Ordi ralenti

manideperpi -  
plopus Messages postés 6113 Statut Contributeur sécurité -
Bonjour,
mon ordi mets beaucoup de temps à s'allumer et les programmes mettent beaucoup de temps à repondre.
j'ai fais un scan sur bitdefender et voilà les infections constatées:

Found 2 infected files!
-------------------------
C:\Windows\system32\zivalyf.exe - Trojan.Keylogger.SpyLantern.B
C:\Windows\system32\drivers\hdbha.sys - Application.zy..tp.CG

comment faire pour reparer tout ça? merci
A voir également:

38 réponses

plopus Messages postés 6113 Statut Contributeur sécurité 293
 
Salut

supprime les elements trouvées avec bitdefender et fait un diagnostique avec :

Télécharge Random's System Information Tool (RSIT) de Random/Random, et enregistre le sur ton Bureau.
http://images.malwareremoval.com/random/RSIT.exe
• Double clique sur RSIT.exe pour lancer l'outil.
• Clique sur "Continue" à l'écran Disclaimer.
• Si l'outil HijackThis n'est pas présent ou non détecté sur l'ordinateur, RSIT le téléchargera (autorise l'accès dans ton pare-feu s'il te le demande) et tu devras accepter la licence.
• Une fois le scan terminé, deux rapports vont apparaître : poste les dans deux messages séparés stp
1
manideperpi
 
le probleme c'est que je ne trouve pas où il faut aller pour les supprimer sur bitdefender. j'ai fais un scan en ligne et j'ai juste obtenu le rapport
0
plopus Messages postés 6113 Statut Contributeur sécurité 293
 
ce n'est pas grave tu as noté le chemin des fichier ont verra si ils sont encore la ou pas, fait le rapport deja
0
manideperpi
 
Logfile of random's system information tool 1.06 (written by random/random)
Run by David at 2009-12-04 19:05:45
Microsoft® Windows Vista™ Édition Familiale Premium Service Pack 1
System drive C: has 10 GB (11%) free of 95 GB
Total RAM: 2037 MB (54% free)

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 19:06:16, on 04/12/2009
Platform: Windows Vista SP1 (WinNT 6.00.1905)
MSIE: Internet Explorer v7.00 (7.00.6001.18319)
Boot mode: Normal

Running processes:
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Windows Defender\MSASCui.exe
C:\Windows\RtHDVCpl.exe
C:\Program Files\TOSHIBA\Power Saver\TPwrMain.exe
C:\Windows\system32\conime.exe
C:\Program Files\TOSHIBA\SmoothView\SmoothView.exe
C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe
C:\Program Files\TOSHIBA\Utilities\KeNotify.exe
C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe
C:\Program Files\TOSHIBA\Toshiba Online Product Information\TOPI.exe
C:\Windows\System32\hkcmd.exe
C:\Windows\System32\igfxpers.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
C:\Program Files\Camera Assistant Software for Toshiba\traybar.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Windows\WindowsMobile\wmdc.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Windows\ehome\ehmsas.exe
C:\Windows\System32\rundll32.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
C:\Program Files\Camera Assistant Software for Toshiba\CEC_MAIN.exe
C:\Users\David\Downloads\RSIT.exe
C:\Program Files\Synaptics\SynTP\SynToshiba.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSwMgr.exe
C:\Program Files\trend micro\David.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = https://actus.sfr.fr
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = https://actus.sfr.fr
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://home.neuf.fr/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://actus.sfr.fr
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.msn.com/fr-fr/?ocid=iehp
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = https://actus.sfr.fr
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O1 - Hosts: ::1 localhost
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O3 - Toolbar: Yahoo! Toolbar avec bloqueur de fenêtres pop-up - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe
O4 - HKLM\..\Run: [TPwrMain] %ProgramFiles%\TOSHIBA\Power Saver\TPwrMain.EXE
O4 - HKLM\..\Run: [HSON] %ProgramFiles%\TOSHIBA\TBS\HSON.exe
O4 - HKLM\..\Run: [SmoothView] %ProgramFiles%\Toshiba\SmoothView\SmoothView.exe
O4 - HKLM\..\Run: [00TCrdMain] %ProgramFiles%\TOSHIBA\FlashCards\TCrdMain.exe
O4 - HKLM\..\Run: [KeNotify] C:\Program Files\TOSHIBA\Utilities\KeNotify.exe
O4 - HKLM\..\Run: [HWSetup] C:\Program Files\TOSHIBA\Utilities\HWSetup.exe hwSetUP
O4 - HKLM\..\Run: [SVPWUTIL] C:\Program Files\TOSHIBA\Utilities\SVPWUTIL.exe SVPwUTIL
O4 - HKLM\..\Run: [NDSTray.exe] NDSTray.exe
O4 - HKLM\..\Run: [topi] C:\Program Files\TOSHIBA\Toshiba Online Product Information\topi.exe -startup
O4 - HKLM\..\Run: [NvSvc] RUNDLL32.EXE C:\Windows\system32\nvsvc.dll,nvsvcStart
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [IgfxTray] C:\Windows\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\Windows\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\Windows\system32\igfxpers.exe
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [Toshiba Registration] C:\Program Files\Toshiba\Registration\ToshibaRegistration.exe
O4 - HKLM\..\Run: [PinnacleDriverCheck] C:\Windows\system32\PSDrvCheck.exe -CheckReg
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [Symantec PIF AlertEng] "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe" /a /m "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\AlertEng.dll"
O4 - HKLM\..\Run: [Camera Assistant Software] "C:\Program Files\Camera Assistant Software for Toshiba\traybar.exe"
O4 - HKLM\..\Run: [PLFSet] rundll32.exe C:\Windows\PLFSet.dll,PLFDefSetting
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [Sys32VContoller] C:\Windows\mwmmgr32\mwmmgr32.exe
O4 - HKLM\..\Run: [Windows Mobile Device Center] %windir%\WindowsMobile\wmdc.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [TOSCDSPD] TOSCDSPD.EXE
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'SERVICE RÉSEAU')
O9 - Extra button: @C:\Windows\WindowsMobile\INetRepl.dll,-222 - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dll
O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dll
O9 - Extra 'Tools' menuitem: @C:\Windows\WindowsMobile\INetRepl.dll,-223 - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dll
O9 - Extra button: PokerStars - {3AD14F0C-ED16-4e43-B6D8-661B03F6A1EF} - C:\Program Files\PokerStars\PokerStarsUpdate.exe
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\Windows\bdoscandel.exe
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\Windows\bdoscandel.exe
O9 - Extra button: Recherche - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Programs\PartyGaming\PartyPoker\RunApp.exe
O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Programs\PartyGaming\PartyPoker\RunApp.exe
O9 - Extra button: eBay - {C08CAF1D-C0A3-40D5-9970-06D067EAC017} - http://www.webtip.ch/cgi-bin/toshiba/tracker_url.pl?FR (file missing)
O9 - Extra button: Unibet Poker - {C53BFCFC-7A54-4627-AEBA-2CD4871FCA97} - C:\Microgaming\Poker\UnibetpokerMPP\MPPoker.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\Windows\system32\Shdocvw.dll
O13 - Gopher Prefix:
O16 - DPF: {20A60F0D-9AFA-4515-A0FD-83BD84642501} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab56986.cab
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - http://messenger.zone.msn.com/FR-FR/a-UNO1/GAME_UNO1.cab
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitdefender.com/resources/scanner/sources/en/scan8/oscan8.cab
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O16 - DPF: {F5A7706B-B9C0-4C89-A715-7A0C6B05DD48} (Minesweeper Flags Class) - http://messenger.zone.msn.com/binary/MineSweeper.cab56986.cab
O20 - AppInit_DLLs: zivalyfa.dll,C:\Windows\WIDEST~1\FREEQU~1\QUICKA~1.DLL
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Service Bonjour (Bonjour Service) - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Unknown owner - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe (file missing)
O23 - Service: Service de l’iPod (iPod Service) - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: LiveUpdate Notice Service Ex (LiveUpdate Notice Ex) - Unknown owner - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe (file missing)
O23 - Service: LiveUpdate Notice Service - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
O23 - Service: Planificateur LiveUpdate automatique - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
O23 - Service: TOSHIBA Optical Disc Drive Service (TODDSrv) - TOSHIBA Corporation - C:\Windows\system32\TODDSrv.exe
O23 - Service: TOSHIBA Power Saver (TosCoSrv) - TOSHIBA Corporation - C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe
O23 - Service: TOSHIBA Bluetooth Service - TOSHIBA CORPORATION - c:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe
O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
O23 - Service: Zivalyf Service (ZivalyfSrv) - Unknown owner - C:\Windows\system32\zivalyf.exe
0

Vous n’avez pas trouvé la réponse que vous recherchez ?

Posez votre question
plopus Messages postés 6113 Statut Contributeur sécurité 293
 
re

il y a un truc sur ce PC, il est a toi ? c'est tes parents qui l'ont achetés ?

ou ce trouve t il ? et d'autres personnes ont ils acces au PC ? c'est dans une entreprise ?
0
manideperpi
 
j'ai eu les 2 rapports mais suite à une mauvaise manip j'ai fermé le second que je n'arrive pas à ravoir... idiot que je suis :(
je sais pas si c'est possible de le recuperer ou si celui-ci suffit
0
plopus Messages postés 6113 Statut Contributeur sécurité 293
 
repond a mes questions celui ci suffit pour l'instant...
0
manideperpi
 
oui il est à moi cet ordi et je suis pratiquement le seul à m'en servir. Pourquoi ces questions?
0
manideperpi
 
si tu me demandes ça pour le keylogger c'est moi qui l'avais mis il y a un moment sans le desinstaller à l'epoque
0
plopus Messages postés 6113 Statut Contributeur sécurité 293
 
"je suis pratiquement le seul "

3 possibilités s'offre a toi/nous si ce que tu dit est vrai car il y a la presence et/ou traces de plusiuers keylogger donc :

- soit tu t'amuse avec les keylogger
- soit tu espionne quelqu'un
- soit quelqu'un t'espionne

MIAS sa vient de chez toi donc verdict .... qu'en dit tu ?
0
manideperpi
 
oui lis au dessus c'est bien moi qui les avais installé il y a un moment mais sans les desinstaller je savais pas qu'ils tournaient encore sur l'ordi. c'est ça la source de mes problemes?
0
manideperpi
 
help please ! ;-)
0
plopus Messages postés 6113 Statut Contributeur sécurité 293
 
re

Peut etre mais comme tu dit y en a qui tourne encore....

# Téléchargez Malwarebytes' Anti-Malware.
http://www.commentcamarche.net/...
# Laissez-vous guider lors de l'installation.
# La mise à jour se fait automatiquement lors de l'installation.
# Ouvrez MalwareBytes' Anti-Malware, cliquez sur Exécuter un examen complet puis sur Rechercher.
# Sélectionnez les disques que vous voulez analyser puis cliquer sur Lancer l'examen.
# Laissez maintenant l'analyse se réaliser, cela peut prendre un peu de temps.
# Une fois l'analyse terminée, cliquez sur OK puis sur Afficher les résultats.
# Vérifiez que tout soit bien coché et cliquez sur supprimer la sélection.
# Un rapport va être généré... Postez le rapport sur le forum

puis fait un scan en ligne ici avec internet explorer http://www.bitdefender.com/scan_fr/scan8/ie.html
et poste le rapport en entier pas juste le nombre de virus
0
manideperpi
 
voila ci-dessous le premier rapport, par contre je n'arrive pas à faire le scan en ligne via internet explorer, voilà le message qui s'affiche:


"This web site is not authorized to host this ActiveX control
Please contact the webmaster of this site, or report to Bitdefender at the e-mail adress: scanonline@bitdefender.com"

rapport:

Malwarebytes' Anti-Malware 1.41
Version de la base de données: 3285
Windows 6.0.6001 Service Pack 1

05/12/2009 08:37:04
mbam-log-2009-12-05 (08-37-04).txt

Type de recherche: Examen complet (C:\|E:\|F:\|)
Eléments examinés: 267682
Temps écoulé: 2 hour(s), 15 minute(s), 39 second(s)

Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 0
Valeur(s) du Registre infectée(s): 0
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 0

Processus mémoire infecté(s):
(Aucun élément nuisible détecté)

Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)

Clé(s) du Registre infectée(s):
(Aucun élément nuisible détecté)

Valeur(s) du Registre infectée(s):
(Aucun élément nuisible détecté)

Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)

Dossier(s) infecté(s):
(Aucun élément nuisible détecté)

Fichier(s) infecté(s):
(Aucun élément nuisible détecté)
0
plopus Messages postés 6113 Statut Contributeur sécurité 293
 
ok reposte un RSIt alors

par contre bizarre que Malwarebyte n'a rien detecté....
0
manideperpi
 
Logfile of random's system information tool 1.06 (written by random/random)
Run by David at 2009-12-06 21:48:53
Microsoft® Windows Vista™ Édition Familiale Premium Service Pack 1
System drive C: has 11 GB (12%) free of 95 GB
Total RAM: 2037 MB (41% free)

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 21:49:13, on 06/12/2009
Platform: Windows Vista SP1 (WinNT 6.00.1905)
MSIE: Internet Explorer v7.00 (7.00.6001.18319)
Boot mode: Normal

Running processes:
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\Windows\RtHDVCpl.exe
C:\Program Files\TOSHIBA\Power Saver\TPwrMain.exe
C:\Program Files\TOSHIBA\SmoothView\SmoothView.exe
C:\Windows\system32\wuauclt.exe
C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe
C:\Program Files\TOSHIBA\Utilities\KeNotify.exe
C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe
C:\Program Files\TOSHIBA\Toshiba Online Product Information\TOPI.exe
C:\Windows\System32\rundll32.exe
C:\Windows\System32\hkcmd.exe
C:\Windows\System32\igfxpers.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
C:\Program Files\Camera Assistant Software for Toshiba\traybar.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Windows\WindowsMobile\wmdc.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Users\David\AppData\Roaming\Microsoft\Notification de cadeaux MSN\lsnfier.exe
C:\Program Files\Synaptics\SynTP\SynToshiba.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Camera Assistant Software for Toshiba\CEC_MAIN.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSwMgr.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\Windows Live\Contacts\wlcomm.exe
C:\Program Files\Windows Live\Messenger\wlcsdk.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\WinamaxPoker\WinamaxPoker.exe
C:\Users\David\Downloads\RSIT.exe
C:\Program Files\trend micro\David.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = https://actus.sfr.fr
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://actus.sfr.fr
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.msn.com/fr-fr/?ocid=iehp
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = https://actus.sfr.fr
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O1 - Hosts: ::1 localhost
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O3 - Toolbar: Yahoo! Toolbar avec bloqueur de fenêtres pop-up - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe
O4 - HKLM\..\Run: [TPwrMain] %ProgramFiles%\TOSHIBA\Power Saver\TPwrMain.EXE
O4 - HKLM\..\Run: [HSON] %ProgramFiles%\TOSHIBA\TBS\HSON.exe
O4 - HKLM\..\Run: [SmoothView] %ProgramFiles%\Toshiba\SmoothView\SmoothView.exe
O4 - HKLM\..\Run: [00TCrdMain] %ProgramFiles%\TOSHIBA\FlashCards\TCrdMain.exe
O4 - HKLM\..\Run: [KeNotify] C:\Program Files\TOSHIBA\Utilities\KeNotify.exe
O4 - HKLM\..\Run: [HWSetup] C:\Program Files\TOSHIBA\Utilities\HWSetup.exe hwSetUP
O4 - HKLM\..\Run: [SVPWUTIL] C:\Program Files\TOSHIBA\Utilities\SVPWUTIL.exe SVPwUTIL
O4 - HKLM\..\Run: [NDSTray.exe] NDSTray.exe
O4 - HKLM\..\Run: [topi] C:\Program Files\TOSHIBA\Toshiba Online Product Information\topi.exe -startup
O4 - HKLM\..\Run: [NvSvc] RUNDLL32.EXE C:\Windows\system32\nvsvc.dll,nvsvcStart
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [IgfxTray] C:\Windows\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\Windows\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\Windows\system32\igfxpers.exe
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [Toshiba Registration] C:\Program Files\Toshiba\Registration\ToshibaRegistration.exe
O4 - HKLM\..\Run: [PinnacleDriverCheck] C:\Windows\system32\PSDrvCheck.exe -CheckReg
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [Symantec PIF AlertEng] "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe" /a /m "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\AlertEng.dll"
O4 - HKLM\..\Run: [Camera Assistant Software] "C:\Program Files\Camera Assistant Software for Toshiba\traybar.exe"
O4 - HKLM\..\Run: [PLFSet] rundll32.exe C:\Windows\PLFSet.dll,PLFDefSetting
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [Sys32VContoller] C:\Windows\mwmmgr32\mwmmgr32.exe
O4 - HKLM\..\Run: [Windows Mobile Device Center] %windir%\WindowsMobile\wmdc.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [TOSCDSPD] TOSCDSPD.EXE
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'SERVICE RÉSEAU')
O4 - Startup: Notification de cadeaux MSN.lnk = David\AppData\Roaming\Microsoft\Notification de cadeaux MSN\lsnfier.exe
O9 - Extra button: @C:\Windows\WindowsMobile\INetRepl.dll,-222 - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dll
O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dll
O9 - Extra 'Tools' menuitem: @C:\Windows\WindowsMobile\INetRepl.dll,-223 - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dll
O9 - Extra button: PokerStars - {3AD14F0C-ED16-4e43-B6D8-661B03F6A1EF} - C:\Program Files\PokerStars\PokerStarsUpdate.exe
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\Windows\bdoscandel.exe
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\Windows\bdoscandel.exe
O9 - Extra button: Recherche - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Programs\PartyGaming\PartyPoker\RunApp.exe
O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Programs\PartyGaming\PartyPoker\RunApp.exe
O9 - Extra button: eBay - {C08CAF1D-C0A3-40D5-9970-06D067EAC017} - http://www.webtip.ch/cgi-bin/toshiba/tracker_url.pl?FR (file missing)
O9 - Extra button: Unibet Poker - {C53BFCFC-7A54-4627-AEBA-2CD4871FCA97} - C:\Microgaming\Poker\UnibetpokerMPP\MPPoker.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\Windows\system32\Shdocvw.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search && Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O13 - Gopher Prefix:
O16 - DPF: {20A60F0D-9AFA-4515-A0FD-83BD84642501} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab56986.cab
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - http://messenger.zone.msn.com/FR-FR/a-UNO1/GAME_UNO1.cab
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitdefender.com/resources/scanner/sources/en/scan8/oscan8.cab
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O16 - DPF: {F5A7706B-B9C0-4C89-A715-7A0C6B05DD48} (Minesweeper Flags Class) - http://messenger.zone.msn.com/binary/MineSweeper.cab56986.cab
O20 - AppInit_DLLs: zivalyfa.dll,C:\Windows\WIDEST~1\FREEQU~1\QUICKA~1.DLL
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Service Bonjour (Bonjour Service) - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Unknown owner - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe (file missing)
O23 - Service: Service de l’iPod (iPod Service) - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: LiveUpdate Notice Service Ex (LiveUpdate Notice Ex) - Unknown owner - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe (file missing)
O23 - Service: LiveUpdate Notice Service - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
O23 - Service: Planificateur LiveUpdate automatique - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
O23 - Service: SBSD Security Center Service (SBSDWSCService) - Safer Networking Ltd. - C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe
O23 - Service: TOSHIBA Optical Disc Drive Service (TODDSrv) - TOSHIBA Corporation - C:\Windows\system32\TODDSrv.exe
O23 - Service: TOSHIBA Power Saver (TosCoSrv) - TOSHIBA Corporation - C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe
O23 - Service: TOSHIBA Bluetooth Service - TOSHIBA CORPORATION - c:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe
O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
O23 - Service: Zivalyf Service (ZivalyfSrv) - Unknown owner - C:\Windows\system32\zivalyf.exe
0
plopus Messages postés 6113 Statut Contributeur sécurité 293
 
C:\Windows\mwmmgr32\mwmmgr32.exe
C:\Windows\system32\zivalyf.exe
C:\Windows\system32\drivers\hdbha.sys

- clic ici https://www.virustotal.com/gui/
- clic sur parcourir en milieu de page
- dans la nouvelle fentre va chercher ces fichier ou copie colle la ligne ci dessus
- clic sur ouvrir
- clic sur envoyer, un rapport va s'etablir
SI ON TE DIT : le fichier a deja ete analyser clic sur réanalyser
- copie l'integralité du rapport + le lien internet du rapport stp

tu fait pareil pour les 3 fichier du debut

puis

# Télécharge UsbFix et enregistre-le sur ton bureau
https://www.ionos.fr/?affiliate_id=77097

# Branche tes sources de données externes à ton PC, (clé USB, disque dur externe, etc...) susceptible d'avoir été infectés sans les ouvrir
# Double clic sur le raccourci UsbFix présent sur ton bureau
# choisi l'option 2 ( Suppression )
# Ton bureau disparaîtra et le pc redémarrera .
# Au redémarrage , UsbFix scannera ton pc , laisse travailler l'outil.
# Ensuite post le rapport UsbFix.txt qui apparaîtra avec le bureau .
# Note : Le rapport UsbFix.txt est sauvegardé a la racine du disque.( C:\UsbFix.txt )
# ( CTRL+A Pour tout selectionner , CTRL+C pour copier et CTRL+V pour coller )
0
manideperpi
 
pour le 1er et le 3eme fichier, une fenetre s ouvre et me dit que le fichier est introuvable. pour le second voila le rapport:

Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.43 2009.12.07 Riskware.Monitor.Win32.SpyLantern!IK
AhnLab-V3 5.0.0.2 2009.12.07 Win-Trojan/Spylantern.348160
AntiVir 7.9.1.102 2009.12.07 -
Antiy-AVL 2.0.3.7 2009.12.07 -
Authentium 5.2.0.5 2009.12.02 W32/Monitor.AJD
Avast 4.8.1351.0 2009.12.06 Win32:KeyLogger-QS
AVG 8.5.0.426 2009.12.07 Logger.BKZ
BitDefender 7.2 2009.12.07 Trojan.Keylogger.SpyLantern.B
CAT-QuickHeal 10.00 2009.12.07 -
ClamAV 0.94.1 2009.12.07 -
Comodo 3103 2009.12.01 Application.Win32.Monitor.SpyLantern.~R
DrWeb 5.0.0.12182 2009.12.07 -
eSafe 7.0.17.0 2009.12.06 -
eTrust-Vet 35.1.7162 2009.12.07 -
F-Prot 4.5.1.85 2009.12.06 W32/Monitor.AJD
F-Secure 9.0.15370.0 2009.12.07 Trojan.Keylogger.SpyLantern.B
Fortinet 4.0.14.0 2009.12.07 -
GData 19 2009.12.07 Trojan.Keylogger.SpyLantern.B
Ikarus T3.1.1.74.0 2009.12.07 not-a-virus:Monitor.Win32.SpyLantern
Jiangmin 13.0.900 2009.12.02 -
K7AntiVirus 7.10.913 2009.12.07 -
Kaspersky 7.0.0.125 2009.12.07 not-a-virus:Monitor.Win32.SpyLantern.40
McAfee 5824 2009.12.06 potentially unwanted program Spyware-SpyLantern
McAfee+Artemis 5824 2009.12.06 potentially unwanted program Spyware-SpyLantern
McAfee-GW-Edition 6.8.5 2009.12.07 Heuristic.BehavesLike.Win32.Spyware.I
Microsoft 1.5302 2009.12.07 -
NOD32 4666 2009.12.07 -
Norman 6.03.02 2009.12.07 -
nProtect 2009.1.8.0 2009.12.07 -
Panda 10.0.2.2 2009.12.06 Suspicious file
PCTools 7.0.3.5 2009.12.07 Application.Spy_Lantern_Keylogger
Prevx 3.0 2009.12.07 Medium Risk Malware
Rising 22.25.00.06 2009.12.07 Trojan.Win32.Spylantern.a
Sophos 4.48.0 2009.12.07 -
Sunbelt 3.2.1858.2 2009.12.06 -
Symantec 1.4.4.12 2009.12.07 Spyware.SpyLantern
TheHacker 6.5.0.2.086 2009.12.05 -
TrendMicro 9.100.0.1001 2009.12.07 -
VBA32 3.12.12.0 2009.12.07 -
ViRobot 2009.12.7.2074 2009.12.07 -
VirusBuster 5.0.21.0 2009.12.06 -
Information additionnelle
File size: 348160 bytes
MD5...: b7a8dafc148411b517c6a8f6afe30e22
SHA1..: 8e137b3840a0d73744b5bd04cb17bc2fd5fea074
SHA256: 765a2b030928650e6106c5dbaafa02307791c4308dac1992b1de5c14ef022288
ssdeep: 6144:jy9lDlMSreM8fF7BzUt3oains2J3EAztTB9G5Qe:jspsfF7upoaibBztT/G
5N
PEiD..: -
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x3e1da
timedatestamp.....: 0x45a4e9fe (Wed Jan 10 13:28:30 2007)
machinetype.......: 0x14c (I386)

( 3 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x46bb2 0x47000 6.47 3f64fec9c72c3fc473c1b7dedd60e4b4
.rdata 0x48000 0x82ca 0x9000 5.11 70bdd30906774ed13df40c558dd9249f
.data 0x51000 0xfdc0 0x4000 4.54 6d7f65c4524edaf10a7848e8b4b49d60

( 6 imports )
> WSOCK32.dll: -, -, -, -, -, -, -, -, -, -, -, -, -
> KERNEL32.dll: MapViewOfFile, CreateFileMappingA, UnmapViewOfFile, CreateMutexA, Sleep, GetTickCount, CopyFileA, MoveFileA, DeleteFileA, GetComputerNameExA, GetCurrentThreadId, ConnectNamedPipe, CreateNamedPipeA, GetTempFileNameA, FindClose, FindNextFileA, FindFirstFileA, CompareFileTime, GetDiskFreeSpaceExA, InterlockedExchange, InterlockedExchangeAdd, GetWindowsDirectoryA, GetSystemDirectoryA, MoveFileExA, OpenProcess, GetCurrentProcess, QueryDosDeviceW, GetProcessHeap, GetVersionExA, WideCharToMultiByte, RemoveDirectoryA, lstrcmpA, lstrlenA, MultiByteToWideChar, GetFileSize, CreateDirectoryA, SetEndOfFile, FlushFileBuffers, GetProcAddress, GetModuleHandleA, GetSystemTimeAdjustment, GetSystemTime, VirtualProtect, LeaveCriticalSection, EnterCriticalSection, GetMailslotInfo, CreateMailslotA, GetComputerNameA, LoadLibraryA, SetLastError, GlobalAlloc, GlobalFree, GetLongPathNameW, DeviceIoControl, CreateFileA, ReleaseMutex, ResetEvent, SetEnvironmentVariableA, CreateThread, GetModuleFileNameA, SetFilePointer, WriteFile, ReadFile, GetLastError, WaitForMultipleObjects, GetOverlappedResult, CloseHandle, DisconnectNamedPipe, InitializeCriticalSection, WaitForSingleObject, SetEvent, CreateEventA, GetCPInfo, GetACP, GetOEMCP, SetStdHandle, CompareStringA, CompareStringW, HeapAlloc, GetCurrentDirectoryA, GetFullPathNameA, GetStringTypeW, GetStringTypeA, TlsGetValue, TlsAlloc, InterlockedDecrement, InterlockedIncrement, HeapFree, GetTimeZoneInformation, GetLocalTime, GetCommandLineA, GetVersion, ExitProcess, FileTimeToSystemTime, FileTimeToLocalFileTime, GetDriveTypeA, HeapReAlloc, RtlUnwind, DeleteCriticalSection, LCMapStringA, LCMapStringW, HeapDestroy, HeapCreate, VirtualFree, VirtualAlloc, TerminateProcess, UnhandledExceptionFilter, FreeEnvironmentStringsA, FreeEnvironmentStringsW, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, TlsSetValue
> ADVAPI32.dll: RegCloseKey, OpenServiceA, OpenSCManagerA, LockServiceDatabase, CreateServiceA, ChangeServiceConfig2A, CloseServiceHandle, DeleteService, UnlockServiceDatabase, RegDeleteKeyA, RegCreateKeyExA, RegSetValueExA, LookupAccountSidW, EqualSid, LookupAccountNameW, AllocateAndInitializeSid, GetLengthSid, InitializeAcl, AddAccessAllowedAce, FreeSid, GetKernelObjectSecurity, GetSecurityDescriptorDacl, SetKernelObjectSecurity, OpenProcessToken, GetTokenInformation, RegOpenKeyExA, RegQueryValueExA, InitializeSecurityDescriptor, SetSecurityDescriptorDacl, RegisterServiceCtrlHandlerExA, SetServiceStatus, StartServiceCtrlDispatcherA
> SHLWAPI.dll: SHDeleteKeyA, PathAppendA
> ole32.dll: CoCreateInstance, CoInitialize
> PSAPI.DLL: GetModuleFileNameExW

( 0 exports )
RDS...: NSRL Reference Data Set
-
pdfid.: -
<a href='http://info.prevx.com/aboutprogramtext.asp?PX5=10B374D9000887FD505905AB8E3A9D00D8A1B88E' target='_blank'>http://info.prevx.com/aboutprogramtext.asp?PX5=10B374D9000887FD505905AB8E3A9D00D8A1B88E</a>
trid..: Win32 Executable MS Visual C++ (generic) (65.2%)
Win32 Executable Generic (14.7%)
Win32 Dynamic Link Library (generic) (13.1%)
Generic Win/DOS Executable (3.4%)
DOS Executable Generic (3.4%)
sigcheck:
publisher....: n/a
copyright....: n/a
product......: n/a
description..: n/a
original name: n/a
internal name: n/a
file version.: n/a
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned
0
manideperpi > manideperpi
 
http://www.virustotal.com/fr/analisis/765a2b030928650e6106c5dbaafa02307791c4308dac1992b1de5c14ef022288-1260190565
0
manideperpi
 
bizarre je poste le rapport mais il ne s'affiche pas
0
manideperpi
 
############################## | UsbFix V6.059 |

User : David (Administrateurs) # PC-DE-DAVID
Update on 01/12/2009 by Chiquitine29, C_XX & Chimay8
Start at: 15:19:44 | 07/12/2009
Website : http://pagesperso-orange.fr/NosTools/index.html
Contact : FindyKill.Contact@gmail.com

Genuine Intel(R) CPU T2080 @ 1.73GHz
Microsoft® Windows Vista™ Édition Familiale Premium (6.0.6001 32-bit) # Service Pack 1
Internet Explorer 7.0.6001.18000
Windows Firewall Status : Disabled

C:\ -> Disque fixe local # 93,16 Go (10,55 Go free) [Vista] # NTFS
E:\ -> Disque fixe local # 91,69 Go (89,96 Go free) [Data] # NTFS
F:\ -> Disque CD-ROM
G:\ -> Disque fixe local # 931,28 Go (856,17 Go free) # FAT32

############################## | Processus actifs |

C:\Windows\System32\smss.exe 580
C:\Windows\system32\csrss.exe 656
C:\Windows\system32\csrss.exe 700
C:\Windows\system32\wininit.exe 708
C:\Windows\system32\services.exe 752
C:\Windows\system32\winlogon.exe 776
C:\Windows\system32\lsass.exe 804
C:\Windows\system32\lsm.exe 812
C:\Windows\system32\svchost.exe 988
C:\Windows\Microsoft.Net\Framework\v3.0\WPF\PresentationFontCache.exe 1036
C:\Windows\system32\svchost.exe 1080
C:\Windows\System32\svchost.exe 1120
C:\Windows\System32\svchost.exe 1204
C:\Windows\System32\svchost.exe 1244
C:\Windows\system32\svchost.exe 1260
C:\Windows\system32\SLsvc.exe 1416
C:\Windows\system32\svchost.exe 1476
C:\Windows\system32\zivalyf.exe 1560
C:\Windows\system32\svchost.exe 1856
C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe 1708
C:\Windows\System32\spoolsv.exe 1852
C:\Windows\system32\svchost.exe 376
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe 1584
C:\Program Files\Bonjour\mDNSResponder.exe 1804
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe 1952
C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe 1172
C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe 2040
C:\Windows\system32\taskeng.exe 2292
C:\Windows\system32\svchost.exe 2716
C:\Windows\system32\Dwm.exe 2908
C:\Windows\system32\svchost.exe 2988
C:\Windows\Explorer.EXE 3244
C:\Windows\system32\TODDSrv.exe 3356
C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe 3472
c:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe 3784
C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe 4016
C:\Windows\System32\svchost.exe 2064
C:\Windows\system32\SearchIndexer.exe 2308
C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe 3144
C:\Windows\system32\wbem\unsecapp.exe 3080
C:\Windows\system32\runonce.exe 1312
C:\Windows\system32\wbem\wmiprvse.exe 2760
C:\Windows\system32\conime.exe 3488
C:\Windows\system32\wbem\wmiprvse.exe 2432
C:\Windows\system32\PresentationSettings.exe 1016

################## | Fichiers # Dossiers infectieux |

Supprimé ! C:\Users\David\AppData\Local\Temp\73BAB2C7-2256-478C-A2F3-CEC110A1884C.exe
Supprimé ! G:\autorun.inf

################## | Spyware.OnlineGames |


################## | Registre # Clés infectieuses |


################## | Registre # Mountpoints2 |

Supprimé ! HKCU\...\Explorer\MountPoints2\{10af3487-3a0f-11dd-8fe2-001b38105de1}\Shell\Auto\Command

################## | Listing des fichiers présent |

[07/12/2009 15:17|--a------|2598] C:\aaw7boot.log
[18/09/2006 22:43|--a------|24] C:\autoexec.bat
[19/01/2008 08:45|-rahs----|333203] C:\bootmgr
[08/03/2007 10:13|-ra-s----|8192] C:\BOOTSECT.BAK
[18/09/2006 22:43|--a------|10] C:\config.sys
[05/12/2009 09:00|-rahs----|0] C:\IO.SYS
[27/09/2008 16:40|--ah-----|1974] C:\IPH.PH
[05/12/2009 09:00|-rahs----|0] C:\MSDOS.SYS
[?|?|?] C:\pagefile.sys
[08/01/2008 02:03|--a------|403907] C:\PokerStars.log.0
[07/01/2008 01:40|--a------|426234] C:\PokerStars.log.1
[08/03/2007 10:54|--a------|345] C:\RHDSetup.log
[16/03/2007 12:18|--ah-----|282] C:\SWSTAMP.TXT
[07/12/2009 15:36|--a------|3938] C:\UsbFix.txt
[07/09/2007 21:35|--a------|470838] C:\vcredist_x86.log
[14/03/2007 15:45|--a----t-|23872] C:\_wdsuef.dmp
[14/03/2009 00:45|--a------|735387648] E:\BANGKOK.DANGEROUS.DVDRIP.FR.VVF.COOLI.[emule-island.com].avi
[28/07/2005 18:28|--a------|733923328] E:\MILLION DOLLAR BABY.avi
[17/03/2007 14:45|--a------|12862] G:\de.ico
[01/12/2009 00:36|--a------|16384] G:\poker.xls

################## | Vaccination |

# C:\autorun.inf -> Dossier créé par UsbFix.
# E:\autorun.inf -> Dossier créé par UsbFix.
# G:\autorun.inf -> Dossier créé par UsbFix.

################## | Cracks / Keygens / Serials |


################## | Upload |

Veuillez envoyer le fichier : C:\Users\David\Desktop\UsbFix_Upload_Me_PC-de-David.zip : https://www.ionos.fr/?affiliate_id=77097
Merci pour votre contribution .
0
manideperpi > manideperpi
 
voila c'est bon ;-)
0
plopus Messages postés 6113 Statut Contributeur sécurité 293
 
salut

poste un nouveau RSIT

et peut tu recommencer la manip avec l'analyse virus total

en affichant les dossier caché : https://www.commentcamarche.net/informatique/windows/185-afficher-les-extensions-et-les-fichiers-caches-sous-windows/

et quand tu est dans la fentre de virus total, tu va chercher manuellement les fichiers et poste les rapports stp
0
manideperpi
 
dans les options d'affichage j'ai bien mis "afficher les dossiers et fichiers cachés" et j'ai décoché "Masquer les extensions des fichiers dont le type est connu" et "Masquer les fichiers protégés du systeme d'exploitation". J'ai bien trouvé le fichier hdbha.sys mais le fichier mwmmgr32 est toujours introuvable.

rapport RSIT:

Logfile of random's system information tool 1.06 (written by random/random)
Run by David at 2009-12-07 20:40:54
Microsoft® Windows Vista™ Édition Familiale Premium Service Pack 1
System drive C: has 10 GB (10%) free of 95 GB
Total RAM: 2037 MB (43% free)

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 20:41:23, on 07/12/2009
Platform: Windows Vista SP1 (WinNT 6.00.1905)
MSIE: Internet Explorer v7.00 (7.00.6001.18319)
Boot mode: Normal

Running processes:
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\system32\conime.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
C:\Users\David\AppData\Roaming\Microsoft\Notification de cadeaux MSN\lsnfier.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Windows\explorer.exe
C:\Windows\system32\wuauclt.exe
C:\Users\David\Downloads\RSIT.exe
C:\Program Files\trend micro\David.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = https://actus.sfr.fr
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://recherche.neuf.fr/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.msn.com/fr-fr
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = https://actus.sfr.fr
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Windows Internet Explorer
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O1 - Hosts: ::1 localhost
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O3 - Toolbar: Yahoo! Toolbar avec bloqueur de fenêtres pop-up - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe
O4 - HKLM\..\Run: [TPwrMain] %ProgramFiles%\TOSHIBA\Power Saver\TPwrMain.EXE
O4 - HKLM\..\Run: [HSON] %ProgramFiles%\TOSHIBA\TBS\HSON.exe
O4 - HKLM\..\Run: [SmoothView] %ProgramFiles%\Toshiba\SmoothView\SmoothView.exe
O4 - HKLM\..\Run: [00TCrdMain] %ProgramFiles%\TOSHIBA\FlashCards\TCrdMain.exe
O4 - HKLM\..\Run: [KeNotify] C:\Program Files\TOSHIBA\Utilities\KeNotify.exe
O4 - HKLM\..\Run: [HWSetup] C:\Program Files\TOSHIBA\Utilities\HWSetup.exe hwSetUP
O4 - HKLM\..\Run: [SVPWUTIL] C:\Program Files\TOSHIBA\Utilities\SVPWUTIL.exe SVPwUTIL
O4 - HKLM\..\Run: [NDSTray.exe] NDSTray.exe
O4 - HKLM\..\Run: [topi] C:\Program Files\TOSHIBA\Toshiba Online Product Information\topi.exe -startup
O4 - HKLM\..\Run: [NvSvc] RUNDLL32.EXE C:\Windows\system32\nvsvc.dll,nvsvcStart
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [IgfxTray] C:\Windows\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\Windows\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\Windows\system32\igfxpers.exe
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [Toshiba Registration] C:\Program Files\Toshiba\Registration\ToshibaRegistration.exe
O4 - HKLM\..\Run: [PinnacleDriverCheck] C:\Windows\system32\PSDrvCheck.exe -CheckReg
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [Symantec PIF AlertEng] "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe" /a /m "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\AlertEng.dll"
O4 - HKLM\..\Run: [Camera Assistant Software] "C:\Program Files\Camera Assistant Software for Toshiba\traybar.exe"
O4 - HKLM\..\Run: [PLFSet] rundll32.exe C:\Windows\PLFSet.dll,PLFDefSetting
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [Sys32VContoller] C:\Windows\mwmmgr32\mwmmgr32.exe
O4 - HKLM\..\Run: [Windows Mobile Device Center] %windir%\WindowsMobile\wmdc.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [TOSCDSPD] TOSCDSPD.EXE
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'SERVICE RÉSEAU')
O4 - Startup: Notification de cadeaux MSN.lnk = David\AppData\Roaming\Microsoft\Notification de cadeaux MSN\lsnfier.exe
O9 - Extra button: @C:\Windows\WindowsMobile\INetRepl.dll,-222 - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dll
O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dll
O9 - Extra 'Tools' menuitem: @C:\Windows\WindowsMobile\INetRepl.dll,-223 - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dll
O9 - Extra button: PokerStars - {3AD14F0C-ED16-4e43-B6D8-661B03F6A1EF} - C:\Program Files\PokerStars\PokerStarsUpdate.exe
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\Windows\bdoscandel.exe (file missing)
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\Windows\bdoscandel.exe (file missing)
O9 - Extra button: Recherche - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Programs\PartyGaming\PartyPoker\RunApp.exe
O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Programs\PartyGaming\PartyPoker\RunApp.exe
O9 - Extra button: eBay - {C08CAF1D-C0A3-40D5-9970-06D067EAC017} - http://www.webtip.ch/cgi-bin/toshiba/tracker_url.pl?FR (file missing)
O9 - Extra button: Unibet Poker - {C53BFCFC-7A54-4627-AEBA-2CD4871FCA97} - C:\Microgaming\Poker\UnibetpokerMPP\MPPoker.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\Windows\system32\Shdocvw.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search && Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O13 - Gopher Prefix:
O20 - AppInit_DLLs: zivalyfa.dll,C:\Windows\WIDEST~1\FREEQU~1\QUICKA~1.DLL
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Service Bonjour (Bonjour Service) - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Unknown owner - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe (file missing)
O23 - Service: Service de l’iPod (iPod Service) - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: LiveUpdate Notice Service Ex (LiveUpdate Notice Ex) - Unknown owner - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe (file missing)
O23 - Service: LiveUpdate Notice Service - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
O23 - Service: Planificateur LiveUpdate automatique - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
O23 - Service: SBSD Security Center Service (SBSDWSCService) - Safer Networking Ltd. - C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe
O23 - Service: TOSHIBA Optical Disc Drive Service (TODDSrv) - TOSHIBA Corporation - C:\Windows\system32\TODDSrv.exe
O23 - Service: TOSHIBA Power Saver (TosCoSrv) - TOSHIBA Corporation - C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe
O23 - Service: TOSHIBA Bluetooth Service - TOSHIBA CORPORATION - c:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe
O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
O23 - Service: Zivalyf Service (ZivalyfSrv) - Unknown owner - C:\Windows\system32\zivalyf.exe
0
manideperpi > manideperpi
 
rapport Fichier zivalyf.exe (http://www.virustotal.com/fr/analisis/765a2b030928650e6106c5dbaafa02307791c4308dac1992b1de5c14ef022288-1260190565

Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.43 2009.12.07 Riskware.Monitor.Win32.SpyLantern!IK
AhnLab-V3 5.0.0.2 2009.12.07 Win-Trojan/Spylantern.348160
AntiVir 7.9.1.102 2009.12.07 -
Antiy-AVL 2.0.3.7 2009.12.07 -
Authentium 5.2.0.5 2009.12.02 W32/Monitor.AJD
Avast 4.8.1351.0 2009.12.06 Win32:KeyLogger-QS
AVG 8.5.0.426 2009.12.07 Logger.BKZ
BitDefender 7.2 2009.12.07 Trojan.Keylogger.SpyLantern.B
CAT-QuickHeal 10.00 2009.12.07 -
ClamAV 0.94.1 2009.12.07 -
Comodo 3103 2009.12.01 Application.Win32.Monitor.SpyLantern.~R
DrWeb 5.0.0.12182 2009.12.07 -
eSafe 7.0.17.0 2009.12.06 -
eTrust-Vet 35.1.7162 2009.12.07 -
F-Prot 4.5.1.85 2009.12.06 W32/Monitor.AJD
F-Secure 9.0.15370.0 2009.12.07 Trojan.Keylogger.SpyLantern.B
Fortinet 4.0.14.0 2009.12.07 -
GData 19 2009.12.07 Trojan.Keylogger.SpyLantern.B
Ikarus T3.1.1.74.0 2009.12.07 not-a-virus:Monitor.Win32.SpyLantern
Jiangmin 13.0.900 2009.12.02 -
K7AntiVirus 7.10.913 2009.12.07 -
Kaspersky 7.0.0.125 2009.12.07 not-a-virus:Monitor.Win32.SpyLantern.40
McAfee 5824 2009.12.06 potentially unwanted program Spyware-SpyLantern
McAfee+Artemis 5824 2009.12.06 potentially unwanted program Spyware-SpyLantern
McAfee-GW-Edition 6.8.5 2009.12.07 Heuristic.BehavesLike.Win32.Spyware.I
Microsoft 1.5302 2009.12.07 -
NOD32 4666 2009.12.07 -
Norman 6.03.02 2009.12.07 -
nProtect 2009.1.8.0 2009.12.07 -
Panda 10.0.2.2 2009.12.06 Suspicious file
PCTools 7.0.3.5 2009.12.07 Application.Spy_Lantern_Keylogger
Prevx 3.0 2009.12.07 Medium Risk Malware
Rising 22.25.00.06 2009.12.07 Trojan.Win32.Spylantern.a
Sophos 4.48.0 2009.12.07 -
Sunbelt 3.2.1858.2 2009.12.06 -
Symantec 1.4.4.12 2009.12.07 Spyware.SpyLantern
TheHacker 6.5.0.2.086 2009.12.05 -
TrendMicro 9.100.0.1001 2009.12.07 -
VBA32 3.12.12.0 2009.12.07 -
ViRobot 2009.12.7.2074 2009.12.07 -
VirusBuster 5.0.21.0 2009.12.06 -
Information additionnelle
File size: 348160 bytes
MD5 : b7a8dafc148411b517c6a8f6afe30e22
SHA1 : 8e137b3840a0d73744b5bd04cb17bc2fd5fea074
SHA256: 765a2b030928650e6106c5dbaafa02307791c4308dac1992b1de5c14ef022288
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x3E1DA
timedatestamp.....: 0x45A4E9FE (Wed Jan 10 14:28:30 2007)
machinetype.......: 0x14C (Intel I386)

( 3 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x46BB2 0x47000 6.47 3f64fec9c72c3fc473c1b7dedd60e4b4
.rdata 0x48000 0x82CA 0x9000 5.11 70bdd30906774ed13df40c558dd9249f
.data 0x51000 0xFDC0 0x4000 4.54 6d7f65c4524edaf10a7848e8b4b49d60

( 6 imports )

> advapi32.dll: RegCloseKey, OpenServiceA, OpenSCManagerA, LockServiceDatabase, CreateServiceA, ChangeServiceConfig2A, CloseServiceHandle, DeleteService, UnlockServiceDatabase, RegDeleteKeyA, RegCreateKeyExA, RegSetValueExA, LookupAccountSidW, EqualSid, LookupAccountNameW, AllocateAndInitializeSid, GetLengthSid, InitializeAcl, AddAccessAllowedAce, FreeSid, GetKernelObjectSecurity, GetSecurityDescriptorDacl, SetKernelObjectSecurity, OpenProcessToken, GetTokenInformation, RegOpenKeyExA, RegQueryValueExA, InitializeSecurityDescriptor, SetSecurityDescriptorDacl, RegisterServiceCtrlHandlerExA, SetServiceStatus, StartServiceCtrlDispatcherA
> kernel32.dll: MapViewOfFile, CreateFileMappingA, UnmapViewOfFile, CreateMutexA, Sleep, GetTickCount, CopyFileA, MoveFileA, DeleteFileA, GetComputerNameExA, GetCurrentThreadId, ConnectNamedPipe, CreateNamedPipeA, GetTempFileNameA, FindClose, FindNextFileA, FindFirstFileA, CompareFileTime, GetDiskFreeSpaceExA, InterlockedExchange, InterlockedExchangeAdd, GetWindowsDirectoryA, GetSystemDirectoryA, MoveFileExA, OpenProcess, GetCurrentProcess, QueryDosDeviceW, GetProcessHeap, GetVersionExA, WideCharToMultiByte, RemoveDirectoryA, lstrcmpA, lstrlenA, MultiByteToWideChar, GetFileSize, CreateDirectoryA, SetEndOfFile, FlushFileBuffers, GetProcAddress, GetModuleHandleA, GetSystemTimeAdjustment, GetSystemTime, VirtualProtect, LeaveCriticalSection, EnterCriticalSection, GetMailslotInfo, CreateMailslotA, GetComputerNameA, LoadLibraryA, SetLastError, GlobalAlloc, GlobalFree, GetLongPathNameW, DeviceIoControl, CreateFileA, ReleaseMutex, ResetEvent, SetEnvironmentVariableA, CreateThread, GetModuleFileNameA, SetFilePointer, WriteFile, ReadFile, GetLastError, WaitForMultipleObjects, GetOverlappedResult, CloseHandle, DisconnectNamedPipe, InitializeCriticalSection, WaitForSingleObject, SetEvent, CreateEventA, GetCPInfo, GetACP, GetOEMCP, SetStdHandle, CompareStringA, CompareStringW, HeapAlloc, GetCurrentDirectoryA, GetFullPathNameA, GetStringTypeW, GetStringTypeA, TlsGetValue, TlsAlloc, InterlockedDecrement, InterlockedIncrement, HeapFree, GetTimeZoneInformation, GetLocalTime, GetCommandLineA, GetVersion, ExitProcess, FileTimeToSystemTime, FileTimeToLocalFileTime, GetDriveTypeA, HeapReAlloc, RtlUnwind, DeleteCriticalSection, LCMapStringA, LCMapStringW, HeapDestroy, HeapCreate, VirtualFree, VirtualAlloc, TerminateProcess, UnhandledExceptionFilter, FreeEnvironmentStringsA, FreeEnvironmentStringsW, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, TlsSetValue
> ole32.dll: CoCreateInstance, CoInitialize
> psapi.dll: GetModuleFileNameExW
> shlwapi.dll: SHDeleteKeyA, PathAppendA
> wsock32.dll: -, -, -, -, -, -, -, -, -, -, -, -, -

( 0 exports )
TrID : File type identification
Win32 Executable MS Visual C++ (generic) (65.2%)
Win32 Executable Generic (14.7%)
Win32 Dynamic Link Library (generic) (13.1%)
Generic Win/DOS Executable (3.4%)
DOS Executable Generic (3.4%)
ssdeep: 6144:jy9lDlMSreM8fF7BzUt3oains2J3EAztTB9G5Qe:jspsfF7upoaibBztT/G5N
Prevx Info: http://info.prevx.com/aboutprogramtext.asp?PX5=10B374D9000887FD505905AB8E3A9D00D8A1B88E
PEiD : -
RDS : NSRL Reference Data Set
-
0
manideperpi > manideperpi
 
Rapport fichier Fichier hdbha.sys (http://www.virustotal.com/fr/analisis/cd3e30b3f2e3a4446539f6998f3e0cabad7c146c322e0bc9737ab4c0000a6529-1252790641

Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.24 2009.09.12 Riskware.Monitor.Win32.PowerLogger.220!IK
AhnLab-V3 5.0.0.2 2009.09.12 -
AntiVir 7.9.1.14 2009.09.11 SPR/PowerLogger.220.1
Antiy-AVL 2.0.3.7 2009.09.11 -
Authentium 5.1.2.4 2009.09.12 -
Avast 4.8.1351.0 2009.09.12 -
AVG 8.5.0.412 2009.09.12 Logger.CZL
BitDefender 7.2 2009.09.12 Application.Eltima.Keylogger.C
CAT-QuickHeal 10.00 2009.09.12 -
ClamAV 0.94.1 2009.09.12 -
Comodo 2296 2009.09.12 UnclassifiedMalware
DrWeb 5.0.0.12182 2009.09.12 -
eSafe 7.0.17.0 2009.09.10 Spyware.Gen
eTrust-Vet 31.6.6733 2009.09.11 -
F-Prot 4.5.1.85 2009.09.12 -
F-Secure 8.0.14470.0 2009.09.12 Monitor.Win32.PowerLogger.220
Fortinet 3.120.0.0 2009.09.12 -
GData 19 2009.09.12 Application.Eltima.Keylogger.C
Ikarus T3.1.1.72.0 2009.09.12 not-a-virus:Monitor.Win32.PowerLogger.220
Jiangmin 11.0.800 2009.09.12 -
K7AntiVirus 7.10.843 2009.09.12 -
Kaspersky 7.0.0.125 2009.09.12 not-a-virus:Monitor.Win32.PowerLogger.220
McAfee 5739 2009.09.12 New Malware.b
McAfee+Artemis 5739 2009.09.12 potentially unwanted program Artemis!C428897BB020
McAfee-GW-Edition 6.8.5 2009.09.12 Riskware.PowerLogger.220.1
Microsoft 1.5005 2009.09.12 -
NOD32 4419 2009.09.12 -
Norman 6.01.09 2009.09.11 -
nProtect 2009.1.8.0 2009.09.12 -
Panda 10.0.2.2 2009.09.12 Generic Malware
PCTools 4.4.2.0 2009.09.11 Application.Powered_Keylogger
Prevx 3.0 2009.09.12 Medium Risk Malware
Rising 21.46.52.00 2009.09.12 -
Sophos 4.45.0 2009.09.12 PowerLogger
Sunbelt 3.2.1858.2 2009.09.12 -
Symantec 1.4.4.12 2009.09.12 Spyware.ElpowKeylogger
TheHacker 6.3.4.4.402 2009.09.12 -
TrendMicro 8.950.0.1094 2009.09.12 -
VBA32 3.12.10.10 2009.09.11 -
ViRobot 2009.9.12.1932 2009.09.12 -
VirusBuster 4.6.5.0 2009.09.12 -
Information additionnelle
File size: 194848 bytes
MD5 : c428897bb020b398e7d1619ae57d3e63
SHA1 : 25d4ee6ca5aafd50e411c5f2ae2ceeb3ccd4b68c
SHA256: cd3e30b3f2e3a4446539f6998f3e0cabad7c146c322e0bc9737ab4c0000a6529
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x2E005
timedatestamp.....: 0x4729E7A4 (Thu Nov 1 15:50:12 2007)
machinetype.......: 0x14C (Intel I386)

( 6 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x27896 0x27A00 6.08 a2618bf3b0d38908f697c915763d7b49
.rdata 0x29000 0x2ED4 0x3000 7.29 6bd5cc88fe0ef9461709d102a0205e7b
.data 0x2C000 0x1174 0x800 2.86 33c69a07b56aeab1e6aeeb05b731a2a9
INIT 0x2E000 0xB26 0xC00 5.44 cad77b13df670bf9b55948a043f73104
.rsrc 0x2F000 0x390 0x400 3.10 79e8dee95e58bea0136766f30a538ed0
.reloc 0x30000 0x1F6A 0x2000 6.22 275702541d4ce9c9f7d134ca8373baff

( 3 imports )

> hal.dll: KfAcquireSpinLock, KeGetCurrentIrql, KfReleaseSpinLock
> ntoskrnl.exe: KeInitializeApc, ObReferenceObjectByHandle, ExAllocatePoolWithTag, ZwAllocateVirtualMemory, KeGetCurrentThread, memcpy, memset, RtlInitUnicodeString, RtlAnsiStringToUnicodeString, RtlEqualString, RtlInitAnsiString, _wcsicmp, ExSystemTimeToLocalTime, KeQuerySystemTime, IoDeleteDevice, IoCreateSymbolicLink, IoCreateDevice, IofCompleteRequest, DbgPrint, vsprintf, ZwWriteFile, ZwCreateFile, sprintf, RtlFreeUnicodeString, RtlStringFromGUID, ExUuidCreate, ZwReadFile, RtlGUIDFromString, ZwQuerySystemInformation, RtlCompareMemory, KeServiceDescriptorTable, IoFreeWorkItem, IoQueueWorkItem, IoAllocateWorkItem, KeInitializeEvent, KeSetEvent, _stricmp, IoGetCurrentProcess, RtlEqualUnicodeString, RtlAppendUnicodeToString, ProbeForRead, _wcsnicmp, memmove, _alldiv, IoAttachDeviceToDeviceStack, IofCallDriver, RtlAssert, IoDetachDevice, PoCallDriver, PoStartNextPowerIrp, KeInsertQueueApc, RtlImageDirectoryEntryToData, ZwQueryInformationFile, ZwSetInformationFile, wcsstr, KeSetTimer, KeInitializeDpc, KeInitializeTimerEx, _allmul, KeCancelTimer, strncmp, ZwQueryValueKey, ZwOpenKey, PsGetCurrentProcessId, ObQueryNameString, ZwQuerySymbolicLinkObject, ZwOpenSymbolicLinkObject, RtlAppendUnicodeStringToString, KeClearEvent, ZwQueryInformationToken, ZwOpenProcessToken, RtlEqualSid, ZwEnumerateKey, ZwQueryKey, IoCancelIrp, PsGetVersion, ZwFlushKey, ZwSetValueKey, ObReferenceObjectByName, IoDriverObjectType, IoGetDeviceObjectPointer, KeDelayExecutionThread, ZwTerminateProcess, InitSafeBootMode, ZwDeleteValueKey, KeAttachProcess, KeIsExecutingDpc, ZwOpenProcess, IoFileObjectType, _strnicmp, strstr, MmMapLockedPagesSpecifyCache, IoGetRelatedDeviceObject, IoBuildDeviceIoControlRequest, MmProbeAndLockPages, IoAllocateMdl, RtlTimeToTimeFields, ZwDeviceIoControlFile, KeTickCount, KeBugCheckEx, KeWaitForSingleObject, ZwFreeVirtualMemory, ObfDereferenceObject, ZwClose, ExFreePoolWithTag, wcsncmp, KeDetachProcess, ExFreePool, RtlUnwind
> tdi.sys: TdiMapUserRequest, TdiCopyMdlToBuffer

( 0 exports )
TrID : File type identification
Win32 Executable Generic (68.0%)
Generic Win/DOS Executable (15.9%)
DOS Executable Generic (15.9%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
ssdeep: 3072:Wy7biI9BIzUydVImgJ9FenbD/zY9TBfIPj6NJpIn:WoiIgdVwxenn09TBg6JIn
Prevx Info: http://info.prevx.com/aboutprogramtext.asp?PX5=7FB5FEE5202A30CBF9B602FC80116400BD4E81D5
PEiD : -
CWSandbox: http://research.sunbelt-software.com/...
RDS : NSRL Reference Data Set
-
0
plopus Messages postés 6113 Statut Contributeur sécurité 293
 
Fait une recherche de ce fichier avec ton PC :

zivalyfa.dll

regarde dans system32 etc...

puis clic ici http://www.cijoint.fr/cj200912/cijW96KFXg.txt
et fait ce qui est dit et poste le rapport

ensuite tu refait un scan RAPIDE avec malwarebyte

ensuite tu paye NORTON ? car c'est la pire des saletes...

desinstalle AD aware et norton

pour installer antivir beaucoup plus performant et leger :

http://www.commentcamarche.net/telecharger/telecharger-55-antivir

fait un scan avec supprime tous ce qu'il trouve et poste le rapport a la fin
0
Utilisateur anonyme
 
ah noté qu'il a fait show result sur virustotal et pas un nouveau scan (les dates sont de septembre...)
0
manideperpi
 
oups en effet ! je reposte le rapport du fichier hdbha.sys
http://www.virustotal.com/fr/analisis/cd3e30b3f2e3a4446539f6998f3e0cabad7c146c322e0bc9737ab4c0000a6529-1260275073

Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.43 2009.12.08 Riskware.Monitor.Win32.PowerLogger.220!IK
AhnLab-V3 5.0.0.2 2009.12.08 -
AntiVir 7.9.1.102 2009.12.08 SPR/PowerLogger.220.1
Antiy-AVL 2.0.3.7 2009.12.08 -
Authentium 5.2.0.5 2009.12.02 -
Avast 4.8.1351.0 2009.12.08 -
AVG 8.5.0.426 2009.12.08 Logger.CZL
BitDefender 7.2 2009.12.08 Application.Eltima.Keylogger.C
CAT-QuickHeal 10.00 2009.12.08 -
ClamAV 0.94.1 2009.12.08 -
Comodo 3103 2009.12.01 UnclassifiedMalware
DrWeb 5.0.0.12182 2009.12.08 -
eSafe 7.0.17.0 2009.12.07 Spyware.Gen
eTrust-Vet 35.1.7164 2009.12.08 -
F-Prot 4.5.1.85 2009.12.07 -
F-Secure 9.0.15370.0 2009.12.07 Application.Eltima.Keylogger.C
Fortinet 4.0.14.0 2009.12.08 -
GData 19 2009.12.08 Application.Eltima.Keylogger.C
Ikarus T3.1.1.74.0 2009.12.08 not-a-virus:Monitor.Win32.PowerLogger.220
Jiangmin 13.0.900 2009.12.02 -
K7AntiVirus 7.10.913 2009.12.07 -
Kaspersky 7.0.0.125 2009.12.08 not-a-virus:Monitor.Win32.PowerLogger.220
McAfee 5825 2009.12.07 potentially unwanted program Keylog-Powerlogger
McAfee+Artemis 5825 2009.12.07 potentially unwanted program Artemis!C428897BB020
McAfee-GW-Edition 6.8.5 2009.12.08 Riskware.PowerLogger.220.1
Microsoft 1.5302 2009.12.08 -
NOD32 4669 2009.12.08 a variant of Win32/Monitor.PowerLogger.A
Norman 6.03.02 2009.12.08 -
nProtect 2009.1.8.0 2009.12.08 -
Panda 10.0.2.2 2009.12.08 Generic Malware
PCTools 7.0.3.5 2009.12.08 Application.Powered_Keylogger
Rising 22.25.01.06 2009.12.08 -
Sophos 4.48.0 2009.12.08 PowerLogger
Sunbelt 3.2.1858.2 2009.12.08 -
Symantec 1.4.4.12 2009.12.08 Spyware.ElpowKeylogger
TheHacker 6.5.0.2.088 2009.12.07 -
TrendMicro 9.100.0.1001 2009.12.08 -
VBA32 3.12.12.0 2009.12.08 -
ViRobot 2009.12.8.2076 2009.12.08 -
VirusBuster 5.0.21.0 2009.12.07 -
Information additionnelle
File size: 194848 bytes
MD5...: c428897bb020b398e7d1619ae57d3e63
SHA1..: 25d4ee6ca5aafd50e411c5f2ae2ceeb3ccd4b68c
SHA256: cd3e30b3f2e3a4446539f6998f3e0cabad7c146c322e0bc9737ab4c0000a6529
ssdeep: 3072:Wy7biI9BIzUydVImgJ9FenbD/zY9TBfIPj6NJpIn:WoiIgdVwxenn09TBg6
JIn
PEiD..: -
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x2e005
timedatestamp.....: 0x4729e7a4 (Thu Nov 01 14:50:12 2007)
machinetype.......: 0x14c (I386)

( 6 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x27896 0x27a00 6.08 a2618bf3b0d38908f697c915763d7b49
.rdata 0x29000 0x2ed4 0x3000 7.29 6bd5cc88fe0ef9461709d102a0205e7b
.data 0x2c000 0x1174 0x800 2.86 33c69a07b56aeab1e6aeeb05b731a2a9
INIT 0x2e000 0xb26 0xc00 5.44 cad77b13df670bf9b55948a043f73104
.rsrc 0x2f000 0x390 0x400 3.10 79e8dee95e58bea0136766f30a538ed0
.reloc 0x30000 0x1f6a 0x2000 6.22 275702541d4ce9c9f7d134ca8373baff

( 3 imports )
> ntoskrnl.exe: KeInitializeApc, ObReferenceObjectByHandle, ExAllocatePoolWithTag, ZwAllocateVirtualMemory, KeGetCurrentThread, memcpy, memset, RtlInitUnicodeString, RtlAnsiStringToUnicodeString, RtlEqualString, RtlInitAnsiString, _wcsicmp, ExSystemTimeToLocalTime, KeQuerySystemTime, IoDeleteDevice, IoCreateSymbolicLink, IoCreateDevice, IofCompleteRequest, DbgPrint, vsprintf, ZwWriteFile, ZwCreateFile, sprintf, RtlFreeUnicodeString, RtlStringFromGUID, ExUuidCreate, ZwReadFile, RtlGUIDFromString, ZwQuerySystemInformation, RtlCompareMemory, KeServiceDescriptorTable, IoFreeWorkItem, IoQueueWorkItem, IoAllocateWorkItem, KeInitializeEvent, KeSetEvent, _stricmp, IoGetCurrentProcess, RtlEqualUnicodeString, RtlAppendUnicodeToString, ProbeForRead, _wcsnicmp, memmove, _alldiv, IoAttachDeviceToDeviceStack, IofCallDriver, RtlAssert, IoDetachDevice, PoCallDriver, PoStartNextPowerIrp, KeInsertQueueApc, RtlImageDirectoryEntryToData, ZwQueryInformationFile, ZwSetInformationFile, wcsstr, KeSetTimer, KeInitializeDpc, KeInitializeTimerEx, _allmul, KeCancelTimer, strncmp, ZwQueryValueKey, ZwOpenKey, PsGetCurrentProcessId, ObQueryNameString, ZwQuerySymbolicLinkObject, ZwOpenSymbolicLinkObject, RtlAppendUnicodeStringToString, KeClearEvent, ZwQueryInformationToken, ZwOpenProcessToken, RtlEqualSid, ZwEnumerateKey, ZwQueryKey, IoCancelIrp, PsGetVersion, ZwFlushKey, ZwSetValueKey, ObReferenceObjectByName, IoDriverObjectType, IoGetDeviceObjectPointer, KeDelayExecutionThread, ZwTerminateProcess, InitSafeBootMode, ZwDeleteValueKey, KeAttachProcess, KeIsExecutingDpc, ZwOpenProcess, IoFileObjectType, _strnicmp, strstr, MmMapLockedPagesSpecifyCache, IoGetRelatedDeviceObject, IoBuildDeviceIoControlRequest, MmProbeAndLockPages, IoAllocateMdl, RtlTimeToTimeFields, ZwDeviceIoControlFile, KeTickCount, KeBugCheckEx, KeWaitForSingleObject, ZwFreeVirtualMemory, ObfDereferenceObject, ZwClose, ExFreePoolWithTag, wcsncmp, KeDetachProcess, ExFreePool, RtlUnwind
> HAL.dll: KfAcquireSpinLock, KeGetCurrentIrql, KfReleaseSpinLock
> TDI.SYS: TdiMapUserRequest, TdiCopyMdlToBuffer

( 0 exports )
RDS...: NSRL Reference Data Set
-
pdfid.: -
trid..: Win32 Executable Generic (68.0%)
Generic Win/DOS Executable (15.9%)https://forums.commentcamarche.net/forum/affich-15471328-ordi-ralenti?Acces=1#ecrire
DOS Executable Generic (15.9%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
sigcheck:
publisher....: Eltima Software
copyright....: Copyright Eltima Software
product......: Powered Keylogger
description..: Powered Keylogger Core Driver
original name: xxxxx.sys
internal name: xxxxx.sys
file version.: 6.0.6000.16386 built by: WinDDK
comments.....: n/a
signers......: Eltima Software
GlobalSign ObjectSign CA
GlobalSign Primary Object Publishing CA
GlobalSign Root CA
signing date.: 3:50 PM 11/1/2007
verified.....: -
0