 imports ) <br>> msvcrt.dll: sprintf, wcscpy, wcscat, wcslen, wcscmp, _snprintf, floor, strncpy, atoi, _strnicmp, _iob, strtoul, _vsnprintf, fprintf, free, malloc, perror, memmove, _stricmp, _wcsicmp, rand, wcsrchr, _snwprintf, wcsncat, wcschr, wcsstr, _c_exit, _exit, _XcptFilter, _cexit, __initenv, __getmainargs, _initterm, __setusermatherr, _adjust_fdiv, __p__commode, __p__fmode, __set_app_type, _except_handler3, _controlfp, _ftol, exit<br>> ADVAPI32.dll: RegisterServiceCtrlHandlerExA, SetServiceStatus, AllocateAndInitializeSid, GetLengthSid, InitializeAcl, AddAccessAllowedAce, InitializeSecurityDescriptor, SetSecurityDescriptorDacl, FreeSid, RegNotifyChangeKeyValue, RegQueryValueExW, RegSetValueExA, RegCloseKey, CryptAcquireContextA, CryptGenRandom, CryptReleaseContext, OpenSCManagerA, OpenServiceA, QueryServiceStatus, CloseServiceHandle, RegOpenKeyExA, RegQueryValueExA, ReportEventA, RegisterEventSourceA, StartServiceCtrlDispatcherA<br>> KERNEL32.dll: IsBadWritePtr, InterlockedExchangeAdd, InterlockedDecrement, OpenProcess, CreateFileA, ReadFile, GetStdHandle, WriteFile, IsBadReadPtr, GetLocalTime, SystemTimeToFileTime, UnmapViewOfFile, CreateSemaphoreA, CreateFileMappingA, MapViewOfFile, WaitForMultipleObjects, GetTickCount, WaitForSingleObject, DeleteCriticalSection, FormatMessageA, LocalFree, CreateEventA, InitializeCriticalSection, ResetEvent, SetProcessWorkingSetSize, GetCurrentProcess, GetSystemTime, HeapDestroy, HeapCreate, CreateDirectoryW, CompareFileTime, GetFileAttributesExW, SetFilePointer, CreateFileW, WideCharToMultiByte, LoadLibraryExW, GetSystemDirectoryW, GetVersionExA, HeapSize, OpenEventA, FlushViewOfFile, ReleaseSemaphore, GetModuleHandleA, LocalAlloc, OpenFileMappingA, CloseHandle, ExitProcess, HeapAlloc, HeapFree, FreeLibrary, GetProcAddress, GetLastError, MultiByteToWideChar, ExpandEnvironmentStringsW, SetEvent, LeaveCriticalSection, EnterCriticalSection, CreateThread<br>> ntdll.dll: DbgBreakPoint, RtlRandomEx, DbgPrint<br>> RPCRT4.dll: NdrServerCall2, RpcAsyncCompleteCall, UuidCreate, RpcServerUnregisterIfEx, RpcServerListen, RpcServerRegisterIf, RpcServerUseProtseqEpA, RpcServerRegisterAuthInfoA, RpcAsyncAbortCall, RpcServerTestCancel, RpcRevertToSelfEx, RpcImpersonateClient, RpcMgmtWaitServerListen, RpcMgmtStopServerListening, NdrAsyncServerCall<br>> Secur32.dll: GetUserNameExA<br>> USER32.dll: DefWindowProcA, PostQuitMessage, DispatchMessageA, GetMessageA, CreateWindowExA, RegisterClassA<br>> WS2_32.dll: WSACreateEvent, WSAWaitForMultipleEvents, -, -, -, -, -, -, WSACloseEvent, -, -, WSAIoctl, -, WSCEnumProtocols, -, WSASocketW, -, -, -, -, WSAEnumNetworkEvents, WSAEventSelect<br><br>( 0 exports ) <br>
PDFiD.: -
RDS...: NSRL Reference Data Set<br><br>( Microsoft )<br><br>> MSDN Disc 2041: rsvp.exe<br>> MSDN Disc 2307: rsvp.exe<br>> MSDN Disc 3264: rsvp.exe<br>> Platforms, SDK/DDK: rsvp.exe<br>> Windows XP Home Edition: rsvp.exe<br>> MSDN Disc 2439.3: rsvp.exe<br>> MSDN Disc 2439.2: rsvp.exe<br>> MSDN Disc 2439.1: rsvp.exe<br>> MSDN Disc 2439.7: rsvp.exe<br>> MSDN Disc 2439.6: rsvp.exe<br>> MSDN Disc 2439: rsvp.exe<br>> MSDN Disc 2439.8: rsvp.exe<br>> Applications, Platforms, Servers: rsvp.exe<br><br>
ThreatExpert info: <a href='http://www.threatexpert.com/report.aspx?md5=414964844f4793acb868d057e8ed997e' target='_blank'>https://www.symantec.com?md5=414964844f4793acb868d057e8ed997e</a>


6)
Fichier Rtl60.bpl reçu le 2009.07.07 10:59:34 (UTC)
Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.18 2009.07.07 -
AhnLab-V3 5.0.0.2 2009.07.07 -
AntiVir 7.9.0.204 2009.07.07 -
Antiy-AVL 2.0.3.1 2009.07.07 -
Authentium 5.1.2.4 2009.07.07 -
Avast 4.8.1335.0 2009.07.06 -
AVG 8.5.0.386 2009.07.07 -
BitDefender 7.2 2009.07.07 -
CAT-QuickHeal 10.00 2009.07.07 -
ClamAV 0.94.1 2009.07.06 -
Comodo 1538 2009.07.02 -
DrWeb 5.0.0.12182 2009.07.07 -
eSafe 7.0.17.0 2009.07.06 -
eTrust-Vet 31.6.6601 2009.07.07 -
F-Prot 4.4.4.56 2009.07.06 -
F-Secure 8.0.14470.0 2009.07.07 -
Fortinet 3.117.0.0 2009.07.03 -
GData 19 2009.07.07 -
Ikarus T3.1.1.64.0 2009.07.07 -
Jiangmin 11.0.706 2009.07.07 -
K7AntiVirus 7.10.785 2009.07.06 -
Kaspersky 7.0.0.125 2009.07.07 -
McAfee 5668 2009.07.06 -
McAfee+Artemis 5668 2009.07.06 -
McAfee-GW-Edition 6.8.5 2009.07.07 -
Microsoft 1.4803 2009.07.07 -
NOD32 4222 2009.07.07 -
Norman 6.01.09 2009.07.06 -
nProtect 2009.1.8.0 2009.07.07 -
Panda 10.0.0.14 2009.07.06 -
PCTools 4.4.2.0 2009.07.06 -
Prevx 3.0 2009.07.07 -
Rising 21.37.12.00 2009.07.07 -
Sophos 4.43.0 2009.07.07 -
Sunbelt 3.2.1858.2 2009.07.07 -
Symantec 1.4.4.12 2009.07.07 -
TheHacker 6.3.4.3.364 2009.07.06 -
TrendMicro 8.950.0.1094 2009.07.07 -
VBA32 3.12.10.7 2009.07.07 -
ViRobot 2009.7.7.1821 2009.07.07 -
VirusBuster 4.6.5.0 2009.07.06 -
Information additionnelle
File size: 395264 bytes
MD5...: ecf9eb557aec67c5e6223d065d0581f2
SHA1..: 693cf07933f7d38e1ccdc092afdd20f060012162
SHA256: cb4dd7d58b8f5d6c104119d7dee9daf3fa0cc8c8b282841d4be7799925681a4a
ssdeep: 6144:Egg+6ll8RK+PvLeAnAWauMIWtouT/BZI/4YeQ+mmkz0Ka:EXL3+PzeIJLMI<br>WCuDOn+7<br>
PEiD..: ASPack v2.1
TrID..: File type identification<br>Win32 EXE PECompact compressed (generic) (76.8%)<br>Win32 Executable Generic (15.7%)<br>Generic Win/DOS Executable (3.7%)<br>DOS Executable Generic (3.6%)<br>Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0xa2001<br>timedatestamp.....: 0x2a425e19 (Fri Jun 19 22:22:17 1992)<br>machinetype.......: 0x14c (I386)<br><br>( 10 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>CODE 0x1000 0x58000 0x22600 8.00 aef7578b657c52dec29af729d8734fdd<br>DATA 0x59000 0x3000 0xc00 7.92 3b7e2eb3975cb745031018907a4fdca8<br>BSS 0x5c000 0x1000 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e<br>.idata 0x5d000 0x2000 0xa00 7.91 1ff09efcf8751df2f0342c2b9b326253<br>.edata 0x5f000 0x36000 0x35600 5.92 fd10f9d10749495ebfaaf98f980b46c4<br>.rdata 0x95000 0x1000 0x200 0.46 ac06ef37446756c78b16127a583d32f5<br>.reloc 0x96000 0x6000 0x4000 7.98 035cc90860d7a6f2536eae15a4ccefa5<br>.rsrc 0x9c000 0x6000 0x1a00 6.91 29d829097c9bbea7c66e65a42fde3cf1<br>.aspack 0xa2000 0x2000 0x1600 5.79 37cca919f4ae4543d75b042ee9dd3963<br>.data 0xa4000 0x1000 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e<br><br>( 13 imports ) <br>> kernel32.dll: GetProcAddress, GetModuleHandleA, LoadLibraryA<br>> user32.dll: GetKeyboardType<br>> advapi32.dll: RegQueryValueExA<br>> oleaut32.dll: SysFreeString<br>> advapi32.dll: RegUnLoadKeyA<br>> mpr.dll: WNetOpenEnumA<br>> gdi32.dll: GetDCOrgEx<br>> user32.dll: UnregisterClassA<br>> ole32.dll: IsEqualGUID<br>> oleaut32.dll: SafeArrayPtrOfIndex<br>> ole32.dll: CoTaskMemFree<br>> oleaut32.dll: CreateErrorInfo<br>> wsock32.dll: WSACleanup<br><br>( 4556 exports ) <br>@$xp$10DBPROPINFO, @$xp$10IEnumNames, @$xp$10IErrorInfo, @$xp$10ILockBytes, @$xp$10IMallocSpy, @$xp$10IMtsEvents, @$xp$10IOleCache2, @$xp$10IOleObject, @$xp$10IOleWindow, @$xp$10ITypeInfo2, @$xp$10TComObject, @$xp$10TParamFlag, @$xp$10tagREGKIND, @$xp$11Adoint@_ADO, @$xp$11ContextInfo, @$xp$11DBPARAMINFO, @$xp$11IAdviseSink, @$xp$11ICrmMonitor, @$xp$11IDataObject, @$xp$11IDispatchEx, @$xp$11IDropSource, @$xp$11IDropTarget, @$xp$11IEnumString, @$xp$11IGetAppData, @$xp$11IM
0
asseforlife Messages postés 658 Date d'inscription jeudi 28 février 2008 Statut Membre Dernière intervention 23 décembre 2019 24
7 juil. 2009 à 13:09
Et le rapport Ot_Move it:

All processes killed
========== PROCESSES ==========
No active process named explorer.exe was found!
No active process named iexplore.exe was found!
Process firefox.exe killed successfully!
No active process named msnmsgr.exe was found!
No active process named TeaTimer.exe was found!
========== FILES ==========
C:\WINDOWS\system32\drivers\etc\host.msn moved successfully.
C:\WINDOWS\system32\drivers\etc\hosts.msn moved successfully.
C:\WINDOWS\system32\drivers\etc\hosts.txt moved successfully.
C:\WINDOWS\system32\reg.exe moved successfully.
C:\WINDOWS\system32\results.txt moved successfully.
C:\WINDOWS\system32\SET56.tmp moved successfully.
C:\WINDOWS\system32\SET58.tmp moved successfully.
C:\WINDOWS\system32\SET5D.tmp moved successfully.
C:\WINDOWS\system32\SET64.tmp moved successfully.
C:\WINDOWS\system32\SETAA.tmp moved successfully.
C:\WINDOWS\system32\shell32(3).dll unregistered successfully.
C:\WINDOWS\system32\shell32(3).dll moved successfully.
C:\WINDOWS\system32\wdmaud(2).drv moved successfully.
C:\WINDOWS\system32\wdmaud(3).drv moved successfully.
C:\WINDOWS\system32\wdmaud(4).drv moved successfully.
C:\WINDOWS\system32\wdmaud(5).drv moved successfully.
C:\WINDOWS\system32\wdmaud(6).drv moved successfully.
========== COMMANDS ==========

[EMPTYTEMP]

User: Administrateur
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 67 bytes
->Java cache emptied: 0 bytes
->FireFox cache emptied: 41737625 bytes

User: Administrateur.TITANIUM
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 67 bytes

User: Administrateur.TITANIUM.000
->Temp folder emptied: 1455 bytes
->Temporary Internet Files folder emptied: 5308661 bytes
->Java cache emptied: 0 bytes
->FireFox cache emptied: 80281958 bytes
->Google Chrome cache emptied: 7716402 bytes

User: ADMINI~1~000

User: All Users

User: All Users.WINDOWS

User: Boomscud
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes

User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 402 bytes

User: Default User.WINDOWS
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 402 bytes

User: LocalService
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes

User: LocalService.AUTORITE NT
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 67 bytes

User: LocalService.AUTORITE NT.000
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 223206 bytes

User: NetworkService
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 67 bytes

User: NetworkService.AUTORITE NT
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 67 bytes

User: NetworkService.AUTORITE NT.000
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 402 bytes

%systemdrive% .tmp files removed: 0 bytes
C:\WINDOWS\msdownld.tmp folder deleted successfully.
%systemroot% .tmp files removed: 0 bytes
%systemroot%\System32 .tmp files removed: 3072 bytes
Windows Temp folder emptied: 109080 bytes
RecycleBin emptied: 0 bytes

Total Files Cleaned = 129,11 mb


OTM by OldTimer - Version 3.0.0.4 log created on 07072009_130221

Files moved on Reboot...

Registry entries deleted on Reboot...


PS: tout a l'heure j'utilisais firefox qui remarchait mais maintenant, il ne veux de retour plus marcher, je passe donc par google chrome.
0
Utilisateur anonyme
7 juil. 2009 à 13:25
reessaie findykill nettoyage et s'il rebloque sur le fichier , stoppe-le et signale moi-le apres 30 mn d'utilisation

ensuite :

clic droit sur ce fichier :

C:\WINDOWS\system32\ipsec6.exe

envoyer vers / dossiers compresses et fais moi passer l'archive.zip par cijoint.fr stp
0
asseforlife Messages postés 658 Date d'inscription jeudi 28 février 2008 Statut Membre Dernière intervention 23 décembre 2019 24
7 juil. 2009 à 14:12
Findykill a encore bloqué au niveau C pRogram Files Fichiers commune encore..

Et le ipsec6 en.zip:

http://www.cijoint.fr/cjlink.php?file=cj200907/cij4xm1BzE.zip
0
Utilisateur anonyme
7 juil. 2009 à 14:20
regle la recherche des rootkits sur marche dans antivir si ce n'est fait , et fais un scan avec
0
asseforlife Messages postés 658 Date d'inscription jeudi 28 février 2008 Statut Membre Dernière intervention 23 décembre 2019 24
7 juil. 2009 à 14:24
Ok le scan est en route mais juste, tu penses savoir 'ou vient le blocage de findykill? il est rapide pour scanner jusqu'au moment ou il va dans C:/Program Files/Fichiers Communs..
0
Utilisateur anonyme
7 juil. 2009 à 14:31
où il bloque instantanément.......?
0
asseforlife Messages postés 658 Date d'inscription jeudi 28 février 2008 Statut Membre Dernière intervention 23 décembre 2019 24
7 juil. 2009 à 14:34
Bah disons que le scan est sans problème jusqu'a ce qu'il ralentisse de manière considérable a C:/Program Files/Fichier Communs ( et la ca varie) : soit il bloques dans un fichier Nero de Fichier Communs et la il s'est bloqué à Fichiers Communs / Adobe 6..., en fait je veux dire qu'il doit mettre + de 10/15 voire plus pour scanner les fichiers dans Fichier Communs
0
Utilisateur anonyme
7 juil. 2009 à 14:35
ah mais il ne s'arrete pas completement...?
0
asseforlife Messages postés 658 Date d'inscription jeudi 28 février 2008 Statut Membre Dernière intervention 23 décembre 2019 24
7 juil. 2009 à 14:37
No, mais il est très long a passer a autre dossier que Fichiers Communs..
0
Utilisateur anonyme
7 juil. 2009 à 14:42
bon on va essayer une tactique pour tromper l'ennemi (si lieu il y a):

Le scan va s'effectuer en Mode sans échec : comme vous n'aurez pas accès à Internet, je vous conseille d'imprimer cette procédure.

Étape 1 :

* Téléchargez eScan Antivirus Toolkit sur votre Bureau.
* Double-cliquez le fichier mwav.exe qui se trouve sur le Bureau ; dézippez les fichiers dans le nouveau dossier suggéré (C:\Kaspersky). Le programme va se lancer et vous devez le quitter (cliquez sur Exit puis Exit).
* Double-cliquez sur le Poste de travail (Ordinateur sous Vista), puis double-cliquez sur le lecteur principal (habituellement C:\), double-cliquez sur le dossier Kaspersky ; ensuite, double-cliquez sur le fichier kavupd.exe. Vous verrez maintenant une fenêtre DOS apparaître, et la mise à jour se complètera en quelques minutes.
* Lorsque la mise à jour sera complétée, vous verrez Press any key to continue ; tape sur une touche pour continuer. Deux nouveaux répertoires (dossiers) ont été créés lors de la mise à jour (C:\Bases et C:\Downloads).
* Sélectionnez/copiez tous les fichiers présents dans le dossier C:\Downloads, puis collez-les dans le dossier C:\Kaspersky. Acceptez à l'invite de remplacer les fichiers existants.



Ne pas lancer le scan tout de suite !

Étape 2 :

* Redémarre ton PC.
* Au démarrage, tapote sur F8 (F5 sur certains PC) juste après l'affichage du BIOS et juste avant le chargement de Windows.
* Dans le menu d'options avancées, choisis Mode sans échec.
* Choisis ta session.



Étape 3 :

* Pour lancer eScan Antivirus Toolkit, trouvez le fichier mwavscan.com situé dans le dossier C:\Kaspersky.
* Double-cliquez sur mwavscan.com ; l'interface d'eScan va apparaître à l'écran.
* Il est très important de bien cocher ces cases sous Scan Option : Memory, Registry, Startup Folders, System Folders, Services.
* Cochez la case Drive, ce qui donne accès à une nouvelle case Drive (bouton rond) juste dessous ; cochez ce bouton Drive (très important...), et vous verrez une nouvelle boîte de navigation apparaître à la droite. Cliquez sur la petite flèche de cette boîte and choisissez la lettre de votre disque dur, habituellement C:\.
* Juste au-dessous, assurez-vous que Scan All Files est coché et non Program Files.
* Cliquez sur Scan Clean et laissez le tool vérifier tout le disque dur (ça peut être long...). Lorsque terminé, vous verrez Scan Completed. Ne pas quitter tout de suite !
* Ouvrez un nouveau fichier Bloc-notes (cliquez sur "Démarrer" > "Programmes" > "Accessoires" > "Bloc-notes"), puis copiez/collez tout le contenu de la fenêtre Virus Log Information (la deuxième, au bas) dans le fichier texte, et sauvegardez-le. eScan génère également un rapport complet dans le dossier C:\Kaspersky (nommé mwav.log), mais il est trop lourd pour poster sur le forum.
* Fermez le programme. Redémarrez votre PC en Mode normal. Postez (copiez/collez) le rapport que vous avez sauvegardé dans votre sujet si vous en avez créé un.

0
sKe69 Messages postés 21360 Date d'inscription samedi 15 mars 2008 Statut Contributeur sécurité Dernière intervention 30 décembre 2012 463
7 juil. 2009 à 20:19
up !

0
asseforlife Messages postés 658 Date d'inscription jeudi 28 février 2008 Statut Membre Dernière intervention 23 décembre 2019 24
7 juil. 2009 à 20:20
Up
0
asseforlife Messages postés 658 Date d'inscription jeudi 28 février 2008 Statut Membre Dernière intervention 23 décembre 2019 24
7 juil. 2009 à 20:22
Ah merci sKe69 d'avoir résolu ce bug ^^, donc je disais :

Voila le rapport de eScan Toolkit après 4h de scan:

File C:\Documents and Settings\Administrateur.TITANIUM.000\Mes documents\TrackMania\Tracks\Replays\Autosaves\asseforlife_$l[chou-team.forumactif.net]$o$90c Large $6ff?C~??.Replay.gbx infected by "BkCln.Unknown" Virus. Action Taken: File Renamed.

File C:\Documents and Settings\Administrateur.TITANIUM.000\Mes documents\TrackMania\Tracks\Replays\Autosaves\asseforlife_$l[chou-team.forumactif.net]$o$90c Mini$6ff ?C~??.Replay.gbx infected by "BkCln.Unknown" Virus. Action Taken: File Renamed.

File C:\Documents and Settings\Administrateur.TITANIUM.000\Mes documents\TrackMania\Tracks\Replays\Autosaves\Samuel_$3FCL$5EAÔ$7D8L$9C7 $BA5#$D938$F81#.Replay.gbx infected by "BkCln.Unknown" Virus. Action Taken: File Renamed.

File C:\Documents and Settings\Administrateur.TITANIUM.000\Mes documents\TrackMania\Tracks\Replays\Autosaves\Samuel_$w$s$f00L?O? $s$w$f90OrangeStadium.Replay.gbx infected by "BkCln.Unknown" Virus. Action Taken: File Renamed.
0
asseforlife Messages postés 658 Date d'inscription jeudi 28 février 2008 Statut Membre Dernière intervention 23 décembre 2019 24
7 juil. 2009 à 21:58
Voila le rapport:

File C:\Documents and Settings\Administrateur.TITANIUM.000\Mes documents\TrackMania\Tracks\Replays\Autosaves\asseforlife_$l[chou-team.forumactif.net]$o$90c Large $6ff?C~??.Replay.gbx infected by "BkCln.Unknown" Virus. Action Taken: File Renamed.
File C:\Documents and Settings\Administrateur.TITANIUM.000\Mes documents\TrackMania\Tracks\Replays\Autosaves\asseforlife_$l[chou-team.forumactif.net]$o$90c Mini$6ff ?C~??.Replay.gbx infected by "BkCln.Unknown" Virus. Action Taken: File Renamed.
File C:\Documents and Settings\Administrateur.TITANIUM.000\Mes documents\TrackMania\Tracks\Replays\Autosaves\Samuel_$3FCL$5EAÔ$7D8L$9C7 $BA5#$D938$F81#.Replay.gbx infected by "BkCln.Unknown" Virus. Action Taken: File Renamed.
File C:\Documents and Settings\Administrateur.TITANIUM.000\Mes documents\TrackMania\Tracks\Replays\Autosaves\Samuel_$w$s$f00L?O? $s$w$f90OrangeStadium.Replay.gbx infected by "BkCln.Unknown" Virus. Action Taken: File Renamed.
0
Utilisateur anonyme
7 juil. 2009 à 23:27
-> Scan BitDefender

Fais une analyse antivirus en ligne sur BitDefender on line avec Internet Explorer

* Clique en bas à gauche sur Scan on line.
* Accepte la licence et laisse-le installer l'Active x..
* Laisse-toi guider. Colle son rapport ici.


Aide
0