Navigateur qui bloque
chris
-
Destrio5 Messages postés 99820 Statut Modérateur -
Destrio5 Messages postés 99820 Statut Modérateur -
Bonjour :
Quand j ' ouvre ma page d'accueil , j'utilise internet explorer et mon navigateur bloque sans arrêt .
J'ai essayé de l'enlever et de le réinstaller mais ça n'a servi à rien .
Je pense changer de navigateur .
Que faut-il faire s'il vous plaît ?
Merci à tous !
Quand j ' ouvre ma page d'accueil , j'utilise internet explorer et mon navigateur bloque sans arrêt .
J'ai essayé de l'enlever et de le réinstaller mais ça n'a servi à rien .
Je pense changer de navigateur .
Que faut-il faire s'il vous plaît ?
Merci à tous !
A voir également:
- Navigateur qui bloque
- Code puk bloqué - Guide
- Téléphone bloqué code verrouillage - Guide
- Pavé tactile bloqué - Guide
- Navigateur privé - Guide
- Compte gmail bloqué - Guide
61 réponses
Je crois savoir d'où vient le problème.
Fais un scan avec RogueKiller et poste le rapport :
https://www.commentcamarche.net/faq/30719-utiliser-roguekiller
Fais un scan avec RogueKiller et poste le rapport :
https://www.commentcamarche.net/faq/30719-utiliser-roguekiller
RogueKiller V7.3.3 [22/04/2012] par Tigzy
mail: tigzyRK<at>gmail<dot>com
Remontees: http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.html
Blog: http://tigzyrk.blogspot.com
Systeme d'exploitation: Windows XP (5.1.2600 Service Pack 3) 32 bits version
Demarrage : Mode normal
Utilisateur: Truc [Droits d'admin]
Mode: Recherche -- Date: 23/04/2012 14:56:14
¤¤¤ Processus malicieux: 0 ¤¤¤
¤¤¤ Entrees de registre: 6 ¤¤¤
[DNS] HKLM\[...]\ControlSet001\Parameters : NameServer (85.255.112.172,85.255.112.26) -> FOUND
[DNS] HKLM\[...]\ControlSet001\Parameters\Interfaces\{5D66A8FC-FD41-45C6-B15E-C1E9B04CDB18} : NameServer (85.255.112.172,85.255.112.26) -> FOUND
[DNS] HKLM\[...]\ControlSet002\Parameters\Interfaces\{1FE9F661-FADE-4756-8808-96D118EA6BB3} : NameServer (212.27.53.252,212.27.54.252) -> FOUND
[DNS] HKLM\[...]\ControlSet003\Parameters\Interfaces\{1FE9F661-FADE-4756-8808-96D118EA6BB3} : NameServer (212.27.53.252,212.27.54.252) -> FOUND
[HJ] HKLM\[...]\System : EnableLUA (0) -> FOUND
[HJ] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
¤¤¤ Fichiers / Dossiers particuliers: ¤¤¤
¤¤¤ Driver: [CHARGE] ¤¤¤
SSDT[25] : NtClose @ 0x805BC530 -> HOOKED (Unknown @ 0xBA7E693C)
SSDT[41] : NtCreateKey @ 0x806240F0 -> HOOKED (Unknown @ 0xBA7E68F6)
SSDT[50] : NtCreateSection @ 0x805AB3C8 -> HOOKED (Unknown @ 0xBA7E6946)
SSDT[53] : NtCreateThread @ 0x805D1018 -> HOOKED (Unknown @ 0xBA7E68EC)
SSDT[63] : NtDeleteKey @ 0x8062458C -> HOOKED (Unknown @ 0xBA7E68FB)
SSDT[65] : NtDeleteValueKey @ 0x8062475C -> HOOKED (Unknown @ 0xBA7E6905)
SSDT[68] : NtDuplicateObject @ 0x805BE008 -> HOOKED (Unknown @ 0xBA7E6937)
SSDT[98] : NtLoadKey @ 0x80626314 -> HOOKED (Unknown @ 0xBA7E690A)
SSDT[122] : NtOpenProcess @ 0x805CB440 -> HOOKED (Unknown @ 0xBA7E68D8)
SSDT[128] : NtOpenThread @ 0x805CB6CC -> HOOKED (Unknown @ 0xBA7E68DD)
SSDT[177] : NtQueryValueKey @ 0x80622314 -> HOOKED (Unknown @ 0xBA7E695F)
SSDT[193] : NtReplaceKey @ 0x806261C4 -> HOOKED (Unknown @ 0xBA7E6914)
SSDT[200] : NtRequestWaitReplyPort @ 0x805A2D76 -> HOOKED (Unknown @ 0xBA7E6950)
SSDT[204] : NtRestoreKey @ 0x80625AD0 -> HOOKED (Unknown @ 0xBA7E690F)
SSDT[213] : NtSetContextThread @ 0x805D173A -> HOOKED (Unknown @ 0xBA7E694B)
SSDT[237] : NtSetSecurityObject @ 0x805C062E -> HOOKED (Unknown @ 0xBA7E6955)
SSDT[247] : NtSetValueKey @ 0x80622662 -> HOOKED (Unknown @ 0xBA7E6900)
SSDT[255] : NtSystemDebugControl @ 0x806180BA -> HOOKED (Unknown @ 0xBA7E695A)
SSDT[257] : NtTerminateProcess @ 0x805D29E2 -> HOOKED (Unknown @ 0xBA7E68E7)
S_SSDT[549] : Unknown -> HOOKED (Unknown @ 0xBA7E696E)
S_SSDT[552] : Unknown -> HOOKED (Unknown @ 0xBA7E6973)
IRP[IRP_MJ_CREATE] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_CLOSE] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_DEVICE_CONTROL] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_SYSTEM_CONTROL] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_DEVICE_CHANGE] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
¤¤¤ Infection : Root.MBR ¤¤¤
¤¤¤ Fichier HOSTS: ¤¤¤
127.0.0.1 localhost
127.0.0.1 www.007guard.com
127.0.0.1 007guard.com
127.0.0.1 008i.com
127.0.0.1 www.008k.com
127.0.0.1 008k.com
127.0.0.1 www.00hq.com
127.0.0.1 00hq.com
127.0.0.1 010402.com
127.0.0.1 www.032439.com
127.0.0.1 032439.com
127.0.0.1 www.0scan.com
127.0.0.1 0scan.com
127.0.0.1 1000gratisproben.com
127.0.0.1 www.1000gratisproben.com
127.0.0.1 www.1001namen.com
127.0.0.1 1001namen.com
127.0.0.1 www.100888290cs.com
127.0.0.1 100888290cs.com
127.0.0.1 www.100sexlinks.com
[...]
¤¤¤ MBR Verif: ¤¤¤
+++++ PhysicalDrive0: MAXTOR STM3500320AS +++++
--- User ---
[MBR] 831d9681d5fafaf207a5a660287f4e56
[BSP] 6d2de05141d6f1f7dd08e3138bdb3ffb : Windows XP MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 476929 Mo
User = LL1 ... OK!
User != LL2 ... KO!
--- LL2 ---
[MBR] 882ad7f76d0bbb23a1436a5607d757bb
[BSP] 8ac271a8919125c159531d913a66b150 : Whistler/Sinowal MBR Code!
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 476929 Mo
Termine : << RKreport[1].txt >>
RKreport[1].txt
mail: tigzyRK<at>gmail<dot>com
Remontees: http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.html
Blog: http://tigzyrk.blogspot.com
Systeme d'exploitation: Windows XP (5.1.2600 Service Pack 3) 32 bits version
Demarrage : Mode normal
Utilisateur: Truc [Droits d'admin]
Mode: Recherche -- Date: 23/04/2012 14:56:14
¤¤¤ Processus malicieux: 0 ¤¤¤
¤¤¤ Entrees de registre: 6 ¤¤¤
[DNS] HKLM\[...]\ControlSet001\Parameters : NameServer (85.255.112.172,85.255.112.26) -> FOUND
[DNS] HKLM\[...]\ControlSet001\Parameters\Interfaces\{5D66A8FC-FD41-45C6-B15E-C1E9B04CDB18} : NameServer (85.255.112.172,85.255.112.26) -> FOUND
[DNS] HKLM\[...]\ControlSet002\Parameters\Interfaces\{1FE9F661-FADE-4756-8808-96D118EA6BB3} : NameServer (212.27.53.252,212.27.54.252) -> FOUND
[DNS] HKLM\[...]\ControlSet003\Parameters\Interfaces\{1FE9F661-FADE-4756-8808-96D118EA6BB3} : NameServer (212.27.53.252,212.27.54.252) -> FOUND
[HJ] HKLM\[...]\System : EnableLUA (0) -> FOUND
[HJ] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
¤¤¤ Fichiers / Dossiers particuliers: ¤¤¤
¤¤¤ Driver: [CHARGE] ¤¤¤
SSDT[25] : NtClose @ 0x805BC530 -> HOOKED (Unknown @ 0xBA7E693C)
SSDT[41] : NtCreateKey @ 0x806240F0 -> HOOKED (Unknown @ 0xBA7E68F6)
SSDT[50] : NtCreateSection @ 0x805AB3C8 -> HOOKED (Unknown @ 0xBA7E6946)
SSDT[53] : NtCreateThread @ 0x805D1018 -> HOOKED (Unknown @ 0xBA7E68EC)
SSDT[63] : NtDeleteKey @ 0x8062458C -> HOOKED (Unknown @ 0xBA7E68FB)
SSDT[65] : NtDeleteValueKey @ 0x8062475C -> HOOKED (Unknown @ 0xBA7E6905)
SSDT[68] : NtDuplicateObject @ 0x805BE008 -> HOOKED (Unknown @ 0xBA7E6937)
SSDT[98] : NtLoadKey @ 0x80626314 -> HOOKED (Unknown @ 0xBA7E690A)
SSDT[122] : NtOpenProcess @ 0x805CB440 -> HOOKED (Unknown @ 0xBA7E68D8)
SSDT[128] : NtOpenThread @ 0x805CB6CC -> HOOKED (Unknown @ 0xBA7E68DD)
SSDT[177] : NtQueryValueKey @ 0x80622314 -> HOOKED (Unknown @ 0xBA7E695F)
SSDT[193] : NtReplaceKey @ 0x806261C4 -> HOOKED (Unknown @ 0xBA7E6914)
SSDT[200] : NtRequestWaitReplyPort @ 0x805A2D76 -> HOOKED (Unknown @ 0xBA7E6950)
SSDT[204] : NtRestoreKey @ 0x80625AD0 -> HOOKED (Unknown @ 0xBA7E690F)
SSDT[213] : NtSetContextThread @ 0x805D173A -> HOOKED (Unknown @ 0xBA7E694B)
SSDT[237] : NtSetSecurityObject @ 0x805C062E -> HOOKED (Unknown @ 0xBA7E6955)
SSDT[247] : NtSetValueKey @ 0x80622662 -> HOOKED (Unknown @ 0xBA7E6900)
SSDT[255] : NtSystemDebugControl @ 0x806180BA -> HOOKED (Unknown @ 0xBA7E695A)
SSDT[257] : NtTerminateProcess @ 0x805D29E2 -> HOOKED (Unknown @ 0xBA7E68E7)
S_SSDT[549] : Unknown -> HOOKED (Unknown @ 0xBA7E696E)
S_SSDT[552] : Unknown -> HOOKED (Unknown @ 0xBA7E6973)
IRP[IRP_MJ_CREATE] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_CLOSE] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_DEVICE_CONTROL] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_SYSTEM_CONTROL] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_DEVICE_CHANGE] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
¤¤¤ Infection : Root.MBR ¤¤¤
¤¤¤ Fichier HOSTS: ¤¤¤
127.0.0.1 localhost
127.0.0.1 www.007guard.com
127.0.0.1 007guard.com
127.0.0.1 008i.com
127.0.0.1 www.008k.com
127.0.0.1 008k.com
127.0.0.1 www.00hq.com
127.0.0.1 00hq.com
127.0.0.1 010402.com
127.0.0.1 www.032439.com
127.0.0.1 032439.com
127.0.0.1 www.0scan.com
127.0.0.1 0scan.com
127.0.0.1 1000gratisproben.com
127.0.0.1 www.1000gratisproben.com
127.0.0.1 www.1001namen.com
127.0.0.1 1001namen.com
127.0.0.1 www.100888290cs.com
127.0.0.1 100888290cs.com
127.0.0.1 www.100sexlinks.com
[...]
¤¤¤ MBR Verif: ¤¤¤
+++++ PhysicalDrive0: MAXTOR STM3500320AS +++++
--- User ---
[MBR] 831d9681d5fafaf207a5a660287f4e56
[BSP] 6d2de05141d6f1f7dd08e3138bdb3ffb : Windows XP MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 476929 Mo
User = LL1 ... OK!
User != LL2 ... KO!
--- LL2 ---
[MBR] 882ad7f76d0bbb23a1436a5607d757bb
[BSP] 8ac271a8919125c159531d913a66b150 : Whistler/Sinowal MBR Code!
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 476929 Mo
Termine : << RKreport[1].txt >>
RKreport[1].txt
Il y a bien infection.
Utilise l'option "Suppression" puis "DNS RAZ" de RogueKiller.
Poste les deux rapports.
Utilise l'option "Suppression" puis "DNS RAZ" de RogueKiller.
Poste les deux rapports.
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
>>>> après " SUPPRESSION " RKreport .txt
RogueKiller V7.3.3 [22/04/2012] par Tigzy
mail: tigzyRK<at>gmail<dot>com
Remontees: http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.html
Blog: http://tigzyrk.blogspot.com
Systeme d'exploitation: Windows XP (5.1.2600 Service Pack 3) 32 bits version
Demarrage : Mode normal
Utilisateur: Truc [Droits d'admin]
Mode: Suppression -- Date: 23/04/2012 15:03:10
¤¤¤ Processus malicieux: 0 ¤¤¤
¤¤¤ Entrees de registre: 6 ¤¤¤
[DNS] HKLM\[...]\ControlSet001\Parameters : NameServer (85.255.112.172,85.255.112.26) -> NOT REMOVED, USE DNSFIX
[DNS] HKLM\[...]\ControlSet001\Parameters\Interfaces\{5D66A8FC-FD41-45C6-B15E-C1E9B04CDB18} : NameServer (85.255.112.172,85.255.112.26) -> NOT REMOVED, USE DNSFIX
[DNS] HKLM\[...]\ControlSet002\Parameters\Interfaces\{1FE9F661-FADE-4756-8808-96D118EA6BB3} : NameServer (212.27.53.252,212.27.54.252) -> NOT REMOVED, USE DNSFIX
[DNS] HKLM\[...]\ControlSet003\Parameters\Interfaces\{1FE9F661-FADE-4756-8808-96D118EA6BB3} : NameServer (212.27.53.252,212.27.54.252) -> NOT REMOVED, USE DNSFIX
[HJ] HKLM\[...]\System : EnableLUA (0) -> REPLACED (1)
[HJ] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)
¤¤¤ Fichiers / Dossiers particuliers: ¤¤¤
¤¤¤ Driver: [CHARGE] ¤¤¤
SSDT[25] : NtClose @ 0x805BC530 -> HOOKED (Unknown @ 0xBA7E693C)
SSDT[41] : NtCreateKey @ 0x806240F0 -> HOOKED (Unknown @ 0xBA7E68F6)
SSDT[50] : NtCreateSection @ 0x805AB3C8 -> HOOKED (Unknown @ 0xBA7E6946)
SSDT[53] : NtCreateThread @ 0x805D1018 -> HOOKED (Unknown @ 0xBA7E68EC)
SSDT[63] : NtDeleteKey @ 0x8062458C -> HOOKED (Unknown @ 0xBA7E68FB)
SSDT[65] : NtDeleteValueKey @ 0x8062475C -> HOOKED (Unknown @ 0xBA7E6905)
SSDT[68] : NtDuplicateObject @ 0x805BE008 -> HOOKED (Unknown @ 0xBA7E6937)
SSDT[98] : NtLoadKey @ 0x80626314 -> HOOKED (Unknown @ 0xBA7E690A)
SSDT[122] : NtOpenProcess @ 0x805CB440 -> HOOKED (Unknown @ 0xBA7E68D8)
SSDT[128] : NtOpenThread @ 0x805CB6CC -> HOOKED (Unknown @ 0xBA7E68DD)
SSDT[177] : NtQueryValueKey @ 0x80622314 -> HOOKED (Unknown @ 0xBA7E695F)
SSDT[193] : NtReplaceKey @ 0x806261C4 -> HOOKED (Unknown @ 0xBA7E6914)
SSDT[200] : NtRequestWaitReplyPort @ 0x805A2D76 -> HOOKED (Unknown @ 0xBA7E6950)
SSDT[204] : NtRestoreKey @ 0x80625AD0 -> HOOKED (Unknown @ 0xBA7E690F)
SSDT[213] : NtSetContextThread @ 0x805D173A -> HOOKED (Unknown @ 0xBA7E694B)
SSDT[237] : NtSetSecurityObject @ 0x805C062E -> HOOKED (Unknown @ 0xBA7E6955)
SSDT[247] : NtSetValueKey @ 0x80622662 -> HOOKED (Unknown @ 0xBA7E6900)
SSDT[255] : NtSystemDebugControl @ 0x806180BA -> HOOKED (Unknown @ 0xBA7E695A)
SSDT[257] : NtTerminateProcess @ 0x805D29E2 -> HOOKED (Unknown @ 0xBA7E68E7)
S_SSDT[549] : Unknown -> HOOKED (Unknown @ 0xBA7E696E)
S_SSDT[552] : Unknown -> HOOKED (Unknown @ 0xBA7E6973)
IRP[IRP_MJ_CREATE] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_CLOSE] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_DEVICE_CONTROL] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_SYSTEM_CONTROL] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_DEVICE_CHANGE] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
¤¤¤ Infection : Root.MBR ¤¤¤
¤¤¤ Fichier HOSTS: ¤¤¤
127.0.0.1 localhost
127.0.0.1 www.007guard.com
127.0.0.1 007guard.com
127.0.0.1 008i.com
127.0.0.1 www.008k.com
127.0.0.1 008k.com
127.0.0.1 www.00hq.com
127.0.0.1 00hq.com
127.0.0.1 010402.com
127.0.0.1 www.032439.com
127.0.0.1 032439.com
127.0.0.1 www.0scan.com
127.0.0.1 0scan.com
127.0.0.1 1000gratisproben.com
127.0.0.1 www.1000gratisproben.com
127.0.0.1 www.1001namen.com
127.0.0.1 1001namen.com
127.0.0.1 www.100888290cs.com
127.0.0.1 100888290cs.com
127.0.0.1 www.100sexlinks.com
[...]
¤¤¤ MBR Verif: ¤¤¤
+++++ PhysicalDrive0: MAXTOR STM3500320AS +++++
--- User ---
[MBR] 831d9681d5fafaf207a5a660287f4e56
[BSP] 6d2de05141d6f1f7dd08e3138bdb3ffb : Windows XP MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 476929 Mo
User = LL1 ... OK!
User != LL2 ... KO!
--- LL2 ---
[MBR] 882ad7f76d0bbb23a1436a5607d757bb
[BSP] 8ac271a8919125c159531d913a66b150 : Whistler/Sinowal MBR Code!
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 476929 Mo
Termine : << RKreport[2].txt >>
RKreport[1].txt ; RKreport[2].txt
---------------------------------------------------------------------------------
>>>> après "DNS RAS" - RKreport .txt
RogueKiller V7.3.3 [22/04/2012] par Tigzy
mail: tigzyRK<at>gmail<dot>com
Remontees: http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.html
Blog: http://tigzyrk.blogspot.com
Systeme d'exploitation: Windows XP (5.1.2600 Service Pack 3) 32 bits version
Demarrage : Mode normal
Utilisateur: Truc [Droits d'admin]
Mode: DNS RAZ -- Date: 23/04/2012 15:03:16
¤¤¤ Processus malicieux: 0 ¤¤¤
¤¤¤ Driver: [CHARGE] ¤¤¤
¤¤¤ Entrees de registre: 4 ¤¤¤
[DNS] HKLM\[...]\ControlSet001\Parameters : NameServer (85.255.112.172,85.255.112.26) -> REPLACED ()
[DNS] HKLM\[...]\ControlSet001\Parameters\Interfaces\{5D66A8FC-FD41-45C6-B15E-C1E9B04CDB18} : NameServer (85.255.112.172,85.255.112.26) -> REPLACED ()
[DNS] HKLM\[...]\ControlSet002\Parameters\Interfaces\{1FE9F661-FADE-4756-8808-96D118EA6BB3} : NameServer (212.27.53.252,212.27.54.252) -> REPLACED ()
[DNS] HKLM\[...]\ControlSet003\Parameters\Interfaces\{1FE9F661-FADE-4756-8808-96D118EA6BB3} : NameServer (212.27.53.252,212.27.54.252) -> REPLACED ()
Termine : << RKreport[3].txt >>
RKreport[1].txt ; RKreport[2].txt ; RKreport[3].txt
RogueKiller V7.3.3 [22/04/2012] par Tigzy
mail: tigzyRK<at>gmail<dot>com
Remontees: http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.html
Blog: http://tigzyrk.blogspot.com
Systeme d'exploitation: Windows XP (5.1.2600 Service Pack 3) 32 bits version
Demarrage : Mode normal
Utilisateur: Truc [Droits d'admin]
Mode: Suppression -- Date: 23/04/2012 15:03:10
¤¤¤ Processus malicieux: 0 ¤¤¤
¤¤¤ Entrees de registre: 6 ¤¤¤
[DNS] HKLM\[...]\ControlSet001\Parameters : NameServer (85.255.112.172,85.255.112.26) -> NOT REMOVED, USE DNSFIX
[DNS] HKLM\[...]\ControlSet001\Parameters\Interfaces\{5D66A8FC-FD41-45C6-B15E-C1E9B04CDB18} : NameServer (85.255.112.172,85.255.112.26) -> NOT REMOVED, USE DNSFIX
[DNS] HKLM\[...]\ControlSet002\Parameters\Interfaces\{1FE9F661-FADE-4756-8808-96D118EA6BB3} : NameServer (212.27.53.252,212.27.54.252) -> NOT REMOVED, USE DNSFIX
[DNS] HKLM\[...]\ControlSet003\Parameters\Interfaces\{1FE9F661-FADE-4756-8808-96D118EA6BB3} : NameServer (212.27.53.252,212.27.54.252) -> NOT REMOVED, USE DNSFIX
[HJ] HKLM\[...]\System : EnableLUA (0) -> REPLACED (1)
[HJ] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)
¤¤¤ Fichiers / Dossiers particuliers: ¤¤¤
¤¤¤ Driver: [CHARGE] ¤¤¤
SSDT[25] : NtClose @ 0x805BC530 -> HOOKED (Unknown @ 0xBA7E693C)
SSDT[41] : NtCreateKey @ 0x806240F0 -> HOOKED (Unknown @ 0xBA7E68F6)
SSDT[50] : NtCreateSection @ 0x805AB3C8 -> HOOKED (Unknown @ 0xBA7E6946)
SSDT[53] : NtCreateThread @ 0x805D1018 -> HOOKED (Unknown @ 0xBA7E68EC)
SSDT[63] : NtDeleteKey @ 0x8062458C -> HOOKED (Unknown @ 0xBA7E68FB)
SSDT[65] : NtDeleteValueKey @ 0x8062475C -> HOOKED (Unknown @ 0xBA7E6905)
SSDT[68] : NtDuplicateObject @ 0x805BE008 -> HOOKED (Unknown @ 0xBA7E6937)
SSDT[98] : NtLoadKey @ 0x80626314 -> HOOKED (Unknown @ 0xBA7E690A)
SSDT[122] : NtOpenProcess @ 0x805CB440 -> HOOKED (Unknown @ 0xBA7E68D8)
SSDT[128] : NtOpenThread @ 0x805CB6CC -> HOOKED (Unknown @ 0xBA7E68DD)
SSDT[177] : NtQueryValueKey @ 0x80622314 -> HOOKED (Unknown @ 0xBA7E695F)
SSDT[193] : NtReplaceKey @ 0x806261C4 -> HOOKED (Unknown @ 0xBA7E6914)
SSDT[200] : NtRequestWaitReplyPort @ 0x805A2D76 -> HOOKED (Unknown @ 0xBA7E6950)
SSDT[204] : NtRestoreKey @ 0x80625AD0 -> HOOKED (Unknown @ 0xBA7E690F)
SSDT[213] : NtSetContextThread @ 0x805D173A -> HOOKED (Unknown @ 0xBA7E694B)
SSDT[237] : NtSetSecurityObject @ 0x805C062E -> HOOKED (Unknown @ 0xBA7E6955)
SSDT[247] : NtSetValueKey @ 0x80622662 -> HOOKED (Unknown @ 0xBA7E6900)
SSDT[255] : NtSystemDebugControl @ 0x806180BA -> HOOKED (Unknown @ 0xBA7E695A)
SSDT[257] : NtTerminateProcess @ 0x805D29E2 -> HOOKED (Unknown @ 0xBA7E68E7)
S_SSDT[549] : Unknown -> HOOKED (Unknown @ 0xBA7E696E)
S_SSDT[552] : Unknown -> HOOKED (Unknown @ 0xBA7E6973)
IRP[IRP_MJ_CREATE] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_CLOSE] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_DEVICE_CONTROL] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_SYSTEM_CONTROL] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_DEVICE_CHANGE] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
¤¤¤ Infection : Root.MBR ¤¤¤
¤¤¤ Fichier HOSTS: ¤¤¤
127.0.0.1 localhost
127.0.0.1 www.007guard.com
127.0.0.1 007guard.com
127.0.0.1 008i.com
127.0.0.1 www.008k.com
127.0.0.1 008k.com
127.0.0.1 www.00hq.com
127.0.0.1 00hq.com
127.0.0.1 010402.com
127.0.0.1 www.032439.com
127.0.0.1 032439.com
127.0.0.1 www.0scan.com
127.0.0.1 0scan.com
127.0.0.1 1000gratisproben.com
127.0.0.1 www.1000gratisproben.com
127.0.0.1 www.1001namen.com
127.0.0.1 1001namen.com
127.0.0.1 www.100888290cs.com
127.0.0.1 100888290cs.com
127.0.0.1 www.100sexlinks.com
[...]
¤¤¤ MBR Verif: ¤¤¤
+++++ PhysicalDrive0: MAXTOR STM3500320AS +++++
--- User ---
[MBR] 831d9681d5fafaf207a5a660287f4e56
[BSP] 6d2de05141d6f1f7dd08e3138bdb3ffb : Windows XP MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 476929 Mo
User = LL1 ... OK!
User != LL2 ... KO!
--- LL2 ---
[MBR] 882ad7f76d0bbb23a1436a5607d757bb
[BSP] 8ac271a8919125c159531d913a66b150 : Whistler/Sinowal MBR Code!
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 476929 Mo
Termine : << RKreport[2].txt >>
RKreport[1].txt ; RKreport[2].txt
---------------------------------------------------------------------------------
>>>> après "DNS RAS" - RKreport .txt
RogueKiller V7.3.3 [22/04/2012] par Tigzy
mail: tigzyRK<at>gmail<dot>com
Remontees: http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.html
Blog: http://tigzyrk.blogspot.com
Systeme d'exploitation: Windows XP (5.1.2600 Service Pack 3) 32 bits version
Demarrage : Mode normal
Utilisateur: Truc [Droits d'admin]
Mode: DNS RAZ -- Date: 23/04/2012 15:03:16
¤¤¤ Processus malicieux: 0 ¤¤¤
¤¤¤ Driver: [CHARGE] ¤¤¤
¤¤¤ Entrees de registre: 4 ¤¤¤
[DNS] HKLM\[...]\ControlSet001\Parameters : NameServer (85.255.112.172,85.255.112.26) -> REPLACED ()
[DNS] HKLM\[...]\ControlSet001\Parameters\Interfaces\{5D66A8FC-FD41-45C6-B15E-C1E9B04CDB18} : NameServer (85.255.112.172,85.255.112.26) -> REPLACED ()
[DNS] HKLM\[...]\ControlSet002\Parameters\Interfaces\{1FE9F661-FADE-4756-8808-96D118EA6BB3} : NameServer (212.27.53.252,212.27.54.252) -> REPLACED ()
[DNS] HKLM\[...]\ControlSet003\Parameters\Interfaces\{1FE9F661-FADE-4756-8808-96D118EA6BB3} : NameServer (212.27.53.252,212.27.54.252) -> REPLACED ()
Termine : << RKreport[3].txt >>
RKreport[1].txt ; RKreport[2].txt ; RKreport[3].txt
Ok, on va utiliser TDSSKiller.
--> Télécharge TDSSKiller sur le Bureau :
https://support.kaspersky.com/downloads/utils/tdsskiller.exe
--> Lance TDSSKiller.
(Sous Vista/Win7, il faut cliquer droit sur TDSSKiller et choisir Exécuter en tant qu'administrateur)
--> Clique sur [Start Scan] pour démarrer l'analyse.
--> Si des éléments sont trouvés, clique sur [Continue] puis sur [Reboot Now].
--> Un rapport s'ouvrira au redémarrage du PC.
--> Copie-colle son contenu ici.
Note : le rapport se trouve également sous C:\TDSSKiller.N°deversion_Date_Heure_log.txt.
Note 2 : si TDSSKiller trouve un fichier nommé "Sptd.sys", tu sélectionnes Skip juste pour ce fichier.
--> Télécharge TDSSKiller sur le Bureau :
https://support.kaspersky.com/downloads/utils/tdsskiller.exe
--> Lance TDSSKiller.
(Sous Vista/Win7, il faut cliquer droit sur TDSSKiller et choisir Exécuter en tant qu'administrateur)
--> Clique sur [Start Scan] pour démarrer l'analyse.
--> Si des éléments sont trouvés, clique sur [Continue] puis sur [Reboot Now].
--> Un rapport s'ouvrira au redémarrage du PC.
--> Copie-colle son contenu ici.
Note : le rapport se trouve également sous C:\TDSSKiller.N°deversion_Date_Heure_log.txt.
Note 2 : si TDSSKiller trouve un fichier nommé "Sptd.sys", tu sélectionnes Skip juste pour ce fichier.
Quelle réactivité !!!
Voici le rapport de TDSSKiller
15:11:09.0671 1228 TDSS rootkit removing tool 2.7.31.0 Apr 20 2012 19:49:47
15:11:10.0187 1228 ============================================================
15:11:10.0187 1228 Current date / time: 2012/04/23 15:11:10.0187
15:11:10.0187 1228 SystemInfo:
15:11:10.0187 1228
15:11:10.0187 1228 OS Version: 5.1.2600 ServicePack: 3.0
15:11:10.0187 1228 Product type: Workstation
15:11:10.0187 1228 ComputerName: POUIC
15:11:10.0187 1228 UserName: Truc
15:11:10.0187 1228 Windows directory: C:\WINDOWS
15:11:10.0187 1228 System windows directory: C:\WINDOWS
15:11:10.0187 1228 Processor architecture: Intel x86
15:11:10.0187 1228 Number of processors: 4
15:11:10.0187 1228 Page size: 0x1000
15:11:10.0187 1228 Boot type: Normal boot
15:11:10.0187 1228 ============================================================
15:11:11.0906 1228 Drive \Device\Harddisk0\DR0 - Size: 0x7470C06000 (465.76 Gb), SectorSize: 0x200, Cylinders: 0xED81, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'K0', Flags 0x00000054
15:11:11.0906 1228 \Device\Harddisk0\DR0:
15:11:11.0921 1228 MBR partitions:
15:11:11.0921 1228 \Device\Harddisk0\DR0\Partition0: MBR, Type 0x7, StartLBA 0x3F, BlocksNum 0x3A380D41
15:11:11.0937 1228 C: <-> \Device\Harddisk0\DR0\Partition0
15:11:11.0937 1228 Initialize success
15:11:11.0937 1228 ============================================================
15:11:24.0781 2600 ============================================================
15:11:24.0781 2600 Scan started
15:11:24.0781 2600 Mode: Manual;
15:11:24.0781 2600 ============================================================
15:11:25.0265 2600 Abiosdsk - ok
15:11:25.0281 2600 abp480n5 - ok
15:11:25.0312 2600 ACPI (e5e6dbfc41ea8aad005cb9a57a96b43b) C:\WINDOWS\system32\DRIVERS\ACPI.sys
15:11:25.0312 2600 ACPI - ok
15:11:25.0343 2600 ACPIEC (e4abc1212b70bb03d35e60681c447210) C:\WINDOWS\system32\drivers\ACPIEC.sys
15:11:25.0343 2600 ACPIEC - ok
15:11:25.0343 2600 adpu160m - ok
15:11:25.0359 2600 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
15:11:25.0359 2600 aec - ok
15:11:25.0390 2600 AFD (1e44bc1e83d8fd2305f8d452db109cf9) C:\WINDOWS\System32\drivers\afd.sys
15:11:25.0406 2600 AFD - ok
15:11:25.0406 2600 Aha154x - ok
15:11:25.0421 2600 aic78u2 - ok
15:11:25.0421 2600 aic78xx - ok
15:11:25.0453 2600 Alerter (758fdc60d41716ef889d849989b4b1cd) C:\WINDOWS\system32\alrsvc.dll
15:11:25.0453 2600 Alerter - ok
15:11:25.0468 2600 ALG (5e9a6658a2a69ae7eb195113b7a2e7a9) C:\WINDOWS\System32\alg.exe
15:11:25.0468 2600 ALG - ok
15:11:25.0484 2600 AliIde - ok
15:11:25.0500 2600 amsint - ok
15:11:25.0718 2600 AntiVirSchedulerService (27c9a4e1ef31c7a64de8fbc0aa568503) C:\Program Files\Avira\AntiVir Desktop\sched.exe
15:11:25.0718 2600 AntiVirSchedulerService - ok
15:11:25.0781 2600 AntiVirService (e491888d529410d7bd8fbbad825795c8) C:\Program Files\Avira\AntiVir Desktop\avguard.exe
15:11:25.0781 2600 AntiVirService - ok
15:11:25.0812 2600 AppMgmt (f36c9f78fc902c8dce4d3b576bb0435a) C:\WINDOWS\System32\appmgmts.dll
15:11:25.0812 2600 AppMgmt - ok
15:11:25.0828 2600 Arp1394 (b5b8a80875c1dededa8b02765642c32f) C:\WINDOWS\system32\DRIVERS\arp1394.sys
15:11:25.0828 2600 Arp1394 - ok
15:11:25.0828 2600 asc - ok
15:11:25.0843 2600 asc3350p - ok
15:11:25.0859 2600 asc3550 - ok
15:11:25.0890 2600 aspnet_state (0e5e4957549056e2bf2c49f4f6b601ad) C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\aspnet_state.exe
15:11:25.0906 2600 aspnet_state - ok
15:11:25.0921 2600 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
15:11:25.0921 2600 AsyncMac - ok
15:11:25.0937 2600 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys
15:11:25.0937 2600 atapi - ok
15:11:25.0937 2600 Atdisk - ok
15:11:25.0968 2600 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
15:11:25.0968 2600 Atmarpc - ok
15:11:26.0000 2600 AudioSrv (b4005aef7873144634765b570dac466e) C:\WINDOWS\System32\audiosrv.dll
15:11:26.0000 2600 AudioSrv - ok
15:11:26.0031 2600 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
15:11:26.0031 2600 audstub - ok
15:11:26.0046 2600 avgntflt (7713e4eb0276702faa08e52a6e23f2a6) C:\WINDOWS\system32\DRIVERS\avgntflt.sys
15:11:26.0046 2600 avgntflt - ok
15:11:26.0078 2600 avipbb (13b02b9b969dde270cd7c351203dad3c) C:\WINDOWS\system32\DRIVERS\avipbb.sys
15:11:26.0078 2600 avipbb - ok
15:11:26.0093 2600 avkmgr (271cfd1a989209b1964e24d969552bf7) C:\WINDOWS\system32\DRIVERS\avkmgr.sys
15:11:26.0093 2600 avkmgr - ok
15:11:26.0125 2600 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
15:11:26.0125 2600 Beep - ok
15:11:26.0156 2600 BITS (baa0b6e647c1ad593e9bae5cc31bcffb) C:\WINDOWS\system32\qmgr.dll
15:11:26.0187 2600 BITS - ok
15:11:26.0250 2600 Bonjour Service (f832f1505ad8b83474bd9a5b1b985e01) C:\Program Files\Bonjour\mDNSResponder.exe
15:11:26.0250 2600 Bonjour Service - ok
15:11:26.0296 2600 Browser (06b54a7b1ef7cb16bfd0e208d343fa71) C:\WINDOWS\System32\browser.dll
15:11:26.0296 2600 Browser - ok
15:11:26.0328 2600 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
15:11:26.0328 2600 cbidf2k - ok
15:11:26.0343 2600 cd20xrnt - ok
15:11:26.0359 2600 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
15:11:26.0359 2600 Cdaudio - ok
15:11:26.0406 2600 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
15:11:26.0406 2600 Cdfs - ok
15:11:26.0437 2600 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
15:11:26.0437 2600 Cdrom - ok
15:11:26.0437 2600 Changer - ok
15:11:26.0468 2600 CiSvc (793ef38a5fd086c3c8e48a8a861562ed) C:\WINDOWS\system32\cisvc.exe
15:11:26.0468 2600 CiSvc - ok
15:11:26.0500 2600 ClipSrv (8b30cbb0c07d49b2658fb190946b0e7e) C:\WINDOWS\system32\clipsrv.exe
15:11:26.0500 2600 ClipSrv - ok
15:11:26.0531 2600 clr_optimization_v2.0.50727_32 (d87acaed61e417bba546ced5e7e36d9c) C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
15:11:26.0562 2600 clr_optimization_v2.0.50727_32 - ok
15:11:26.0578 2600 CmdIde - ok
15:11:26.0578 2600 COMSysApp - ok
15:11:26.0593 2600 Cpqarray - ok
15:11:26.0593 2600 cpuz135 - ok
15:11:26.0609 2600 CryptSvc (7a6d0b71035e123fdda2156a25578ad3) C:\WINDOWS\System32\cryptsvc.dll
15:11:26.0609 2600 CryptSvc - ok
15:11:26.0625 2600 dac2w2k - ok
15:11:26.0640 2600 dac960nt - ok
15:11:26.0671 2600 DcomLaunch (0203b1aad358f206cb0a3c1f93cce17a) C:\WINDOWS\system32\rpcss.dll
15:11:26.0671 2600 DcomLaunch - ok
15:11:26.0703 2600 Dhcp (318f535dc05551d96deeb90b6d6904de) C:\WINDOWS\System32\dhcpcsvc.dll
15:11:26.0703 2600 Dhcp - ok
15:11:26.0718 2600 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
15:11:26.0718 2600 Disk - ok
15:11:26.0718 2600 dmadmin - ok
15:11:26.0750 2600 dmboot (f5deadd42335fb33edca74ecb2f36cba) C:\WINDOWS\system32\drivers\dmboot.sys
15:11:26.0765 2600 dmboot - ok
15:11:26.0765 2600 dmio (5a7c47c9b3f9fb92a66410a7509f0c71) C:\WINDOWS\system32\drivers\dmio.sys
15:11:26.0765 2600 dmio - ok
15:11:26.0781 2600 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
15:11:26.0781 2600 dmload - ok
15:11:26.0796 2600 dmserver (6797c23d6b79935482d7f0e8ca5e5b67) C:\WINDOWS\System32\dmserver.dll
15:11:26.0796 2600 dmserver - ok
15:11:26.0828 2600 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
15:11:26.0828 2600 DMusic - ok
15:11:26.0859 2600 Dnscache (1a1e59377fb6cacd711cc5073c4a7d79) C:\WINDOWS\System32\dnsrslvr.dll
15:11:26.0859 2600 Dnscache - ok
15:11:26.0875 2600 Dot3svc (3fcf86f03d0302443c21ce6e5bbf7a25) C:\WINDOWS\System32\dot3svc.dll
15:11:26.0890 2600 Dot3svc - ok
15:11:26.0890 2600 dpti2o - ok
15:11:26.0906 2600 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
15:11:26.0906 2600 drmkaud - ok
15:11:26.0921 2600 EapHost (8b5fc9087d2cab110bc2ed5cc5e7b8ac) C:\WINDOWS\System32\eapsvc.dll
15:11:26.0921 2600 EapHost - ok
15:11:26.0937 2600 ERSvc (94f948cb12c4d35483f1e815deb16c7b) C:\WINDOWS\System32\ersvc.dll
15:11:26.0937 2600 ERSvc - ok
15:11:26.0953 2600 Eventlog (c3fb1d70cb88722267949694ba51759e) C:\WINDOWS\system32\services.exe
15:11:26.0953 2600 Eventlog - ok
15:11:26.0984 2600 EventSystem (ec16ae9b37eacf871629227a3f3913fd) C:\WINDOWS\system32\es.dll
15:11:27.0000 2600 EventSystem - ok
15:11:27.0015 2600 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
15:11:27.0015 2600 Fastfat - ok
15:11:27.0078 2600 FastUserSwitchingCompatibility (1b8542f338cdd86929a084a455837158) C:\WINDOWS\System32\shsvcs.dll
15:11:27.0078 2600 FastUserSwitchingCompatibility - ok
15:11:27.0093 2600 fbxusb (3cab16755639fa012d3e6bfe7ae005cd) C:\WINDOWS\system32\DRIVERS\fbxusb.sys
15:11:27.0093 2600 fbxusb - ok
15:11:27.0125 2600 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\DRIVERS\fdc.sys
15:11:27.0125 2600 Fdc - ok
15:11:27.0140 2600 Fips (31f923eb2170fc172c81abda0045d18c) C:\WINDOWS\system32\drivers\Fips.sys
15:11:27.0140 2600 Fips - ok
15:11:27.0171 2600 FLEXnet Licensing Service (227846995afeefa70d328bf5334a86a5) C:\Program Files\Fichiers communs\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
15:11:27.0234 2600 FLEXnet Licensing Service - ok
15:11:27.0234 2600 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\DRIVERS\flpydisk.sys
15:11:27.0234 2600 Flpydisk - ok
15:11:27.0250 2600 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\drivers\fltmgr.sys
15:11:27.0250 2600 FltMgr - ok
15:11:27.0281 2600 FontCache3.0.0.0 (8ba7c024070f2b7fdd98ed8a4ba41789) c:\WINDOWS\Microsoft.NET\Framework\v3.0\WPF\PresentationFontCache.exe
15:11:27.0281 2600 FontCache3.0.0.0 - ok
15:11:27.0296 2600 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
15:11:27.0296 2600 Fs_Rec - ok
15:11:27.0312 2600 Ftdisk (a86859b77b908c18c2657f284aa29fe3) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
15:11:27.0312 2600 Ftdisk - ok
15:11:27.0328 2600 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
15:11:27.0328 2600 Gpc - ok
15:11:27.0343 2600 HDAudBus (573c7d0a32852b48f3058cfd8026f511) C:\WINDOWS\system32\DRIVERS\HDAudBus.sys
15:11:27.0343 2600 HDAudBus - ok
15:11:27.0359 2600 helpsvc (1247f83b705af0e796330442f7967cf8) C:\WINDOWS\PCHealth\HelpCtr\Binaries\pchsvc.dll
15:11:27.0359 2600 helpsvc - ok
15:11:27.0359 2600 HidServ (a3b9b4a68bc839ce5a264d5908092261) C:\WINDOWS\System32\hidserv.dll
15:11:27.0359 2600 HidServ - ok
15:11:27.0390 2600 HidUsb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys
15:11:27.0390 2600 HidUsb - ok
15:11:27.0406 2600 hkmsvc (17b3c3d40cdba40c2e331d28be4de27f) C:\WINDOWS\System32\kmsvc.dll
15:11:27.0406 2600 hkmsvc - ok
15:11:27.0406 2600 hpn - ok
15:11:27.0437 2600 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys
15:11:27.0437 2600 HTTP - ok
15:11:27.0453 2600 HTTPFilter (bd31cface38d1800abdb43f4260af0d5) C:\WINDOWS\System32\w3ssl.dll
15:11:27.0453 2600 HTTPFilter - ok
15:11:27.0468 2600 i2omgmt - ok
15:11:27.0484 2600 i2omp - ok
15:11:27.0484 2600 i8042prt (a09bdc4ed10e3b2e0ec27bb94af32516) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
15:11:27.0484 2600 i8042prt - ok
15:11:27.0531 2600 idsvc (c01ac32dc5c03076cfb852cb5da5229c) c:\WINDOWS\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\infocard.exe
15:11:27.0546 2600 idsvc - ok
15:11:27.0562 2600 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys
15:11:27.0562 2600 Imapi - ok
15:11:27.0578 2600 ImapiService (c4221678bbaa55239c23632875759961) C:\WINDOWS\system32\imapi.exe
15:11:27.0593 2600 ImapiService - ok
15:11:27.0593 2600 ini910u - ok
15:11:27.0687 2600 IntcAzAudAddService (811b31e0e0ac7be484efbffc42afcbbe) C:\WINDOWS\system32\drivers\RtkHDAud.sys
15:11:27.0718 2600 IntcAzAudAddService - ok
15:11:27.0718 2600 IntelIde - ok
15:11:27.0734 2600 intelppm (ad340800c35a42d4de1641a37feea34c) C:\WINDOWS\system32\DRIVERS\intelppm.sys
15:11:27.0734 2600 intelppm - ok
15:11:27.0750 2600 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\drivers\ip6fw.sys
15:11:27.0750 2600 Ip6Fw - ok
15:11:27.0765 2600 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
15:11:27.0781 2600 IpFilterDriver - ok
15:11:27.0781 2600 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
15:11:27.0781 2600 IpInIp - ok
15:11:27.0796 2600 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
15:11:27.0796 2600 IpNat - ok
15:11:27.0796 2600 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
15:11:27.0796 2600 IPSec - ok
15:11:27.0812 2600 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
15:11:27.0812 2600 IRENUM - ok
15:11:27.0812 2600 isapnp (355836975a67b6554bca60328cd6cb74) C:\WINDOWS\system32\DRIVERS\isapnp.sys
15:11:27.0828 2600 isapnp - ok
15:11:27.0890 2600 JavaQuickStarterService (0a5709543986843d37a92290b7838340) C:\Program Files\Java\jre6\bin\jqs.exe
15:11:27.0890 2600 JavaQuickStarterService - ok
15:11:27.0906 2600 Kbdclass (16813155807c6881f4bfbf6657424659) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
15:11:27.0906 2600 Kbdclass - ok
15:11:27.0921 2600 kbdhid (94c59cb884ba010c063687c3a50dce8e) C:\WINDOWS\system32\DRIVERS\kbdhid.sys
15:11:27.0921 2600 kbdhid - ok
15:11:27.0937 2600 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
15:11:27.0937 2600 kmixer - ok
15:11:27.0953 2600 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys
15:11:27.0953 2600 KSecDD - ok
15:11:27.0984 2600 lanmanserver (1db8078a32e03ac8f5eb5e6dcac2aa34) C:\WINDOWS\System32\srvsvc.dll
15:11:27.0984 2600 lanmanserver - ok
15:11:28.0015 2600 lanmanworkstation (ad54ead46d92f413be189aabc1c59490) C:\WINDOWS\System32\wkssvc.dll
15:11:28.0015 2600 lanmanworkstation - ok
15:11:28.0015 2600 Lbd - ok
15:11:28.0031 2600 lbrtfdc - ok
15:11:28.0046 2600 License Management Service ESD (1877be12c45fc66614a295d74eeea56c) C:\Program Files\Fichiers communs\element5 Shared\Service\Licence Manager ESD.exe
15:11:28.0062 2600 License Management Service ESD - ok
15:11:28.0078 2600 LmHosts (0f357c079ac529a844ab5b18e4eef881) C:\WINDOWS\System32\lmhsvc.dll
15:11:28.0078 2600 LmHosts - ok
15:11:28.0093 2600 Messenger (e67a66a3781c1a483f0f8992664cbe0d) C:\WINDOWS\System32\msgsvc.dll
15:11:28.0093 2600 Messenger - ok
15:11:28.0109 2600 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
15:11:28.0109 2600 mnmdd - ok
15:11:28.0140 2600 mnmsrvc (d3a2870cd96cda7bcff3dc54f64087ad) C:\WINDOWS\system32\mnmsrvc.exe
15:11:28.0140 2600 mnmsrvc - ok
15:11:28.0156 2600 Modem (510ade9327fe84c10254e1902697e25f) C:\WINDOWS\system32\drivers\Modem.sys
15:11:28.0156 2600 Modem - ok
15:11:28.0171 2600 Mouclass (027c01bd7ef3349aaebc883d8a799efb) C:\WINDOWS\system32\DRIVERS\mouclass.sys
15:11:28.0171 2600 Mouclass - ok
15:11:28.0203 2600 mouhid (124d6846040c79b9c997f78ef4b2a4e5) C:\WINDOWS\system32\DRIVERS\mouhid.sys
15:11:28.0203 2600 mouhid - ok
15:11:28.0218 2600 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
15:11:28.0218 2600 MountMgr - ok
15:11:28.0234 2600 mraid35x - ok
15:11:28.0250 2600 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
15:11:28.0250 2600 MRxDAV - ok
15:11:28.0265 2600 MRxSmb (7d304a5eb4344ebeeab53a2fe3ffb9f0) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
15:11:28.0265 2600 MRxSmb - ok
15:11:28.0296 2600 MSDTC (8648d670ae0d95c95e7bbb5b80661796) C:\WINDOWS\system32\msdtc.exe
15:11:28.0296 2600 MSDTC - ok
15:11:28.0312 2600 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
15:11:28.0312 2600 Msfs - ok
15:11:28.0312 2600 MSIServer - ok
15:11:28.0328 2600 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
15:11:28.0328 2600 MSKSSRV - ok
15:11:28.0359 2600 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
15:11:28.0359 2600 MSPCLOCK - ok
15:11:28.0375 2600 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
15:11:28.0375 2600 MSPQM - ok
15:11:28.0390 2600 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
15:11:28.0390 2600 mssmbios - ok
15:11:28.0406 2600 MTsensor (d48659bb24c48345d926ecb45c1ebdf5) C:\WINDOWS\system32\DRIVERS\ASACPI.sys
15:11:28.0406 2600 MTsensor - ok
15:11:28.0421 2600 Mup (de6a75f5c270e756c5508d94b6cf68f5) C:\WINDOWS\system32\drivers\Mup.sys
15:11:28.0421 2600 Mup - ok
15:11:28.0453 2600 napagent (69e4fbbabaeee1bff422e091da3171da) C:\WINDOWS\System32\qagentrt.dll
15:11:28.0453 2600 napagent - ok
15:11:28.0468 2600 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
15:11:28.0468 2600 NDIS - ok
15:11:28.0484 2600 NdisTapi (0109c4f3850dfbab279542515386ae22) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
15:11:28.0484 2600 NdisTapi - ok
15:11:28.0500 2600 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
15:11:28.0500 2600 Ndisuio - ok
15:11:28.0515 2600 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
15:11:28.0515 2600 NdisWan - ok
15:11:28.0531 2600 NDProxy (9282bd12dfb069d3889eb3fcc1000a9b) C:\WINDOWS\system32\drivers\NDProxy.sys
15:11:28.0531 2600 NDProxy - ok
15:11:28.0546 2600 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys
15:11:28.0546 2600 NetBIOS - ok
15:11:28.0562 2600 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys
15:11:28.0562 2600 NetBT - ok
15:11:28.0593 2600 NetDDE (5c9b1d83755b36237b70f95df3d46a52) C:\WINDOWS\system32\netdde.exe
15:11:28.0593 2600 NetDDE - ok
15:11:28.0609 2600 NetDDEdsdm (5c9b1d83755b36237b70f95df3d46a52) C:\WINDOWS\system32\netdde.exe
15:11:28.0609 2600 NetDDEdsdm - ok
15:11:28.0625 2600 Netlogon (91e6024d6d4dcdecdb36c43ecf9bbecb) C:\WINDOWS\system32\lsass.exe
15:11:28.0625 2600 Netlogon - ok
15:11:28.0656 2600 Netman (be0cb143fa427d93440ded18db8c918b) C:\WINDOWS\System32\netman.dll
15:11:28.0656 2600 Netman - ok
15:11:28.0703 2600 NetTcpPortSharing (d34612c5d02d026535b3095d620626ae) c:\WINDOWS\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\SMSvcHost.exe
15:11:28.0703 2600 NetTcpPortSharing - ok
15:11:28.0703 2600 NIC1394 (e9e47cfb2d461fa0fc75b7a74c6383ea) C:\WINDOWS\system32\DRIVERS\nic1394.sys
15:11:28.0703 2600 NIC1394 - ok
15:11:28.0734 2600 Nla (6f5f546a92c7b6ae45db1d6910781eb0) C:\WINDOWS\System32\mswsock.dll
15:11:28.0734 2600 Nla - ok
15:11:28.0765 2600 NMIndexingService (a328a46d87bb92ce4d8a4528e9d84787) C:\Program Files\Fichiers communs\Ahead\Lib\NMIndexingService.exe
15:11:28.0781 2600 NMIndexingService - ok
15:11:28.0781 2600 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
15:11:28.0781 2600 Npfs - ok
15:11:28.0812 2600 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
15:11:28.0812 2600 Ntfs - ok
15:11:28.0828 2600 NtLmSsp (91e6024d6d4dcdecdb36c43ecf9bbecb) C:\WINDOWS\system32\lsass.exe
15:11:28.0828 2600 NtLmSsp - ok
15:11:28.0859 2600 NtmsSvc (037d92b3a7853a183fcab77fb1d13d6c) C:\WINDOWS\system32\ntmssvc.dll
15:11:28.0859 2600 NtmsSvc - ok
15:11:28.0859 2600 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
15:11:28.0859 2600 Null - ok
15:11:29.0000 2600 nv (9f4384aa43548ddd438f7b7825d11699) C:\WINDOWS\system32\DRIVERS\nv4_mini.sys
15:11:29.0031 2600 nv - ok
15:11:29.0046 2600 NVSvc (0c41c4acfe00d826db479c40c1d9edc8) C:\WINDOWS\system32\nvsvc32.exe
15:11:29.0046 2600 NVSvc - ok
15:11:29.0062 2600 NWCWorkstation (b0401126f3b7748ee795097024787534) C:\WINDOWS\System32\nwwks.dll
15:11:29.0078 2600 NWCWorkstation - ok
15:11:29.0093 2600 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
15:11:29.0093 2600 NwlnkFlt - ok
15:11:29.0109 2600 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
15:11:29.0125 2600 NwlnkFwd - ok
15:11:29.0140 2600 NwlnkIpx (8b8b1be2dba4025da6786c645f77f123) C:\WINDOWS\system32\DRIVERS\nwlnkipx.sys
15:11:29.0140 2600 NwlnkIpx - ok
15:11:29.0140 2600 NwlnkNb (56d34a67c05e94e16377c60609741ff8) C:\WINDOWS\system32\DRIVERS\nwlnknb.sys
15:11:29.0140 2600 NwlnkNb - ok
15:11:29.0171 2600 NwlnkSpx (c0bb7d1615e1acbdc99757f6ceaf8cf0) C:\WINDOWS\system32\DRIVERS\nwlnkspx.sys
15:11:29.0171 2600 NwlnkSpx - ok
15:11:29.0171 2600 NWRDR (36b9b950e3d2e100970a48d8bad86740) C:\WINDOWS\system32\DRIVERS\nwrdr.sys
15:11:29.0171 2600 NWRDR - ok
15:11:29.0187 2600 ohci1394 (ca33832df41afb202ee7aeb05145922f) C:\WINDOWS\system32\DRIVERS\ohci1394.sys
15:11:29.0187 2600 ohci1394 - ok
15:11:29.0203 2600 Parport (8fd0bdbea875d06ccf6c945ca9abaf75) C:\WINDOWS\system32\drivers\Parport.sys
15:11:29.0203 2600 Parport - ok
15:11:29.0218 2600 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
15:11:29.0218 2600 PartMgr - ok
15:11:29.0234 2600 ParVdm (9575c5630db8fb804649a6959737154c) C:\WINDOWS\system32\drivers\ParVdm.sys
15:11:29.0234 2600 ParVdm - ok
15:11:29.0265 2600 PCI (043410877bda580c528f45165f7125bc) C:\WINDOWS\system32\DRIVERS\pci.sys
15:11:29.0265 2600 PCI - ok
15:11:29.0281 2600 PCIDump - ok
15:11:29.0281 2600 PCIIde (f4bfde7209c14a07aaa61e4d6ae69eac) C:\WINDOWS\system32\DRIVERS\pciide.sys
15:11:29.0296 2600 PCIIde - ok
15:11:29.0296 2600 Pcmcia (f0406cbc60bdb0394a0e17ffb04cdd3d) C:\WINDOWS\system32\drivers\Pcmcia.sys
15:11:29.0296 2600 Pcmcia - ok
15:11:29.0312 2600 PDCOMP - ok
15:11:29.0312 2600 PDFRAME - ok
15:11:29.0328 2600 PDRELI - ok
15:11:29.0343 2600 PDRFRAME - ok
15:11:29.0343 2600 perc2 - ok
15:11:29.0359 2600 perc2hib - ok
15:11:29.0375 2600 pfc (f2b3785d7282bac66d4b644fc88749f0) C:\WINDOWS\system32\drivers\pfc.sys
15:11:29.0375 2600 pfc - ok
15:11:29.0406 2600 PlugPlay (c3fb1d70cb88722267949694ba51759e) C:\WINDOWS\system32\services.exe
15:11:29.0406 2600 PlugPlay - ok
15:11:29.0406 2600 PolicyAgent (91e6024d6d4dcdecdb36c43ecf9bbecb) C:\WINDOWS\system32\lsass.exe
15:11:29.0406 2600 PolicyAgent - ok
15:11:29.0421 2600 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
15:11:29.0421 2600 PptpMiniport - ok
15:11:29.0437 2600 ProtectedStorage (91e6024d6d4dcdecdb36c43ecf9bbecb) C:\WINDOWS\system32\lsass.exe
15:11:29.0437 2600 ProtectedStorage - ok
15:11:29.0453 2600 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
15:11:29.0453 2600 PSched - ok
15:11:29.0453 2600 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
15:11:29.0453 2600 Ptilink - ok
15:11:29.0468 2600 ql1080 - ok
15:11:29.0468 2600 Ql10wnt - ok
15:11:29.0484 2600 ql12160 - ok
15:11:29.0500 2600 ql1240 - ok
15:11:29.0500 2600 ql1280 - ok
15:11:29.0515 2600 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
15:11:29.0515 2600 RasAcd - ok
15:11:29.0531 2600 RasAuto (78da9ccdac683ef5aa87d1c919f6d221) C:\WINDOWS\System32\rasauto.dll
15:11:29.0531 2600 RasAuto - ok
15:11:29.0546 2600 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
15:11:29.0546 2600 Rasl2tp - ok
15:11:29.0578 2600 RasMan (0a48df90b4784f9b90a2671af992c914) C:\WINDOWS\System32\rasmans.dll
15:11:29.0578 2600 RasMan - ok
15:11:29.0593 2600 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
15:11:29.0593 2600 RasPppoe - ok
15:11:29.0593 2600 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
15:11:29.0593 2600 Raspti - ok
15:11:29.0625 2600 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
15:11:29.0625 2600 Rdbss - ok
15:11:29.0625 2600 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
15:11:29.0625 2600 RDPCDD - ok
15:11:29.0640 2600 rdpdr (15cabd0f7c00c47c70124907916af3f1) C:\WINDOWS\system32\DRIVERS\rdpdr.sys
15:11:29.0640 2600 rdpdr - ok
15:11:29.0671 2600 RDPWD (5b3055daa788bd688594d2f5981f2a83) C:\WINDOWS\system32\drivers\RDPWD.sys
15:11:29.0671 2600 RDPWD - ok
15:11:29.0703 2600 RDSessMgr (9f63d9c5b238ed1c375d417eff3d5be7) C:\WINDOWS\system32\sessmgr.exe
15:11:29.0703 2600 RDSessMgr - ok
15:11:29.0718 2600 redbook (d8eb2a7904db6c916eb5361878ddcbae) C:\WINDOWS\system32\DRIVERS\redbook.sys
15:11:29.0718 2600 redbook - ok
15:11:29.0765 2600 RemoteAccess (7da370c31673c99497bd07068ee6e354) C:\WINDOWS\System32\mprdim.dll
15:11:29.0781 2600 RemoteAccess - ok
15:11:29.0812 2600 RemoteRegistry (e598d81197e2e0ec42a0c55772bb00e8) C:\WINDOWS\system32\regsvc.dll
15:11:29.0812 2600 RemoteRegistry - ok
15:11:29.0843 2600 RpcLocator (499c59a2584f6d4ea41e944da571d993) C:\WINDOWS\system32\locator.exe
15:11:29.0843 2600 RpcLocator - ok
15:11:29.0875 2600 RpcSs (0203b1aad358f206cb0a3c1f93cce17a) C:\WINDOWS\system32\rpcss.dll
15:11:29.0875 2600 RpcSs - ok
15:11:29.0921 2600 RSVP (414964844f4793acb868d057e8ed997e) C:\WINDOWS\system32\rsvp.exe
15:11:29.0921 2600 RSVP - ok
15:11:29.0937 2600 SamSs (91e6024d6d4dcdecdb36c43ecf9bbecb) C:\WINDOWS\system32\lsass.exe
15:11:29.0937 2600 SamSs - ok
15:11:29.0953 2600 SCardSvr (67949cc8a865296c1333c96a4e1a2d66) C:\WINDOWS\System32\SCardSvr.exe
15:11:29.0953 2600 SCardSvr - ok
15:11:30.0015 2600 Schedule (55f5c5c1be1a78e285033e432ba01597) C:\WINDOWS\system32\schedsvc.dll
15:11:30.0015 2600 Schedule - ok
15:11:30.0046 2600 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
15:11:30.0046 2600 Secdrv - ok
15:11:30.0046 2600 seclogon (5ac311c0af2af5ec221670bb8dc479d3) C:\WINDOWS\System32\seclogon.dll
15:11:30.0046 2600 seclogon - ok
15:11:30.0062 2600 SENS (3531366f38f453d08fe72e7b32dfe786) C:\WINDOWS\system32\sens.dll
15:11:30.0062 2600 SENS - ok
15:11:30.0093 2600 Sentinel (8627c992b8a80504fc477b2e8ff8ec4f) C:\WINDOWS\System32\Drivers\SENTINEL.SYS
15:11:30.0093 2600 Sentinel - ok
15:11:30.0093 2600 serenum (0f29512ccd6bead730039fb4bd2c85ce) C:\WINDOWS\system32\DRIVERS\serenum.sys
15:11:30.0093 2600 serenum - ok
15:11:30.0125 2600 Serial (93d313c31f7ad9ea2b75f26075413c7c) C:\WINDOWS\system32\DRIVERS\serial.sys
15:11:30.0125 2600 Serial - ok
15:11:30.0140 2600 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys
15:11:30.0140 2600 Sfloppy - ok
15:11:30.0171 2600 SharedAccess (f4ce708a7d17a625de6c0fd746d50e88) C:\WINDOWS\System32\ipnathlp.dll
15:11:30.0171 2600 SharedAccess - ok
15:11:30.0203 2600 ShellHWDetection (1b8542f338cdd86929a084a455837158) C:\WINDOWS\System32\shsvcs.dll
15:11:30.0203 2600 ShellHWDetection - ok
15:11:30.0203 2600 Simbad - ok
15:11:30.0250 2600 SNTNLUSB (87f799c486302aceff098e067d481d9c) C:\WINDOWS\system32\DRIVERS\SNTNLUSB.SYS
15:11:30.0250 2600 SNTNLUSB - ok
15:11:30.0265 2600 Sparrow - ok
15:11:30.0296 2600 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
15:11:30.0296 2600 splitter - ok
15:11:30.0312 2600 Spooler (60784f891563fb1b767f70117fc2428f) C:\WINDOWS\system32\spoolsv.exe
15:11:30.0312 2600 Spooler - ok
15:11:30.0343 2600 sptd (7f1b7c4d446cd3f926af45b8c48bd593) C:\WINDOWS\system32\Drivers\sptd.sys
15:11:30.0343 2600 Suspicious file (NoAccess): C:\WINDOWS\system32\Drivers\sptd.sys. md5: 7f1b7c4d446cd3f926af45b8c48bd593
15:11:30.0343 2600 sptd ( LockedFile.Multi.Generic ) - warning
15:11:30.0343 2600 sptd - detected LockedFile.Multi.Generic (1)
15:11:30.0359 2600 sr (39626e6dc1fb39434ec40c42722b660a) C:\WINDOWS\system32\DRIVERS\sr.sys
15:11:30.0359 2600 sr - ok
15:11:30.0375 2600 srservice (6ed29124a1c83bd0cf6b26bd01ca6f6f) C:\WINDOWS\system32\srsvc.dll
15:11:30.0375 2600 srservice - ok
15:11:30.0406 2600 Srv (47ddfc2f003f7f9f0592c6874962a2e7) C:\WINDOWS\system32\DRIVERS\srv.sys
15:11:30.0406 2600 Srv - ok
15:11:30.0421 2600 SSDPSRV (ea9e0db8684cef2fd3badd671df5a112) C:\WINDOWS\System32\ssdpsrv.dll
15:11:30.0421 2600 SSDPSRV - ok
15:11:30.0453 2600 ssmdrv (a36ee93698802cd899f98bfd553d8185) C:\WINDOWS\system32\DRIVERS\ssmdrv.sys
15:11:30.0453 2600 ssmdrv - ok
15:11:30.0468 2600 stisvc (d76b0e8a4ecad1adcc75fd14a7acc54c) C:\WINDOWS\system32\wiaservc.dll
15:11:30.0484 2600 stisvc - ok
15:11:30.0500 2600 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
15:11:30.0500 2600 swenum - ok
15:11:30.0515 2600 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
15:11:30.0515 2600 swmidi - ok
15:11:30.0515 2600 SwPrv - ok
15:11:30.0531 2600 symc810 - ok
15:11:30.0531 2600 symc8xx - ok
15:11:30.0546 2600 sym_hi - ok
15:11:30.0562 2600 sym_u3 - ok
15:11:30.0562 2600 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
15:11:30.0562 2600 sysaudio - ok
15:11:30.0578 2600 SysmonLog (0899061318a6b1d9596aabfc77f45e44) C:\WINDOWS\system32\smlogsvc.exe
15:11:30.0578 2600 SysmonLog - ok
15:11:30.0609 2600 tap0901 (e5690ea1ba99fe057491c1510a29e066) C:\WINDOWS\system32\DRIVERS\tap0901.sys
15:11:30.0609 2600 tap0901 - ok
15:11:30.0625 2600 TapiSrv (8e5231171ad6595ff002e848cc54fcd7) C:\WINDOWS\System32\tapisrv.dll
15:11:30.0625 2600 TapiSrv - ok
15:11:30.0656 2600 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
15:11:30.0656 2600 Tcpip - ok
15:11:30.0687 2600 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
15:11:30.0687 2600 TDPIPE - ok
15:11:30.0703 2600 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
15:11:30.0703 2600 TDTCP - ok
15:11:30.0718 2600 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
15:11:30.0718 2600 TermDD - ok
15:11:30.0734 2600 TermService (710bc85a8c22626ee094439e3ea0d38c) C:\WINDOWS\System32\termsrv.dll
15:11:30.0734 2600 TermService - ok
15:11:30.0765 2600 Themes (1b8542f338cdd86929a084a455837158) C:\WINDOWS\System32\shsvcs.dll
15:11:30.0765 2600 Themes - ok
15:11:30.0781 2600 tlbhur - ok
15:11:30.0812 2600 TlntSvr (d859a9d2f026ce5804485068ffd6eaf2) C:\WINDOWS\system32\tlntsvr.exe
15:11:30.0812 2600 TlntSvr - ok
15:11:30.0828 2600 TosIde - ok
15:11:30.0843 2600 TrkWks (e1a84a5067627407a53c2c4f8d8a1d2e) C:\WINDOWS\system32\trkwks.dll
15:11:30.0843 2600 TrkWks - ok
15:11:30.0859 2600 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
15:11:30.0859 2600 Udfs - ok
15:11:30.0859 2600 ultra - ok
15:11:30.0906 2600 UMWdf (c81b8635dee0d3ef5f64b3dd643023a5) C:\WINDOWS\system32\wdfmgr.exe
15:11:30.0906 2600 UMWdf - ok
15:11:30.0937 2600 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
15:11:30.0937 2600 Update - ok
15:11:30.0953 2600 upnphost (bd8166a495b02308f364b36249475f22) C:\WINDOWS\System32\upnphost.dll
15:11:30.0953 2600 upnphost - ok
15:11:30.0968 2600 UPS (1edc93d7bd731b5ca6248ae245099b60) C:\WINDOWS\System32\ups.exe
15:11:30.0968 2600 UPS - ok
15:11:31.0000 2600 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
15:11:31.0000 2600 usbccgp - ok
15:11:31.0031 2600 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
15:11:31.0031 2600 usbehci - ok
15:11:31.0046 2600 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
15:11:31.0046 2600 usbhub - ok
15:11:31.0062 2600 usbprint (a717c8721046828520c9edf31288fc00) C:\WINDOWS\system32\DRIVERS\usbprint.sys
15:11:31.0062 2600 usbprint - ok
15:11:31.0078 2600 usbscan (a0b8cf9deb1184fbdd20784a58fa75d4) C:\WINDOWS\system32\DRIVERS\usbscan.sys
15:11:31.0078 2600 usbscan - ok
15:11:31.0109 2600 USBSTOR (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
15:11:31.0109 2600 USBSTOR - ok
15:11:31.0125 2600 usbuhci (26496f9dee2d787fc3e61ad54821ffe6) C:\WINDOWS\system32\DRIVERS\usbuhci.sys
15:11:31.0125 2600 usbuhci - ok
15:11:31.0140 2600 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
15:11:31.0140 2600 VgaSave - ok
15:11:31.0140 2600 ViaIde - ok
15:11:31.0156 2600 VolSnap (46de1126684369bace4849e4fc8c43ca) C:\WINDOWS\system32\drivers\VolSnap.sys
15:11:31.0156 2600 VolSnap - ok
15:11:31.0187 2600 VSS (5a4da252b2c0550ab83d129c02cf6c19) C:\WINDOWS\System32\vssvc.exe
15:11:31.0203 2600 VSS - ok
15:11:31.0250 2600 W32Time (c1f726ee0b043b074a68992bc4aef8fd) C:\WINDOWS\system32\w32time.dll
15:11:31.0250 2600 W32Time - ok
15:11:31.0265 2600 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
15:11:31.0265 2600 Wanarp - ok
15:11:31.0265 2600 WDICA - ok
15:11:31.0281 2600 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
15:11:31.0281 2600 wdmaud - ok
15:11:31.0296 2600 WebClient (714670e64fbe6d28d99871ed9a52a334) C:\WINDOWS\System32\webclnt.dll
15:11:31.0296 2600 WebClient - ok
15:11:31.0328 2600 winmgmt (5e9deae9980ff34bcd6dde2e9e2bf911) C:\WINDOWS\system32\wbem\WMIsvc.dll
15:11:31.0328 2600 winmgmt - ok
15:11:31.0375 2600 WmdmPmSN (a477391b7a8b0a0daabadb17cf533a4b) C:\WINDOWS\system32\mspmsnsv.dll
15:11:31.0375 2600 WmdmPmSN - ok
15:11:31.0421 2600 Wmi (31c1fd0bbdc5b81c21edba4331edae55) C:\WINDOWS\System32\advapi32.dll
15:11:31.0437 2600 Wmi - ok
15:11:31.0453 2600 WmiApSrv (4e8e8a58f56b25d0795f484e5eb7f898) C:\WINDOWS\system32\wbem\wmiapsrv.exe
15:11:31.0453 2600 WmiApSrv - ok
15:11:31.0468 2600 WpdUsb (c1b3d9d75c3fb735f5fa3a5806aded57) C:\WINDOWS\system32\Drivers\wpdusb.sys
15:11:31.0468 2600 WpdUsb - ok
15:11:31.0484 2600 wscsvc (c1fd85db4a80a98d60ecb7a828e77fe0) C:\WINDOWS\system32\wscsvc.dll
15:11:31.0500 2600 wscsvc - ok
15:11:31.0500 2600 wuauserv (75d6c5c3d2c93b1f9931e5dfb693ae2a) C:\WINDOWS\system32\wuauserv.dll
15:11:31.0500 2600 wuauserv - ok
15:11:31.0531 2600 WZCSVC (c336e54ee0c291a02f004667db1e66cb) C:\WINDOWS\System32\wzcsvc.dll
15:11:31.0531 2600 WZCSVC - ok
15:11:31.0546 2600 xcpip - ok
15:11:31.0562 2600 xmlprov (f92a87fdda0c11c8604fbc2b864fa726) C:\WINDOWS\System32\xmlprov.dll
15:11:31.0562 2600 xmlprov - ok
15:11:31.0578 2600 xpsec - ok
15:11:31.0609 2600 yukonwxp (4322c32ced8c4772e039616dcbf01d3f) C:\WINDOWS\system32\DRIVERS\yk51x86.sys
15:11:31.0609 2600 yukonwxp - ok
15:11:31.0625 2600 MBR (0x1B8) (15aafd37c107618af1959f794586cc4d) \Device\Harddisk0\DR0
15:11:31.0625 2600 \Device\Harddisk0\DR0 ( Rootkit.Boot.Sinowal.b ) - infected
15:11:31.0625 2600 \Device\Harddisk0\DR0 - detected Rootkit.Boot.Sinowal.b (0)
15:11:31.0625 2600 Boot (0x1200) (ca36edf34c8232edebf3f27a8bf953de) \Device\Harddisk0\DR0\Partition0
15:11:31.0625 2600 \Device\Harddisk0\DR0\Partition0 - ok
15:11:31.0625 2600 ============================================================
15:11:31.0625 2600 Scan finished
15:11:31.0625 2600 ============================================================
15:11:31.0625 0428 Detected object count: 2
15:11:31.0625 0428 Actual detected object count: 2
15:12:15.0171 0428 sptd ( LockedFile.Multi.Generic ) - skipped by user
15:12:15.0171 0428 sptd ( LockedFile.Multi.Generic ) - User select action: Skip
15:12:15.0453 0428 \Device\Harddisk0\DR0\# - copied to quarantine
15:12:15.0453 0428 \Device\Harddisk0\DR0 - copied to quarantine
15:12:15.0484 0428 \Device\Harddisk0\DR0 ( Rootkit.Boot.Sinowal.b ) - will be cured on reboot
15:12:15.0546 0428 \Device\Harddisk0\DR0 - ok
15:12:15.0546 0428 \Device\Harddisk0\DR0 ( Rootkit.Boot.Sinowal.b ) - User select action: Cure
15:12:30.0656 1520 Deinitialize success
Voici le rapport de TDSSKiller
15:11:09.0671 1228 TDSS rootkit removing tool 2.7.31.0 Apr 20 2012 19:49:47
15:11:10.0187 1228 ============================================================
15:11:10.0187 1228 Current date / time: 2012/04/23 15:11:10.0187
15:11:10.0187 1228 SystemInfo:
15:11:10.0187 1228
15:11:10.0187 1228 OS Version: 5.1.2600 ServicePack: 3.0
15:11:10.0187 1228 Product type: Workstation
15:11:10.0187 1228 ComputerName: POUIC
15:11:10.0187 1228 UserName: Truc
15:11:10.0187 1228 Windows directory: C:\WINDOWS
15:11:10.0187 1228 System windows directory: C:\WINDOWS
15:11:10.0187 1228 Processor architecture: Intel x86
15:11:10.0187 1228 Number of processors: 4
15:11:10.0187 1228 Page size: 0x1000
15:11:10.0187 1228 Boot type: Normal boot
15:11:10.0187 1228 ============================================================
15:11:11.0906 1228 Drive \Device\Harddisk0\DR0 - Size: 0x7470C06000 (465.76 Gb), SectorSize: 0x200, Cylinders: 0xED81, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'K0', Flags 0x00000054
15:11:11.0906 1228 \Device\Harddisk0\DR0:
15:11:11.0921 1228 MBR partitions:
15:11:11.0921 1228 \Device\Harddisk0\DR0\Partition0: MBR, Type 0x7, StartLBA 0x3F, BlocksNum 0x3A380D41
15:11:11.0937 1228 C: <-> \Device\Harddisk0\DR0\Partition0
15:11:11.0937 1228 Initialize success
15:11:11.0937 1228 ============================================================
15:11:24.0781 2600 ============================================================
15:11:24.0781 2600 Scan started
15:11:24.0781 2600 Mode: Manual;
15:11:24.0781 2600 ============================================================
15:11:25.0265 2600 Abiosdsk - ok
15:11:25.0281 2600 abp480n5 - ok
15:11:25.0312 2600 ACPI (e5e6dbfc41ea8aad005cb9a57a96b43b) C:\WINDOWS\system32\DRIVERS\ACPI.sys
15:11:25.0312 2600 ACPI - ok
15:11:25.0343 2600 ACPIEC (e4abc1212b70bb03d35e60681c447210) C:\WINDOWS\system32\drivers\ACPIEC.sys
15:11:25.0343 2600 ACPIEC - ok
15:11:25.0343 2600 adpu160m - ok
15:11:25.0359 2600 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
15:11:25.0359 2600 aec - ok
15:11:25.0390 2600 AFD (1e44bc1e83d8fd2305f8d452db109cf9) C:\WINDOWS\System32\drivers\afd.sys
15:11:25.0406 2600 AFD - ok
15:11:25.0406 2600 Aha154x - ok
15:11:25.0421 2600 aic78u2 - ok
15:11:25.0421 2600 aic78xx - ok
15:11:25.0453 2600 Alerter (758fdc60d41716ef889d849989b4b1cd) C:\WINDOWS\system32\alrsvc.dll
15:11:25.0453 2600 Alerter - ok
15:11:25.0468 2600 ALG (5e9a6658a2a69ae7eb195113b7a2e7a9) C:\WINDOWS\System32\alg.exe
15:11:25.0468 2600 ALG - ok
15:11:25.0484 2600 AliIde - ok
15:11:25.0500 2600 amsint - ok
15:11:25.0718 2600 AntiVirSchedulerService (27c9a4e1ef31c7a64de8fbc0aa568503) C:\Program Files\Avira\AntiVir Desktop\sched.exe
15:11:25.0718 2600 AntiVirSchedulerService - ok
15:11:25.0781 2600 AntiVirService (e491888d529410d7bd8fbbad825795c8) C:\Program Files\Avira\AntiVir Desktop\avguard.exe
15:11:25.0781 2600 AntiVirService - ok
15:11:25.0812 2600 AppMgmt (f36c9f78fc902c8dce4d3b576bb0435a) C:\WINDOWS\System32\appmgmts.dll
15:11:25.0812 2600 AppMgmt - ok
15:11:25.0828 2600 Arp1394 (b5b8a80875c1dededa8b02765642c32f) C:\WINDOWS\system32\DRIVERS\arp1394.sys
15:11:25.0828 2600 Arp1394 - ok
15:11:25.0828 2600 asc - ok
15:11:25.0843 2600 asc3350p - ok
15:11:25.0859 2600 asc3550 - ok
15:11:25.0890 2600 aspnet_state (0e5e4957549056e2bf2c49f4f6b601ad) C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\aspnet_state.exe
15:11:25.0906 2600 aspnet_state - ok
15:11:25.0921 2600 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
15:11:25.0921 2600 AsyncMac - ok
15:11:25.0937 2600 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys
15:11:25.0937 2600 atapi - ok
15:11:25.0937 2600 Atdisk - ok
15:11:25.0968 2600 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
15:11:25.0968 2600 Atmarpc - ok
15:11:26.0000 2600 AudioSrv (b4005aef7873144634765b570dac466e) C:\WINDOWS\System32\audiosrv.dll
15:11:26.0000 2600 AudioSrv - ok
15:11:26.0031 2600 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
15:11:26.0031 2600 audstub - ok
15:11:26.0046 2600 avgntflt (7713e4eb0276702faa08e52a6e23f2a6) C:\WINDOWS\system32\DRIVERS\avgntflt.sys
15:11:26.0046 2600 avgntflt - ok
15:11:26.0078 2600 avipbb (13b02b9b969dde270cd7c351203dad3c) C:\WINDOWS\system32\DRIVERS\avipbb.sys
15:11:26.0078 2600 avipbb - ok
15:11:26.0093 2600 avkmgr (271cfd1a989209b1964e24d969552bf7) C:\WINDOWS\system32\DRIVERS\avkmgr.sys
15:11:26.0093 2600 avkmgr - ok
15:11:26.0125 2600 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
15:11:26.0125 2600 Beep - ok
15:11:26.0156 2600 BITS (baa0b6e647c1ad593e9bae5cc31bcffb) C:\WINDOWS\system32\qmgr.dll
15:11:26.0187 2600 BITS - ok
15:11:26.0250 2600 Bonjour Service (f832f1505ad8b83474bd9a5b1b985e01) C:\Program Files\Bonjour\mDNSResponder.exe
15:11:26.0250 2600 Bonjour Service - ok
15:11:26.0296 2600 Browser (06b54a7b1ef7cb16bfd0e208d343fa71) C:\WINDOWS\System32\browser.dll
15:11:26.0296 2600 Browser - ok
15:11:26.0328 2600 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
15:11:26.0328 2600 cbidf2k - ok
15:11:26.0343 2600 cd20xrnt - ok
15:11:26.0359 2600 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
15:11:26.0359 2600 Cdaudio - ok
15:11:26.0406 2600 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
15:11:26.0406 2600 Cdfs - ok
15:11:26.0437 2600 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
15:11:26.0437 2600 Cdrom - ok
15:11:26.0437 2600 Changer - ok
15:11:26.0468 2600 CiSvc (793ef38a5fd086c3c8e48a8a861562ed) C:\WINDOWS\system32\cisvc.exe
15:11:26.0468 2600 CiSvc - ok
15:11:26.0500 2600 ClipSrv (8b30cbb0c07d49b2658fb190946b0e7e) C:\WINDOWS\system32\clipsrv.exe
15:11:26.0500 2600 ClipSrv - ok
15:11:26.0531 2600 clr_optimization_v2.0.50727_32 (d87acaed61e417bba546ced5e7e36d9c) C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
15:11:26.0562 2600 clr_optimization_v2.0.50727_32 - ok
15:11:26.0578 2600 CmdIde - ok
15:11:26.0578 2600 COMSysApp - ok
15:11:26.0593 2600 Cpqarray - ok
15:11:26.0593 2600 cpuz135 - ok
15:11:26.0609 2600 CryptSvc (7a6d0b71035e123fdda2156a25578ad3) C:\WINDOWS\System32\cryptsvc.dll
15:11:26.0609 2600 CryptSvc - ok
15:11:26.0625 2600 dac2w2k - ok
15:11:26.0640 2600 dac960nt - ok
15:11:26.0671 2600 DcomLaunch (0203b1aad358f206cb0a3c1f93cce17a) C:\WINDOWS\system32\rpcss.dll
15:11:26.0671 2600 DcomLaunch - ok
15:11:26.0703 2600 Dhcp (318f535dc05551d96deeb90b6d6904de) C:\WINDOWS\System32\dhcpcsvc.dll
15:11:26.0703 2600 Dhcp - ok
15:11:26.0718 2600 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
15:11:26.0718 2600 Disk - ok
15:11:26.0718 2600 dmadmin - ok
15:11:26.0750 2600 dmboot (f5deadd42335fb33edca74ecb2f36cba) C:\WINDOWS\system32\drivers\dmboot.sys
15:11:26.0765 2600 dmboot - ok
15:11:26.0765 2600 dmio (5a7c47c9b3f9fb92a66410a7509f0c71) C:\WINDOWS\system32\drivers\dmio.sys
15:11:26.0765 2600 dmio - ok
15:11:26.0781 2600 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
15:11:26.0781 2600 dmload - ok
15:11:26.0796 2600 dmserver (6797c23d6b79935482d7f0e8ca5e5b67) C:\WINDOWS\System32\dmserver.dll
15:11:26.0796 2600 dmserver - ok
15:11:26.0828 2600 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
15:11:26.0828 2600 DMusic - ok
15:11:26.0859 2600 Dnscache (1a1e59377fb6cacd711cc5073c4a7d79) C:\WINDOWS\System32\dnsrslvr.dll
15:11:26.0859 2600 Dnscache - ok
15:11:26.0875 2600 Dot3svc (3fcf86f03d0302443c21ce6e5bbf7a25) C:\WINDOWS\System32\dot3svc.dll
15:11:26.0890 2600 Dot3svc - ok
15:11:26.0890 2600 dpti2o - ok
15:11:26.0906 2600 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
15:11:26.0906 2600 drmkaud - ok
15:11:26.0921 2600 EapHost (8b5fc9087d2cab110bc2ed5cc5e7b8ac) C:\WINDOWS\System32\eapsvc.dll
15:11:26.0921 2600 EapHost - ok
15:11:26.0937 2600 ERSvc (94f948cb12c4d35483f1e815deb16c7b) C:\WINDOWS\System32\ersvc.dll
15:11:26.0937 2600 ERSvc - ok
15:11:26.0953 2600 Eventlog (c3fb1d70cb88722267949694ba51759e) C:\WINDOWS\system32\services.exe
15:11:26.0953 2600 Eventlog - ok
15:11:26.0984 2600 EventSystem (ec16ae9b37eacf871629227a3f3913fd) C:\WINDOWS\system32\es.dll
15:11:27.0000 2600 EventSystem - ok
15:11:27.0015 2600 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
15:11:27.0015 2600 Fastfat - ok
15:11:27.0078 2600 FastUserSwitchingCompatibility (1b8542f338cdd86929a084a455837158) C:\WINDOWS\System32\shsvcs.dll
15:11:27.0078 2600 FastUserSwitchingCompatibility - ok
15:11:27.0093 2600 fbxusb (3cab16755639fa012d3e6bfe7ae005cd) C:\WINDOWS\system32\DRIVERS\fbxusb.sys
15:11:27.0093 2600 fbxusb - ok
15:11:27.0125 2600 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\DRIVERS\fdc.sys
15:11:27.0125 2600 Fdc - ok
15:11:27.0140 2600 Fips (31f923eb2170fc172c81abda0045d18c) C:\WINDOWS\system32\drivers\Fips.sys
15:11:27.0140 2600 Fips - ok
15:11:27.0171 2600 FLEXnet Licensing Service (227846995afeefa70d328bf5334a86a5) C:\Program Files\Fichiers communs\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
15:11:27.0234 2600 FLEXnet Licensing Service - ok
15:11:27.0234 2600 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\DRIVERS\flpydisk.sys
15:11:27.0234 2600 Flpydisk - ok
15:11:27.0250 2600 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\drivers\fltmgr.sys
15:11:27.0250 2600 FltMgr - ok
15:11:27.0281 2600 FontCache3.0.0.0 (8ba7c024070f2b7fdd98ed8a4ba41789) c:\WINDOWS\Microsoft.NET\Framework\v3.0\WPF\PresentationFontCache.exe
15:11:27.0281 2600 FontCache3.0.0.0 - ok
15:11:27.0296 2600 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
15:11:27.0296 2600 Fs_Rec - ok
15:11:27.0312 2600 Ftdisk (a86859b77b908c18c2657f284aa29fe3) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
15:11:27.0312 2600 Ftdisk - ok
15:11:27.0328 2600 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
15:11:27.0328 2600 Gpc - ok
15:11:27.0343 2600 HDAudBus (573c7d0a32852b48f3058cfd8026f511) C:\WINDOWS\system32\DRIVERS\HDAudBus.sys
15:11:27.0343 2600 HDAudBus - ok
15:11:27.0359 2600 helpsvc (1247f83b705af0e796330442f7967cf8) C:\WINDOWS\PCHealth\HelpCtr\Binaries\pchsvc.dll
15:11:27.0359 2600 helpsvc - ok
15:11:27.0359 2600 HidServ (a3b9b4a68bc839ce5a264d5908092261) C:\WINDOWS\System32\hidserv.dll
15:11:27.0359 2600 HidServ - ok
15:11:27.0390 2600 HidUsb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys
15:11:27.0390 2600 HidUsb - ok
15:11:27.0406 2600 hkmsvc (17b3c3d40cdba40c2e331d28be4de27f) C:\WINDOWS\System32\kmsvc.dll
15:11:27.0406 2600 hkmsvc - ok
15:11:27.0406 2600 hpn - ok
15:11:27.0437 2600 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys
15:11:27.0437 2600 HTTP - ok
15:11:27.0453 2600 HTTPFilter (bd31cface38d1800abdb43f4260af0d5) C:\WINDOWS\System32\w3ssl.dll
15:11:27.0453 2600 HTTPFilter - ok
15:11:27.0468 2600 i2omgmt - ok
15:11:27.0484 2600 i2omp - ok
15:11:27.0484 2600 i8042prt (a09bdc4ed10e3b2e0ec27bb94af32516) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
15:11:27.0484 2600 i8042prt - ok
15:11:27.0531 2600 idsvc (c01ac32dc5c03076cfb852cb5da5229c) c:\WINDOWS\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\infocard.exe
15:11:27.0546 2600 idsvc - ok
15:11:27.0562 2600 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys
15:11:27.0562 2600 Imapi - ok
15:11:27.0578 2600 ImapiService (c4221678bbaa55239c23632875759961) C:\WINDOWS\system32\imapi.exe
15:11:27.0593 2600 ImapiService - ok
15:11:27.0593 2600 ini910u - ok
15:11:27.0687 2600 IntcAzAudAddService (811b31e0e0ac7be484efbffc42afcbbe) C:\WINDOWS\system32\drivers\RtkHDAud.sys
15:11:27.0718 2600 IntcAzAudAddService - ok
15:11:27.0718 2600 IntelIde - ok
15:11:27.0734 2600 intelppm (ad340800c35a42d4de1641a37feea34c) C:\WINDOWS\system32\DRIVERS\intelppm.sys
15:11:27.0734 2600 intelppm - ok
15:11:27.0750 2600 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\drivers\ip6fw.sys
15:11:27.0750 2600 Ip6Fw - ok
15:11:27.0765 2600 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
15:11:27.0781 2600 IpFilterDriver - ok
15:11:27.0781 2600 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
15:11:27.0781 2600 IpInIp - ok
15:11:27.0796 2600 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
15:11:27.0796 2600 IpNat - ok
15:11:27.0796 2600 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
15:11:27.0796 2600 IPSec - ok
15:11:27.0812 2600 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
15:11:27.0812 2600 IRENUM - ok
15:11:27.0812 2600 isapnp (355836975a67b6554bca60328cd6cb74) C:\WINDOWS\system32\DRIVERS\isapnp.sys
15:11:27.0828 2600 isapnp - ok
15:11:27.0890 2600 JavaQuickStarterService (0a5709543986843d37a92290b7838340) C:\Program Files\Java\jre6\bin\jqs.exe
15:11:27.0890 2600 JavaQuickStarterService - ok
15:11:27.0906 2600 Kbdclass (16813155807c6881f4bfbf6657424659) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
15:11:27.0906 2600 Kbdclass - ok
15:11:27.0921 2600 kbdhid (94c59cb884ba010c063687c3a50dce8e) C:\WINDOWS\system32\DRIVERS\kbdhid.sys
15:11:27.0921 2600 kbdhid - ok
15:11:27.0937 2600 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
15:11:27.0937 2600 kmixer - ok
15:11:27.0953 2600 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys
15:11:27.0953 2600 KSecDD - ok
15:11:27.0984 2600 lanmanserver (1db8078a32e03ac8f5eb5e6dcac2aa34) C:\WINDOWS\System32\srvsvc.dll
15:11:27.0984 2600 lanmanserver - ok
15:11:28.0015 2600 lanmanworkstation (ad54ead46d92f413be189aabc1c59490) C:\WINDOWS\System32\wkssvc.dll
15:11:28.0015 2600 lanmanworkstation - ok
15:11:28.0015 2600 Lbd - ok
15:11:28.0031 2600 lbrtfdc - ok
15:11:28.0046 2600 License Management Service ESD (1877be12c45fc66614a295d74eeea56c) C:\Program Files\Fichiers communs\element5 Shared\Service\Licence Manager ESD.exe
15:11:28.0062 2600 License Management Service ESD - ok
15:11:28.0078 2600 LmHosts (0f357c079ac529a844ab5b18e4eef881) C:\WINDOWS\System32\lmhsvc.dll
15:11:28.0078 2600 LmHosts - ok
15:11:28.0093 2600 Messenger (e67a66a3781c1a483f0f8992664cbe0d) C:\WINDOWS\System32\msgsvc.dll
15:11:28.0093 2600 Messenger - ok
15:11:28.0109 2600 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
15:11:28.0109 2600 mnmdd - ok
15:11:28.0140 2600 mnmsrvc (d3a2870cd96cda7bcff3dc54f64087ad) C:\WINDOWS\system32\mnmsrvc.exe
15:11:28.0140 2600 mnmsrvc - ok
15:11:28.0156 2600 Modem (510ade9327fe84c10254e1902697e25f) C:\WINDOWS\system32\drivers\Modem.sys
15:11:28.0156 2600 Modem - ok
15:11:28.0171 2600 Mouclass (027c01bd7ef3349aaebc883d8a799efb) C:\WINDOWS\system32\DRIVERS\mouclass.sys
15:11:28.0171 2600 Mouclass - ok
15:11:28.0203 2600 mouhid (124d6846040c79b9c997f78ef4b2a4e5) C:\WINDOWS\system32\DRIVERS\mouhid.sys
15:11:28.0203 2600 mouhid - ok
15:11:28.0218 2600 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
15:11:28.0218 2600 MountMgr - ok
15:11:28.0234 2600 mraid35x - ok
15:11:28.0250 2600 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
15:11:28.0250 2600 MRxDAV - ok
15:11:28.0265 2600 MRxSmb (7d304a5eb4344ebeeab53a2fe3ffb9f0) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
15:11:28.0265 2600 MRxSmb - ok
15:11:28.0296 2600 MSDTC (8648d670ae0d95c95e7bbb5b80661796) C:\WINDOWS\system32\msdtc.exe
15:11:28.0296 2600 MSDTC - ok
15:11:28.0312 2600 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
15:11:28.0312 2600 Msfs - ok
15:11:28.0312 2600 MSIServer - ok
15:11:28.0328 2600 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
15:11:28.0328 2600 MSKSSRV - ok
15:11:28.0359 2600 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
15:11:28.0359 2600 MSPCLOCK - ok
15:11:28.0375 2600 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
15:11:28.0375 2600 MSPQM - ok
15:11:28.0390 2600 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
15:11:28.0390 2600 mssmbios - ok
15:11:28.0406 2600 MTsensor (d48659bb24c48345d926ecb45c1ebdf5) C:\WINDOWS\system32\DRIVERS\ASACPI.sys
15:11:28.0406 2600 MTsensor - ok
15:11:28.0421 2600 Mup (de6a75f5c270e756c5508d94b6cf68f5) C:\WINDOWS\system32\drivers\Mup.sys
15:11:28.0421 2600 Mup - ok
15:11:28.0453 2600 napagent (69e4fbbabaeee1bff422e091da3171da) C:\WINDOWS\System32\qagentrt.dll
15:11:28.0453 2600 napagent - ok
15:11:28.0468 2600 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
15:11:28.0468 2600 NDIS - ok
15:11:28.0484 2600 NdisTapi (0109c4f3850dfbab279542515386ae22) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
15:11:28.0484 2600 NdisTapi - ok
15:11:28.0500 2600 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
15:11:28.0500 2600 Ndisuio - ok
15:11:28.0515 2600 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
15:11:28.0515 2600 NdisWan - ok
15:11:28.0531 2600 NDProxy (9282bd12dfb069d3889eb3fcc1000a9b) C:\WINDOWS\system32\drivers\NDProxy.sys
15:11:28.0531 2600 NDProxy - ok
15:11:28.0546 2600 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys
15:11:28.0546 2600 NetBIOS - ok
15:11:28.0562 2600 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys
15:11:28.0562 2600 NetBT - ok
15:11:28.0593 2600 NetDDE (5c9b1d83755b36237b70f95df3d46a52) C:\WINDOWS\system32\netdde.exe
15:11:28.0593 2600 NetDDE - ok
15:11:28.0609 2600 NetDDEdsdm (5c9b1d83755b36237b70f95df3d46a52) C:\WINDOWS\system32\netdde.exe
15:11:28.0609 2600 NetDDEdsdm - ok
15:11:28.0625 2600 Netlogon (91e6024d6d4dcdecdb36c43ecf9bbecb) C:\WINDOWS\system32\lsass.exe
15:11:28.0625 2600 Netlogon - ok
15:11:28.0656 2600 Netman (be0cb143fa427d93440ded18db8c918b) C:\WINDOWS\System32\netman.dll
15:11:28.0656 2600 Netman - ok
15:11:28.0703 2600 NetTcpPortSharing (d34612c5d02d026535b3095d620626ae) c:\WINDOWS\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\SMSvcHost.exe
15:11:28.0703 2600 NetTcpPortSharing - ok
15:11:28.0703 2600 NIC1394 (e9e47cfb2d461fa0fc75b7a74c6383ea) C:\WINDOWS\system32\DRIVERS\nic1394.sys
15:11:28.0703 2600 NIC1394 - ok
15:11:28.0734 2600 Nla (6f5f546a92c7b6ae45db1d6910781eb0) C:\WINDOWS\System32\mswsock.dll
15:11:28.0734 2600 Nla - ok
15:11:28.0765 2600 NMIndexingService (a328a46d87bb92ce4d8a4528e9d84787) C:\Program Files\Fichiers communs\Ahead\Lib\NMIndexingService.exe
15:11:28.0781 2600 NMIndexingService - ok
15:11:28.0781 2600 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
15:11:28.0781 2600 Npfs - ok
15:11:28.0812 2600 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
15:11:28.0812 2600 Ntfs - ok
15:11:28.0828 2600 NtLmSsp (91e6024d6d4dcdecdb36c43ecf9bbecb) C:\WINDOWS\system32\lsass.exe
15:11:28.0828 2600 NtLmSsp - ok
15:11:28.0859 2600 NtmsSvc (037d92b3a7853a183fcab77fb1d13d6c) C:\WINDOWS\system32\ntmssvc.dll
15:11:28.0859 2600 NtmsSvc - ok
15:11:28.0859 2600 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
15:11:28.0859 2600 Null - ok
15:11:29.0000 2600 nv (9f4384aa43548ddd438f7b7825d11699) C:\WINDOWS\system32\DRIVERS\nv4_mini.sys
15:11:29.0031 2600 nv - ok
15:11:29.0046 2600 NVSvc (0c41c4acfe00d826db479c40c1d9edc8) C:\WINDOWS\system32\nvsvc32.exe
15:11:29.0046 2600 NVSvc - ok
15:11:29.0062 2600 NWCWorkstation (b0401126f3b7748ee795097024787534) C:\WINDOWS\System32\nwwks.dll
15:11:29.0078 2600 NWCWorkstation - ok
15:11:29.0093 2600 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
15:11:29.0093 2600 NwlnkFlt - ok
15:11:29.0109 2600 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
15:11:29.0125 2600 NwlnkFwd - ok
15:11:29.0140 2600 NwlnkIpx (8b8b1be2dba4025da6786c645f77f123) C:\WINDOWS\system32\DRIVERS\nwlnkipx.sys
15:11:29.0140 2600 NwlnkIpx - ok
15:11:29.0140 2600 NwlnkNb (56d34a67c05e94e16377c60609741ff8) C:\WINDOWS\system32\DRIVERS\nwlnknb.sys
15:11:29.0140 2600 NwlnkNb - ok
15:11:29.0171 2600 NwlnkSpx (c0bb7d1615e1acbdc99757f6ceaf8cf0) C:\WINDOWS\system32\DRIVERS\nwlnkspx.sys
15:11:29.0171 2600 NwlnkSpx - ok
15:11:29.0171 2600 NWRDR (36b9b950e3d2e100970a48d8bad86740) C:\WINDOWS\system32\DRIVERS\nwrdr.sys
15:11:29.0171 2600 NWRDR - ok
15:11:29.0187 2600 ohci1394 (ca33832df41afb202ee7aeb05145922f) C:\WINDOWS\system32\DRIVERS\ohci1394.sys
15:11:29.0187 2600 ohci1394 - ok
15:11:29.0203 2600 Parport (8fd0bdbea875d06ccf6c945ca9abaf75) C:\WINDOWS\system32\drivers\Parport.sys
15:11:29.0203 2600 Parport - ok
15:11:29.0218 2600 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
15:11:29.0218 2600 PartMgr - ok
15:11:29.0234 2600 ParVdm (9575c5630db8fb804649a6959737154c) C:\WINDOWS\system32\drivers\ParVdm.sys
15:11:29.0234 2600 ParVdm - ok
15:11:29.0265 2600 PCI (043410877bda580c528f45165f7125bc) C:\WINDOWS\system32\DRIVERS\pci.sys
15:11:29.0265 2600 PCI - ok
15:11:29.0281 2600 PCIDump - ok
15:11:29.0281 2600 PCIIde (f4bfde7209c14a07aaa61e4d6ae69eac) C:\WINDOWS\system32\DRIVERS\pciide.sys
15:11:29.0296 2600 PCIIde - ok
15:11:29.0296 2600 Pcmcia (f0406cbc60bdb0394a0e17ffb04cdd3d) C:\WINDOWS\system32\drivers\Pcmcia.sys
15:11:29.0296 2600 Pcmcia - ok
15:11:29.0312 2600 PDCOMP - ok
15:11:29.0312 2600 PDFRAME - ok
15:11:29.0328 2600 PDRELI - ok
15:11:29.0343 2600 PDRFRAME - ok
15:11:29.0343 2600 perc2 - ok
15:11:29.0359 2600 perc2hib - ok
15:11:29.0375 2600 pfc (f2b3785d7282bac66d4b644fc88749f0) C:\WINDOWS\system32\drivers\pfc.sys
15:11:29.0375 2600 pfc - ok
15:11:29.0406 2600 PlugPlay (c3fb1d70cb88722267949694ba51759e) C:\WINDOWS\system32\services.exe
15:11:29.0406 2600 PlugPlay - ok
15:11:29.0406 2600 PolicyAgent (91e6024d6d4dcdecdb36c43ecf9bbecb) C:\WINDOWS\system32\lsass.exe
15:11:29.0406 2600 PolicyAgent - ok
15:11:29.0421 2600 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
15:11:29.0421 2600 PptpMiniport - ok
15:11:29.0437 2600 ProtectedStorage (91e6024d6d4dcdecdb36c43ecf9bbecb) C:\WINDOWS\system32\lsass.exe
15:11:29.0437 2600 ProtectedStorage - ok
15:11:29.0453 2600 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
15:11:29.0453 2600 PSched - ok
15:11:29.0453 2600 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
15:11:29.0453 2600 Ptilink - ok
15:11:29.0468 2600 ql1080 - ok
15:11:29.0468 2600 Ql10wnt - ok
15:11:29.0484 2600 ql12160 - ok
15:11:29.0500 2600 ql1240 - ok
15:11:29.0500 2600 ql1280 - ok
15:11:29.0515 2600 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
15:11:29.0515 2600 RasAcd - ok
15:11:29.0531 2600 RasAuto (78da9ccdac683ef5aa87d1c919f6d221) C:\WINDOWS\System32\rasauto.dll
15:11:29.0531 2600 RasAuto - ok
15:11:29.0546 2600 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
15:11:29.0546 2600 Rasl2tp - ok
15:11:29.0578 2600 RasMan (0a48df90b4784f9b90a2671af992c914) C:\WINDOWS\System32\rasmans.dll
15:11:29.0578 2600 RasMan - ok
15:11:29.0593 2600 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
15:11:29.0593 2600 RasPppoe - ok
15:11:29.0593 2600 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
15:11:29.0593 2600 Raspti - ok
15:11:29.0625 2600 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
15:11:29.0625 2600 Rdbss - ok
15:11:29.0625 2600 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
15:11:29.0625 2600 RDPCDD - ok
15:11:29.0640 2600 rdpdr (15cabd0f7c00c47c70124907916af3f1) C:\WINDOWS\system32\DRIVERS\rdpdr.sys
15:11:29.0640 2600 rdpdr - ok
15:11:29.0671 2600 RDPWD (5b3055daa788bd688594d2f5981f2a83) C:\WINDOWS\system32\drivers\RDPWD.sys
15:11:29.0671 2600 RDPWD - ok
15:11:29.0703 2600 RDSessMgr (9f63d9c5b238ed1c375d417eff3d5be7) C:\WINDOWS\system32\sessmgr.exe
15:11:29.0703 2600 RDSessMgr - ok
15:11:29.0718 2600 redbook (d8eb2a7904db6c916eb5361878ddcbae) C:\WINDOWS\system32\DRIVERS\redbook.sys
15:11:29.0718 2600 redbook - ok
15:11:29.0765 2600 RemoteAccess (7da370c31673c99497bd07068ee6e354) C:\WINDOWS\System32\mprdim.dll
15:11:29.0781 2600 RemoteAccess - ok
15:11:29.0812 2600 RemoteRegistry (e598d81197e2e0ec42a0c55772bb00e8) C:\WINDOWS\system32\regsvc.dll
15:11:29.0812 2600 RemoteRegistry - ok
15:11:29.0843 2600 RpcLocator (499c59a2584f6d4ea41e944da571d993) C:\WINDOWS\system32\locator.exe
15:11:29.0843 2600 RpcLocator - ok
15:11:29.0875 2600 RpcSs (0203b1aad358f206cb0a3c1f93cce17a) C:\WINDOWS\system32\rpcss.dll
15:11:29.0875 2600 RpcSs - ok
15:11:29.0921 2600 RSVP (414964844f4793acb868d057e8ed997e) C:\WINDOWS\system32\rsvp.exe
15:11:29.0921 2600 RSVP - ok
15:11:29.0937 2600 SamSs (91e6024d6d4dcdecdb36c43ecf9bbecb) C:\WINDOWS\system32\lsass.exe
15:11:29.0937 2600 SamSs - ok
15:11:29.0953 2600 SCardSvr (67949cc8a865296c1333c96a4e1a2d66) C:\WINDOWS\System32\SCardSvr.exe
15:11:29.0953 2600 SCardSvr - ok
15:11:30.0015 2600 Schedule (55f5c5c1be1a78e285033e432ba01597) C:\WINDOWS\system32\schedsvc.dll
15:11:30.0015 2600 Schedule - ok
15:11:30.0046 2600 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
15:11:30.0046 2600 Secdrv - ok
15:11:30.0046 2600 seclogon (5ac311c0af2af5ec221670bb8dc479d3) C:\WINDOWS\System32\seclogon.dll
15:11:30.0046 2600 seclogon - ok
15:11:30.0062 2600 SENS (3531366f38f453d08fe72e7b32dfe786) C:\WINDOWS\system32\sens.dll
15:11:30.0062 2600 SENS - ok
15:11:30.0093 2600 Sentinel (8627c992b8a80504fc477b2e8ff8ec4f) C:\WINDOWS\System32\Drivers\SENTINEL.SYS
15:11:30.0093 2600 Sentinel - ok
15:11:30.0093 2600 serenum (0f29512ccd6bead730039fb4bd2c85ce) C:\WINDOWS\system32\DRIVERS\serenum.sys
15:11:30.0093 2600 serenum - ok
15:11:30.0125 2600 Serial (93d313c31f7ad9ea2b75f26075413c7c) C:\WINDOWS\system32\DRIVERS\serial.sys
15:11:30.0125 2600 Serial - ok
15:11:30.0140 2600 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys
15:11:30.0140 2600 Sfloppy - ok
15:11:30.0171 2600 SharedAccess (f4ce708a7d17a625de6c0fd746d50e88) C:\WINDOWS\System32\ipnathlp.dll
15:11:30.0171 2600 SharedAccess - ok
15:11:30.0203 2600 ShellHWDetection (1b8542f338cdd86929a084a455837158) C:\WINDOWS\System32\shsvcs.dll
15:11:30.0203 2600 ShellHWDetection - ok
15:11:30.0203 2600 Simbad - ok
15:11:30.0250 2600 SNTNLUSB (87f799c486302aceff098e067d481d9c) C:\WINDOWS\system32\DRIVERS\SNTNLUSB.SYS
15:11:30.0250 2600 SNTNLUSB - ok
15:11:30.0265 2600 Sparrow - ok
15:11:30.0296 2600 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
15:11:30.0296 2600 splitter - ok
15:11:30.0312 2600 Spooler (60784f891563fb1b767f70117fc2428f) C:\WINDOWS\system32\spoolsv.exe
15:11:30.0312 2600 Spooler - ok
15:11:30.0343 2600 sptd (7f1b7c4d446cd3f926af45b8c48bd593) C:\WINDOWS\system32\Drivers\sptd.sys
15:11:30.0343 2600 Suspicious file (NoAccess): C:\WINDOWS\system32\Drivers\sptd.sys. md5: 7f1b7c4d446cd3f926af45b8c48bd593
15:11:30.0343 2600 sptd ( LockedFile.Multi.Generic ) - warning
15:11:30.0343 2600 sptd - detected LockedFile.Multi.Generic (1)
15:11:30.0359 2600 sr (39626e6dc1fb39434ec40c42722b660a) C:\WINDOWS\system32\DRIVERS\sr.sys
15:11:30.0359 2600 sr - ok
15:11:30.0375 2600 srservice (6ed29124a1c83bd0cf6b26bd01ca6f6f) C:\WINDOWS\system32\srsvc.dll
15:11:30.0375 2600 srservice - ok
15:11:30.0406 2600 Srv (47ddfc2f003f7f9f0592c6874962a2e7) C:\WINDOWS\system32\DRIVERS\srv.sys
15:11:30.0406 2600 Srv - ok
15:11:30.0421 2600 SSDPSRV (ea9e0db8684cef2fd3badd671df5a112) C:\WINDOWS\System32\ssdpsrv.dll
15:11:30.0421 2600 SSDPSRV - ok
15:11:30.0453 2600 ssmdrv (a36ee93698802cd899f98bfd553d8185) C:\WINDOWS\system32\DRIVERS\ssmdrv.sys
15:11:30.0453 2600 ssmdrv - ok
15:11:30.0468 2600 stisvc (d76b0e8a4ecad1adcc75fd14a7acc54c) C:\WINDOWS\system32\wiaservc.dll
15:11:30.0484 2600 stisvc - ok
15:11:30.0500 2600 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
15:11:30.0500 2600 swenum - ok
15:11:30.0515 2600 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
15:11:30.0515 2600 swmidi - ok
15:11:30.0515 2600 SwPrv - ok
15:11:30.0531 2600 symc810 - ok
15:11:30.0531 2600 symc8xx - ok
15:11:30.0546 2600 sym_hi - ok
15:11:30.0562 2600 sym_u3 - ok
15:11:30.0562 2600 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
15:11:30.0562 2600 sysaudio - ok
15:11:30.0578 2600 SysmonLog (0899061318a6b1d9596aabfc77f45e44) C:\WINDOWS\system32\smlogsvc.exe
15:11:30.0578 2600 SysmonLog - ok
15:11:30.0609 2600 tap0901 (e5690ea1ba99fe057491c1510a29e066) C:\WINDOWS\system32\DRIVERS\tap0901.sys
15:11:30.0609 2600 tap0901 - ok
15:11:30.0625 2600 TapiSrv (8e5231171ad6595ff002e848cc54fcd7) C:\WINDOWS\System32\tapisrv.dll
15:11:30.0625 2600 TapiSrv - ok
15:11:30.0656 2600 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
15:11:30.0656 2600 Tcpip - ok
15:11:30.0687 2600 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
15:11:30.0687 2600 TDPIPE - ok
15:11:30.0703 2600 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
15:11:30.0703 2600 TDTCP - ok
15:11:30.0718 2600 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
15:11:30.0718 2600 TermDD - ok
15:11:30.0734 2600 TermService (710bc85a8c22626ee094439e3ea0d38c) C:\WINDOWS\System32\termsrv.dll
15:11:30.0734 2600 TermService - ok
15:11:30.0765 2600 Themes (1b8542f338cdd86929a084a455837158) C:\WINDOWS\System32\shsvcs.dll
15:11:30.0765 2600 Themes - ok
15:11:30.0781 2600 tlbhur - ok
15:11:30.0812 2600 TlntSvr (d859a9d2f026ce5804485068ffd6eaf2) C:\WINDOWS\system32\tlntsvr.exe
15:11:30.0812 2600 TlntSvr - ok
15:11:30.0828 2600 TosIde - ok
15:11:30.0843 2600 TrkWks (e1a84a5067627407a53c2c4f8d8a1d2e) C:\WINDOWS\system32\trkwks.dll
15:11:30.0843 2600 TrkWks - ok
15:11:30.0859 2600 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
15:11:30.0859 2600 Udfs - ok
15:11:30.0859 2600 ultra - ok
15:11:30.0906 2600 UMWdf (c81b8635dee0d3ef5f64b3dd643023a5) C:\WINDOWS\system32\wdfmgr.exe
15:11:30.0906 2600 UMWdf - ok
15:11:30.0937 2600 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
15:11:30.0937 2600 Update - ok
15:11:30.0953 2600 upnphost (bd8166a495b02308f364b36249475f22) C:\WINDOWS\System32\upnphost.dll
15:11:30.0953 2600 upnphost - ok
15:11:30.0968 2600 UPS (1edc93d7bd731b5ca6248ae245099b60) C:\WINDOWS\System32\ups.exe
15:11:30.0968 2600 UPS - ok
15:11:31.0000 2600 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
15:11:31.0000 2600 usbccgp - ok
15:11:31.0031 2600 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
15:11:31.0031 2600 usbehci - ok
15:11:31.0046 2600 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
15:11:31.0046 2600 usbhub - ok
15:11:31.0062 2600 usbprint (a717c8721046828520c9edf31288fc00) C:\WINDOWS\system32\DRIVERS\usbprint.sys
15:11:31.0062 2600 usbprint - ok
15:11:31.0078 2600 usbscan (a0b8cf9deb1184fbdd20784a58fa75d4) C:\WINDOWS\system32\DRIVERS\usbscan.sys
15:11:31.0078 2600 usbscan - ok
15:11:31.0109 2600 USBSTOR (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
15:11:31.0109 2600 USBSTOR - ok
15:11:31.0125 2600 usbuhci (26496f9dee2d787fc3e61ad54821ffe6) C:\WINDOWS\system32\DRIVERS\usbuhci.sys
15:11:31.0125 2600 usbuhci - ok
15:11:31.0140 2600 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
15:11:31.0140 2600 VgaSave - ok
15:11:31.0140 2600 ViaIde - ok
15:11:31.0156 2600 VolSnap (46de1126684369bace4849e4fc8c43ca) C:\WINDOWS\system32\drivers\VolSnap.sys
15:11:31.0156 2600 VolSnap - ok
15:11:31.0187 2600 VSS (5a4da252b2c0550ab83d129c02cf6c19) C:\WINDOWS\System32\vssvc.exe
15:11:31.0203 2600 VSS - ok
15:11:31.0250 2600 W32Time (c1f726ee0b043b074a68992bc4aef8fd) C:\WINDOWS\system32\w32time.dll
15:11:31.0250 2600 W32Time - ok
15:11:31.0265 2600 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
15:11:31.0265 2600 Wanarp - ok
15:11:31.0265 2600 WDICA - ok
15:11:31.0281 2600 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
15:11:31.0281 2600 wdmaud - ok
15:11:31.0296 2600 WebClient (714670e64fbe6d28d99871ed9a52a334) C:\WINDOWS\System32\webclnt.dll
15:11:31.0296 2600 WebClient - ok
15:11:31.0328 2600 winmgmt (5e9deae9980ff34bcd6dde2e9e2bf911) C:\WINDOWS\system32\wbem\WMIsvc.dll
15:11:31.0328 2600 winmgmt - ok
15:11:31.0375 2600 WmdmPmSN (a477391b7a8b0a0daabadb17cf533a4b) C:\WINDOWS\system32\mspmsnsv.dll
15:11:31.0375 2600 WmdmPmSN - ok
15:11:31.0421 2600 Wmi (31c1fd0bbdc5b81c21edba4331edae55) C:\WINDOWS\System32\advapi32.dll
15:11:31.0437 2600 Wmi - ok
15:11:31.0453 2600 WmiApSrv (4e8e8a58f56b25d0795f484e5eb7f898) C:\WINDOWS\system32\wbem\wmiapsrv.exe
15:11:31.0453 2600 WmiApSrv - ok
15:11:31.0468 2600 WpdUsb (c1b3d9d75c3fb735f5fa3a5806aded57) C:\WINDOWS\system32\Drivers\wpdusb.sys
15:11:31.0468 2600 WpdUsb - ok
15:11:31.0484 2600 wscsvc (c1fd85db4a80a98d60ecb7a828e77fe0) C:\WINDOWS\system32\wscsvc.dll
15:11:31.0500 2600 wscsvc - ok
15:11:31.0500 2600 wuauserv (75d6c5c3d2c93b1f9931e5dfb693ae2a) C:\WINDOWS\system32\wuauserv.dll
15:11:31.0500 2600 wuauserv - ok
15:11:31.0531 2600 WZCSVC (c336e54ee0c291a02f004667db1e66cb) C:\WINDOWS\System32\wzcsvc.dll
15:11:31.0531 2600 WZCSVC - ok
15:11:31.0546 2600 xcpip - ok
15:11:31.0562 2600 xmlprov (f92a87fdda0c11c8604fbc2b864fa726) C:\WINDOWS\System32\xmlprov.dll
15:11:31.0562 2600 xmlprov - ok
15:11:31.0578 2600 xpsec - ok
15:11:31.0609 2600 yukonwxp (4322c32ced8c4772e039616dcbf01d3f) C:\WINDOWS\system32\DRIVERS\yk51x86.sys
15:11:31.0609 2600 yukonwxp - ok
15:11:31.0625 2600 MBR (0x1B8) (15aafd37c107618af1959f794586cc4d) \Device\Harddisk0\DR0
15:11:31.0625 2600 \Device\Harddisk0\DR0 ( Rootkit.Boot.Sinowal.b ) - infected
15:11:31.0625 2600 \Device\Harddisk0\DR0 - detected Rootkit.Boot.Sinowal.b (0)
15:11:31.0625 2600 Boot (0x1200) (ca36edf34c8232edebf3f27a8bf953de) \Device\Harddisk0\DR0\Partition0
15:11:31.0625 2600 \Device\Harddisk0\DR0\Partition0 - ok
15:11:31.0625 2600 ============================================================
15:11:31.0625 2600 Scan finished
15:11:31.0625 2600 ============================================================
15:11:31.0625 0428 Detected object count: 2
15:11:31.0625 0428 Actual detected object count: 2
15:12:15.0171 0428 sptd ( LockedFile.Multi.Generic ) - skipped by user
15:12:15.0171 0428 sptd ( LockedFile.Multi.Generic ) - User select action: Skip
15:12:15.0453 0428 \Device\Harddisk0\DR0\# - copied to quarantine
15:12:15.0453 0428 \Device\Harddisk0\DR0 - copied to quarantine
15:12:15.0484 0428 \Device\Harddisk0\DR0 ( Rootkit.Boot.Sinowal.b ) - will be cured on reboot
15:12:15.0546 0428 \Device\Harddisk0\DR0 - ok
15:12:15.0546 0428 \Device\Harddisk0\DR0 ( Rootkit.Boot.Sinowal.b ) - User select action: Cure
15:12:30.0656 1520 Deinitialize success
L'infection Sinowal a été supprimée.
Internet Explorer fonctionne correctement ?
Tu peux me refaire un rapport ZHPDiag ?
Internet Explorer fonctionne correctement ?
Tu peux me refaire un rapport ZHPDiag ?
Ca va beaucoup mieux !
Vous voici le rapport de ZHPDiag :
http://pjjoint.malekal.com/files.php?read=ZHPDiag_20120423_w9m15i13j10r5
Merci à vous
Pour votre efficacité et votre ... rapidité !
Vous voici le rapport de ZHPDiag :
http://pjjoint.malekal.com/files.php?read=ZHPDiag_20120423_w9m15i13j10r5
Merci à vous
Pour votre efficacité et votre ... rapidité !
Il reste des mauvais éléments, j'espère que ça va aller.
--> Copie tout le texte présent en gras ci-dessous (Sélectionne-le, clique droit dessus et choisis "Copier").
SysRestore
O2 - BHO: (no name) - {B0A26DA2-E4A3-47E5-9AE5-009A232C9E16} Clé orpheline
O2 - BHO: (no name) - {CE870288-25C0-4E09-AA40-251073C9D7E6} Clé orpheline
O17 - HKLM\System\CS1\Services\Tcpip\..\{5D66A8FC-FD41-45C6-B15E-C1E9B04CDB18}: DhcpNameServer = 85.255.112.172,85.255.112.26
[HKCU\Software\b7faeb18]
[HKLM\Software\2F9A2A75]
O43 - CFD: 17/02/2012 - 16:35:19 - [0] ----D C:\Documents and Settings\Truc\Application Data\xzeph3hyf1gvehrnauudnroboq2oruz12
O43 - CFD: 14/12/2011 - 00:03:23 - [0,002] -SH-D C:\Documents and Settings\Truc\Local Settings\Application Data\b7faeb18
O47 - AAKE:Key Export SP - "C:\Documents and Settings\Truc\Application Data\xzeph3hyf1gvehrnauudnroboq2oruz12\svcnost.exe" [Enabled] .(...) -- C:\Documents and Settings\Truc\Application Data\xzeph3hyf1gvehrnauudnroboq2oruz12\svcnost.exe (.not file.)
O47 - AAKE:Key Export SP - "C:\Documents and Settings\Truc\Application Data\xzeph3hyf1gvehrnauudnroboq2oruz1\svcnost.exe" [Disabled] .(...) -- C:\Documents and Settings\Truc\Application Data\xzeph3hyf1gvehrnauudnroboq2oruz1\svcnost.exe (.not file.)
O60 - DNS:Diversion Of DNS:HKLM\System\CS1\Services\Tcpip\..\{5D66A8FC-FD41-45C6-B15E-C1E9B04CDB18}\NameServer = 85.255.112.172,85.255.112.26
O60 - HKLM\System\CS1\Services\Tcpip\Parameters: DhcpNameServer = 85.255.112.172,85.255.112.26
EmptyFlash
EmptyTemp
--> Puis lance ZHPFix depuis le raccourci situé sur ton Bureau.
(Sous Vista/Win7, il faut cliquer droit sur le raccourci de ZHPFix et choisir Exécuter en tant qu'administrateur)
--> Une fois ZHPFix ouvert, clique sur le bouton "H" (Coller les lignes Helper).
--> Dans l'encadré principal, tu verras donc les lignes que tu as copié précédemment apparaître. Vérifie que toutes les lignes que je t'ai demandé de copier (et seulement elles) sont dans la fenêtre.
--> Clique sur "GO" pour lancer le nettoyage. Laisse l'outil travailler et ne touche à rien.
--> Une fois terminé, copie-colle le rapport dans ton prochain message.
--> Copie tout le texte présent en gras ci-dessous (Sélectionne-le, clique droit dessus et choisis "Copier").
SysRestore
O2 - BHO: (no name) - {B0A26DA2-E4A3-47E5-9AE5-009A232C9E16} Clé orpheline
O2 - BHO: (no name) - {CE870288-25C0-4E09-AA40-251073C9D7E6} Clé orpheline
O17 - HKLM\System\CS1\Services\Tcpip\..\{5D66A8FC-FD41-45C6-B15E-C1E9B04CDB18}: DhcpNameServer = 85.255.112.172,85.255.112.26
[HKCU\Software\b7faeb18]
[HKLM\Software\2F9A2A75]
O43 - CFD: 17/02/2012 - 16:35:19 - [0] ----D C:\Documents and Settings\Truc\Application Data\xzeph3hyf1gvehrnauudnroboq2oruz12
O43 - CFD: 14/12/2011 - 00:03:23 - [0,002] -SH-D C:\Documents and Settings\Truc\Local Settings\Application Data\b7faeb18
O47 - AAKE:Key Export SP - "C:\Documents and Settings\Truc\Application Data\xzeph3hyf1gvehrnauudnroboq2oruz12\svcnost.exe" [Enabled] .(...) -- C:\Documents and Settings\Truc\Application Data\xzeph3hyf1gvehrnauudnroboq2oruz12\svcnost.exe (.not file.)
O47 - AAKE:Key Export SP - "C:\Documents and Settings\Truc\Application Data\xzeph3hyf1gvehrnauudnroboq2oruz1\svcnost.exe" [Disabled] .(...) -- C:\Documents and Settings\Truc\Application Data\xzeph3hyf1gvehrnauudnroboq2oruz1\svcnost.exe (.not file.)
O60 - DNS:Diversion Of DNS:HKLM\System\CS1\Services\Tcpip\..\{5D66A8FC-FD41-45C6-B15E-C1E9B04CDB18}\NameServer = 85.255.112.172,85.255.112.26
O60 - HKLM\System\CS1\Services\Tcpip\Parameters: DhcpNameServer = 85.255.112.172,85.255.112.26
EmptyFlash
EmptyTemp
--> Puis lance ZHPFix depuis le raccourci situé sur ton Bureau.
(Sous Vista/Win7, il faut cliquer droit sur le raccourci de ZHPFix et choisir Exécuter en tant qu'administrateur)
--> Une fois ZHPFix ouvert, clique sur le bouton "H" (Coller les lignes Helper).
--> Dans l'encadré principal, tu verras donc les lignes que tu as copié précédemment apparaître. Vérifie que toutes les lignes que je t'ai demandé de copier (et seulement elles) sont dans la fenêtre.
--> Clique sur "GO" pour lancer le nettoyage. Laisse l'outil travailler et ne touche à rien.
--> Une fois terminé, copie-colle le rapport dans ton prochain message.
Le rapport de ZHPFix :
Rapport de ZHPFix 1.12.3372 par Nicolas Coolman, Update du 22/11/2011
Fichier d'export Registre : C:\ZHP\ZHPExportRegistry-23-04-2012-16-24-09.txt
Run by Truc at 23/04/2012 16:24:09
Windows XP Professional Service Pack 3 (Build 2600)
Web site : http://www.premiumorange.com/zeb-help-process/zhpfix.html
========== Clé(s) du Registre ==========
SUPPRIME Key: CLSID BHO: {B0A26DA2-E4A3-47E5-9AE5-009A232C9E16}
SUPPRIME Key: CLSID BHO: {CE870288-25C0-4E09-AA40-251073C9D7E6}
SUPPRIME Key: HKCU\Software\b7faeb18
SUPPRIME Key: HKLM\Software\2F9A2A75
========== Valeur(s) du Registre ==========
ABSENT TCPIP: DhcpNameServer
SUPPRIME AAKE KeyValue: C:\Documents and Settings\Truc\Application Data\xzeph3hyf1gvehrnauudnroboq2oruz12\svcnost.exe
SUPPRIME AAKE KeyValue: C:\Documents and Settings\Truc\Application Data\xzeph3hyf1gvehrnauudnroboq2oruz1\svcnost.exe
========== Elément(s) de donnée du Registre ==========
SUPPRIME: {5D66A8FC-FD41-45C6-B15E-C1E9B04CDB18}\NameServer = ""
========== Dossier(s) ==========
SUPPRIME Folder: C:\Documents and Settings\Truc\Application Data\xzeph3hyf1gvehrnauudnroboq2oruz12
SUPPRIME Folder: C:\Documents and Settings\Truc\Local Settings\Application Data\b7faeb18
SUPPRIME Flash Cookies: 2
SUPPRIME Temporaires Windows: : 86
========== Fichier(s) ==========
ABSENT File: c:\documents and settings\truc\application data\xzeph3hyf1gvehrnauudnroboq2oruz12\svcnost.exe
ABSENT File: c:\documents and settings\truc\application data\xzeph3hyf1gvehrnauudnroboq2oruz1\svcnost.exe
SUPPRIME Flash Cookies: 1
SUPPRIME Temporaires Windows: : 152
========== Restauration Système ==========
Point de restauration du système créé avec succès
========== Autre ==========
NON TRAITE O60 - HKLM\System\CS1\Services\Tcpip\Parameters: DhcpNameServer
========== Récapitulatif ==========
4 : Clé(s) du Registre
3 : Valeur(s) du Registre
1 : Elément(s) de donnée du Registre
4 : Dossier(s)
4 : Fichier(s)
1 : Restauration Système
1 : Autre
End of clean in 00mn 22s
========== Chemin de fichier rapport ==========
C:\ZHP\ZHPFix[R1].txt - 23/04/2012 16:24:09 [2036]
Rapport de ZHPFix 1.12.3372 par Nicolas Coolman, Update du 22/11/2011
Fichier d'export Registre : C:\ZHP\ZHPExportRegistry-23-04-2012-16-24-09.txt
Run by Truc at 23/04/2012 16:24:09
Windows XP Professional Service Pack 3 (Build 2600)
Web site : http://www.premiumorange.com/zeb-help-process/zhpfix.html
========== Clé(s) du Registre ==========
SUPPRIME Key: CLSID BHO: {B0A26DA2-E4A3-47E5-9AE5-009A232C9E16}
SUPPRIME Key: CLSID BHO: {CE870288-25C0-4E09-AA40-251073C9D7E6}
SUPPRIME Key: HKCU\Software\b7faeb18
SUPPRIME Key: HKLM\Software\2F9A2A75
========== Valeur(s) du Registre ==========
ABSENT TCPIP: DhcpNameServer
SUPPRIME AAKE KeyValue: C:\Documents and Settings\Truc\Application Data\xzeph3hyf1gvehrnauudnroboq2oruz12\svcnost.exe
SUPPRIME AAKE KeyValue: C:\Documents and Settings\Truc\Application Data\xzeph3hyf1gvehrnauudnroboq2oruz1\svcnost.exe
========== Elément(s) de donnée du Registre ==========
SUPPRIME: {5D66A8FC-FD41-45C6-B15E-C1E9B04CDB18}\NameServer = ""
========== Dossier(s) ==========
SUPPRIME Folder: C:\Documents and Settings\Truc\Application Data\xzeph3hyf1gvehrnauudnroboq2oruz12
SUPPRIME Folder: C:\Documents and Settings\Truc\Local Settings\Application Data\b7faeb18
SUPPRIME Flash Cookies: 2
SUPPRIME Temporaires Windows: : 86
========== Fichier(s) ==========
ABSENT File: c:\documents and settings\truc\application data\xzeph3hyf1gvehrnauudnroboq2oruz12\svcnost.exe
ABSENT File: c:\documents and settings\truc\application data\xzeph3hyf1gvehrnauudnroboq2oruz1\svcnost.exe
SUPPRIME Flash Cookies: 1
SUPPRIME Temporaires Windows: : 152
========== Restauration Système ==========
Point de restauration du système créé avec succès
========== Autre ==========
NON TRAITE O60 - HKLM\System\CS1\Services\Tcpip\Parameters: DhcpNameServer
========== Récapitulatif ==========
4 : Clé(s) du Registre
3 : Valeur(s) du Registre
1 : Elément(s) de donnée du Registre
4 : Dossier(s)
4 : Fichier(s)
1 : Restauration Système
1 : Autre
End of clean in 00mn 22s
========== Chemin de fichier rapport ==========
C:\ZHP\ZHPFix[R1].txt - 23/04/2012 16:24:09 [2036]
Le nouveau rapport de ZHPDiag :
http://pjjoint.malekal.com/files.php?read=ZHPDiag_20120423_u8107h12h11
http://pjjoint.malekal.com/files.php?read=ZHPDiag_20120423_u8107h12h11
Le nouveau rapport de RogueKiller :
RogueKiller V7.3.3 [22/04/2012] par Tigzy
mail: tigzyRK<at>gmail<dot>com
Remontees: http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.html
Blog: http://tigzyrk.blogspot.com
Systeme d'exploitation: Windows XP (5.1.2600 Service Pack 3) 32 bits version
Demarrage : Mode normal
Utilisateur: Truc [Droits d'admin]
Mode: Recherche -- Date: 23/04/2012 18:16:56
¤¤¤ Processus malicieux: 0 ¤¤¤
¤¤¤ Entrees de registre: 0 ¤¤¤
¤¤¤ Fichiers / Dossiers particuliers: ¤¤¤
¤¤¤ Driver: [CHARGE] ¤¤¤
SSDT[25] : NtClose @ 0x805BC530 -> HOOKED (Unknown @ 0xBA714B54)
SSDT[41] : NtCreateKey @ 0x806240F0 -> HOOKED (Unknown @ 0xBA714B0E)
SSDT[50] : NtCreateSection @ 0x805AB3C8 -> HOOKED (Unknown @ 0xBA714B5E)
SSDT[53] : NtCreateThread @ 0x805D1018 -> HOOKED (Unknown @ 0xBA714B04)
SSDT[63] : NtDeleteKey @ 0x8062458C -> HOOKED (Unknown @ 0xBA714B13)
SSDT[65] : NtDeleteValueKey @ 0x8062475C -> HOOKED (Unknown @ 0xBA714B1D)
SSDT[68] : NtDuplicateObject @ 0x805BE008 -> HOOKED (Unknown @ 0xBA714B4F)
SSDT[98] : NtLoadKey @ 0x80626314 -> HOOKED (Unknown @ 0xBA714B22)
SSDT[122] : NtOpenProcess @ 0x805CB440 -> HOOKED (Unknown @ 0xBA714AF0)
SSDT[128] : NtOpenThread @ 0x805CB6CC -> HOOKED (Unknown @ 0xBA714AF5)
SSDT[177] : NtQueryValueKey @ 0x80622314 -> HOOKED (Unknown @ 0xBA714B77)
SSDT[193] : NtReplaceKey @ 0x806261C4 -> HOOKED (Unknown @ 0xBA714B2C)
SSDT[200] : NtRequestWaitReplyPort @ 0x805A2D76 -> HOOKED (Unknown @ 0xBA714B68)
SSDT[204] : NtRestoreKey @ 0x80625AD0 -> HOOKED (Unknown @ 0xBA714B27)
SSDT[213] : NtSetContextThread @ 0x805D173A -> HOOKED (Unknown @ 0xBA714B63)
SSDT[237] : NtSetSecurityObject @ 0x805C062E -> HOOKED (Unknown @ 0xBA714B6D)
SSDT[247] : NtSetValueKey @ 0x80622662 -> HOOKED (Unknown @ 0xBA714B18)
SSDT[255] : NtSystemDebugControl @ 0x806180BA -> HOOKED (Unknown @ 0xBA714B72)
SSDT[257] : NtTerminateProcess @ 0x805D29E2 -> HOOKED (Unknown @ 0xBA714AFF)
S_SSDT[549] : Unknown -> HOOKED (Unknown @ 0xBA714B86)
S_SSDT[552] : Unknown -> HOOKED (Unknown @ 0xBA714B8B)
IRP[IRP_MJ_CREATE] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_CLOSE] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_DEVICE_CONTROL] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_INTERNAL_DEVICE_CONTROL] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_SYSTEM_CONTROL] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_DEVICE_CHANGE] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
¤¤¤ Infection : ¤¤¤
¤¤¤ Fichier HOSTS: ¤¤¤
127.0.0.1 localhost
127.0.0.1 www.007guard.com
127.0.0.1 007guard.com
127.0.0.1 008i.com
127.0.0.1 www.008k.com
127.0.0.1 008k.com
127.0.0.1 www.00hq.com
127.0.0.1 00hq.com
127.0.0.1 010402.com
127.0.0.1 www.032439.com
127.0.0.1 032439.com
127.0.0.1 www.0scan.com
127.0.0.1 0scan.com
127.0.0.1 1000gratisproben.com
127.0.0.1 www.1000gratisproben.com
127.0.0.1 www.1001namen.com
127.0.0.1 1001namen.com
127.0.0.1 www.100888290cs.com
127.0.0.1 100888290cs.com
127.0.0.1 www.100sexlinks.com
[...]
¤¤¤ MBR Verif: ¤¤¤
+++++ PhysicalDrive0: MAXTOR STM3500320AS +++++
--- User ---
[MBR] 831d9681d5fafaf207a5a660287f4e56
[BSP] 6d2de05141d6f1f7dd08e3138bdb3ffb : Windows XP MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 476929 Mo
User = LL1 ... OK!
User = LL2 ... OK!
Termine : << RKreport[4].txt >>
RKreport[1].txt ; RKreport[2].txt ; RKreport[3].txt ; RKreport[4].txt
RogueKiller V7.3.3 [22/04/2012] par Tigzy
mail: tigzyRK<at>gmail<dot>com
Remontees: http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.html
Blog: http://tigzyrk.blogspot.com
Systeme d'exploitation: Windows XP (5.1.2600 Service Pack 3) 32 bits version
Demarrage : Mode normal
Utilisateur: Truc [Droits d'admin]
Mode: Recherche -- Date: 23/04/2012 18:16:56
¤¤¤ Processus malicieux: 0 ¤¤¤
¤¤¤ Entrees de registre: 0 ¤¤¤
¤¤¤ Fichiers / Dossiers particuliers: ¤¤¤
¤¤¤ Driver: [CHARGE] ¤¤¤
SSDT[25] : NtClose @ 0x805BC530 -> HOOKED (Unknown @ 0xBA714B54)
SSDT[41] : NtCreateKey @ 0x806240F0 -> HOOKED (Unknown @ 0xBA714B0E)
SSDT[50] : NtCreateSection @ 0x805AB3C8 -> HOOKED (Unknown @ 0xBA714B5E)
SSDT[53] : NtCreateThread @ 0x805D1018 -> HOOKED (Unknown @ 0xBA714B04)
SSDT[63] : NtDeleteKey @ 0x8062458C -> HOOKED (Unknown @ 0xBA714B13)
SSDT[65] : NtDeleteValueKey @ 0x8062475C -> HOOKED (Unknown @ 0xBA714B1D)
SSDT[68] : NtDuplicateObject @ 0x805BE008 -> HOOKED (Unknown @ 0xBA714B4F)
SSDT[98] : NtLoadKey @ 0x80626314 -> HOOKED (Unknown @ 0xBA714B22)
SSDT[122] : NtOpenProcess @ 0x805CB440 -> HOOKED (Unknown @ 0xBA714AF0)
SSDT[128] : NtOpenThread @ 0x805CB6CC -> HOOKED (Unknown @ 0xBA714AF5)
SSDT[177] : NtQueryValueKey @ 0x80622314 -> HOOKED (Unknown @ 0xBA714B77)
SSDT[193] : NtReplaceKey @ 0x806261C4 -> HOOKED (Unknown @ 0xBA714B2C)
SSDT[200] : NtRequestWaitReplyPort @ 0x805A2D76 -> HOOKED (Unknown @ 0xBA714B68)
SSDT[204] : NtRestoreKey @ 0x80625AD0 -> HOOKED (Unknown @ 0xBA714B27)
SSDT[213] : NtSetContextThread @ 0x805D173A -> HOOKED (Unknown @ 0xBA714B63)
SSDT[237] : NtSetSecurityObject @ 0x805C062E -> HOOKED (Unknown @ 0xBA714B6D)
SSDT[247] : NtSetValueKey @ 0x80622662 -> HOOKED (Unknown @ 0xBA714B18)
SSDT[255] : NtSystemDebugControl @ 0x806180BA -> HOOKED (Unknown @ 0xBA714B72)
SSDT[257] : NtTerminateProcess @ 0x805D29E2 -> HOOKED (Unknown @ 0xBA714AFF)
S_SSDT[549] : Unknown -> HOOKED (Unknown @ 0xBA714B86)
S_SSDT[552] : Unknown -> HOOKED (Unknown @ 0xBA714B8B)
IRP[IRP_MJ_CREATE] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_CLOSE] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_DEVICE_CONTROL] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_INTERNAL_DEVICE_CONTROL] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_SYSTEM_CONTROL] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_DEVICE_CHANGE] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
¤¤¤ Infection : ¤¤¤
¤¤¤ Fichier HOSTS: ¤¤¤
127.0.0.1 localhost
127.0.0.1 www.007guard.com
127.0.0.1 007guard.com
127.0.0.1 008i.com
127.0.0.1 www.008k.com
127.0.0.1 008k.com
127.0.0.1 www.00hq.com
127.0.0.1 00hq.com
127.0.0.1 010402.com
127.0.0.1 www.032439.com
127.0.0.1 032439.com
127.0.0.1 www.0scan.com
127.0.0.1 0scan.com
127.0.0.1 1000gratisproben.com
127.0.0.1 www.1000gratisproben.com
127.0.0.1 www.1001namen.com
127.0.0.1 1001namen.com
127.0.0.1 www.100888290cs.com
127.0.0.1 100888290cs.com
127.0.0.1 www.100sexlinks.com
[...]
¤¤¤ MBR Verif: ¤¤¤
+++++ PhysicalDrive0: MAXTOR STM3500320AS +++++
--- User ---
[MBR] 831d9681d5fafaf207a5a660287f4e56
[BSP] 6d2de05141d6f1f7dd08e3138bdb3ffb : Windows XP MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 476929 Mo
User = LL1 ... OK!
User = LL2 ... OK!
Termine : << RKreport[4].txt >>
RKreport[1].txt ; RKreport[2].txt ; RKreport[3].txt ; RKreport[4].txt
Je suis en train de voir avec le créateur de RogueKiller pour les traces que je vois dans ZHPDiag et que RogueKiller ne voit pas.
Exécute cet outil :
https://www.luanagames.com/index.fr.html
Et poste-moi le rapport debug.txt qui se trouve dans le dossier RK_Quarantine sur ton Bureau.
Exécute cet outil :
https://www.luanagames.com/index.fr.html
Et poste-moi le rapport debug.txt qui se trouve dans le dossier RK_Quarantine sur ton Bureau.
Le rapport de RogueLiller avec la version Debug :
RogueKiller V7.3.3 [22/04/2012] par Tigzy
mail: tigzyRK<at>gmail<dot>com
Remontees: http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.html
Blog: http://tigzyrk.blogspot.com
Systeme d'exploitation: Windows XP (5.1.2600 Service Pack 3) 32 bits version
Demarrage : Mode normal
Utilisateur: Truc [Droits d'admin]
Mode: Recherche -- Date: 23/04/2012 19:51:28
*** DEBUG ON ***
******* Var env *******
[isX64] 0
[APPDATA] c:\documents and settings\truc\application data
[DESKTOP] c:\documents and settings\truc\bureau
[CAPPDATA] c:\documents and settings\all users\application data
[CDESKTOP] c:\documents and settings\all users\bureau
[CDOCS] c:\documents and settings\all users\documents
[CPROG] c:\documents and settings\all users\menu démarrer\programmes
[CSTARTMENU] c:\documents and settings\all users\menu démarrer
[DOCS] c:\documents and settings\truc\mes documents
[FAVS] c:\documents and settings\truc\favoris
[LAPPDATA] c:\documents and settings\truc\local settings\application data
[MUSIC] c:\documents and settings\truc\mes documents\ma musique
[PICTS] c:\documents and settings\truc\mes documents\mes images
[PROG] c:\program files
[PROGX86]
[QUICKLNCH] c:\documents and settings\truc\application data\microsoft\internet explorer\quick launch
[STARTMENU] c:\documents and settings\truc\menu démarrer
[SYS32] c:\windows\system32
[SYSWOW64] c:\windows\system32
[TMP] c:\documents and settings\truc\local settings\temp
[USER] c:\documents and settings\truc
[VIDEOS] c:\documents and settings\truc\mes documents\mes vidéos
[WINDOWS] c:\windows
[STARTUP FOLDER] c:\documents and settings\truc\menu démarrer\programmes\démarrage
[CSTARTUP FOLDER] c:\documents and settings\all users\menu démarrer\programmes\démarrage
***********************
******* Previous Run *******
*** NONE
¤¤¤ Processus malicieux: 0 ¤¤¤
¤¤¤ Entrees de registre: 0 ¤¤¤
¤¤¤ Fichiers / Dossiers particuliers: ¤¤¤
¤¤¤ Driver: [CHARGE] ¤¤¤
SSDT[25] : NtClose @ 0x805BC530 -> HOOKED (Unknown @ 0xBA76DB4C)
SSDT[41] : NtCreateKey @ 0x806240F0 -> HOOKED (Unknown @ 0xBA76DB06)
SSDT[50] : NtCreateSection @ 0x805AB3C8 -> HOOKED (Unknown @ 0xBA76DB56)
SSDT[53] : NtCreateThread @ 0x805D1018 -> HOOKED (Unknown @ 0xBA76DAFC)
SSDT[63] : NtDeleteKey @ 0x8062458C -> HOOKED (Unknown @ 0xBA76DB0B)
SSDT[65] : NtDeleteValueKey @ 0x8062475C -> HOOKED (Unknown @ 0xBA76DB15)
SSDT[68] : NtDuplicateObject @ 0x805BE008 -> HOOKED (Unknown @ 0xBA76DB47)
SSDT[98] : NtLoadKey @ 0x80626314 -> HOOKED (Unknown @ 0xBA76DB1A)
SSDT[122] : NtOpenProcess @ 0x805CB440 -> HOOKED (Unknown @ 0xBA76DAE8)
SSDT[128] : NtOpenThread @ 0x805CB6CC -> HOOKED (Unknown @ 0xBA76DAED)
SSDT[177] : NtQueryValueKey @ 0x80622314 -> HOOKED (Unknown @ 0xBA76DB6F)
SSDT[193] : NtReplaceKey @ 0x806261C4 -> HOOKED (Unknown @ 0xBA76DB24)
SSDT[200] : NtRequestWaitReplyPort @ 0x805A2D76 -> HOOKED (Unknown @ 0xBA76DB60)
SSDT[204] : NtRestoreKey @ 0x80625AD0 -> HOOKED (Unknown @ 0xBA76DB1F)
SSDT[213] : NtSetContextThread @ 0x805D173A -> HOOKED (Unknown @ 0xBA76DB5B)
SSDT[237] : NtSetSecurityObject @ 0x805C062E -> HOOKED (Unknown @ 0xBA76DB65)
SSDT[247] : NtSetValueKey @ 0x80622662 -> HOOKED (Unknown @ 0xBA76DB10)
SSDT[255] : NtSystemDebugControl @ 0x806180BA -> HOOKED (Unknown @ 0xBA76DB6A)
SSDT[257] : NtTerminateProcess @ 0x805D29E2 -> HOOKED (Unknown @ 0xBA76DAF7)
S_SSDT[549] : Unknown -> HOOKED (Unknown @ 0xBA76DB7E)
S_SSDT[552] : Unknown -> HOOKED (Unknown @ 0xBA76DB83)
IRP[IRP_MJ_CREATE] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_CLOSE] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_DEVICE_CONTROL] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_INTERNAL_DEVICE_CONTROL] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_SYSTEM_CONTROL] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_DEVICE_CHANGE] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
¤¤¤ Infection : ¤¤¤
¤¤¤ Fichier HOSTS: ¤¤¤
127.0.0.1 localhost
127.0.0.1 www.007guard.com
127.0.0.1 007guard.com
127.0.0.1 008i.com
127.0.0.1 www.008k.com
127.0.0.1 008k.com
127.0.0.1 www.00hq.com
127.0.0.1 00hq.com
127.0.0.1 010402.com
127.0.0.1 www.032439.com
127.0.0.1 032439.com
127.0.0.1 www.0scan.com
127.0.0.1 0scan.com
127.0.0.1 1000gratisproben.com
127.0.0.1 www.1000gratisproben.com
127.0.0.1 www.1001namen.com
127.0.0.1 1001namen.com
127.0.0.1 www.100888290cs.com
127.0.0.1 100888290cs.com
127.0.0.1 www.100sexlinks.com
[...]
¤¤¤ MBR Verif: ¤¤¤
+++++ PhysicalDrive0: MAXTOR STM3500320AS +++++
--- User ---
[MBR] 831d9681d5fafaf207a5a660287f4e56
[BSP] 6d2de05141d6f1f7dd08e3138bdb3ffb : Windows XP MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 476929 Mo
User = LL1 ... OK!
User = LL2 ... OK!
Termine : << RKreport[5].txt >>
RKreport[1].txt ; RKreport[2].txt ; RKreport[3].txt ; RKreport[4].txt ; RKreport[5].txt
RogueKiller V7.3.3 [22/04/2012] par Tigzy
mail: tigzyRK<at>gmail<dot>com
Remontees: http://www.sur-la-toile.com/discussion-193725-1-BRogueKillerD-Remontees.html
Blog: http://tigzyrk.blogspot.com
Systeme d'exploitation: Windows XP (5.1.2600 Service Pack 3) 32 bits version
Demarrage : Mode normal
Utilisateur: Truc [Droits d'admin]
Mode: Recherche -- Date: 23/04/2012 19:51:28
*** DEBUG ON ***
******* Var env *******
[isX64] 0
[APPDATA] c:\documents and settings\truc\application data
[DESKTOP] c:\documents and settings\truc\bureau
[CAPPDATA] c:\documents and settings\all users\application data
[CDESKTOP] c:\documents and settings\all users\bureau
[CDOCS] c:\documents and settings\all users\documents
[CPROG] c:\documents and settings\all users\menu démarrer\programmes
[CSTARTMENU] c:\documents and settings\all users\menu démarrer
[DOCS] c:\documents and settings\truc\mes documents
[FAVS] c:\documents and settings\truc\favoris
[LAPPDATA] c:\documents and settings\truc\local settings\application data
[MUSIC] c:\documents and settings\truc\mes documents\ma musique
[PICTS] c:\documents and settings\truc\mes documents\mes images
[PROG] c:\program files
[PROGX86]
[QUICKLNCH] c:\documents and settings\truc\application data\microsoft\internet explorer\quick launch
[STARTMENU] c:\documents and settings\truc\menu démarrer
[SYS32] c:\windows\system32
[SYSWOW64] c:\windows\system32
[TMP] c:\documents and settings\truc\local settings\temp
[USER] c:\documents and settings\truc
[VIDEOS] c:\documents and settings\truc\mes documents\mes vidéos
[WINDOWS] c:\windows
[STARTUP FOLDER] c:\documents and settings\truc\menu démarrer\programmes\démarrage
[CSTARTUP FOLDER] c:\documents and settings\all users\menu démarrer\programmes\démarrage
***********************
******* Previous Run *******
*** NONE
¤¤¤ Processus malicieux: 0 ¤¤¤
¤¤¤ Entrees de registre: 0 ¤¤¤
¤¤¤ Fichiers / Dossiers particuliers: ¤¤¤
¤¤¤ Driver: [CHARGE] ¤¤¤
SSDT[25] : NtClose @ 0x805BC530 -> HOOKED (Unknown @ 0xBA76DB4C)
SSDT[41] : NtCreateKey @ 0x806240F0 -> HOOKED (Unknown @ 0xBA76DB06)
SSDT[50] : NtCreateSection @ 0x805AB3C8 -> HOOKED (Unknown @ 0xBA76DB56)
SSDT[53] : NtCreateThread @ 0x805D1018 -> HOOKED (Unknown @ 0xBA76DAFC)
SSDT[63] : NtDeleteKey @ 0x8062458C -> HOOKED (Unknown @ 0xBA76DB0B)
SSDT[65] : NtDeleteValueKey @ 0x8062475C -> HOOKED (Unknown @ 0xBA76DB15)
SSDT[68] : NtDuplicateObject @ 0x805BE008 -> HOOKED (Unknown @ 0xBA76DB47)
SSDT[98] : NtLoadKey @ 0x80626314 -> HOOKED (Unknown @ 0xBA76DB1A)
SSDT[122] : NtOpenProcess @ 0x805CB440 -> HOOKED (Unknown @ 0xBA76DAE8)
SSDT[128] : NtOpenThread @ 0x805CB6CC -> HOOKED (Unknown @ 0xBA76DAED)
SSDT[177] : NtQueryValueKey @ 0x80622314 -> HOOKED (Unknown @ 0xBA76DB6F)
SSDT[193] : NtReplaceKey @ 0x806261C4 -> HOOKED (Unknown @ 0xBA76DB24)
SSDT[200] : NtRequestWaitReplyPort @ 0x805A2D76 -> HOOKED (Unknown @ 0xBA76DB60)
SSDT[204] : NtRestoreKey @ 0x80625AD0 -> HOOKED (Unknown @ 0xBA76DB1F)
SSDT[213] : NtSetContextThread @ 0x805D173A -> HOOKED (Unknown @ 0xBA76DB5B)
SSDT[237] : NtSetSecurityObject @ 0x805C062E -> HOOKED (Unknown @ 0xBA76DB65)
SSDT[247] : NtSetValueKey @ 0x80622662 -> HOOKED (Unknown @ 0xBA76DB10)
SSDT[255] : NtSystemDebugControl @ 0x806180BA -> HOOKED (Unknown @ 0xBA76DB6A)
SSDT[257] : NtTerminateProcess @ 0x805D29E2 -> HOOKED (Unknown @ 0xBA76DAF7)
S_SSDT[549] : Unknown -> HOOKED (Unknown @ 0xBA76DB7E)
S_SSDT[552] : Unknown -> HOOKED (Unknown @ 0xBA76DB83)
IRP[IRP_MJ_CREATE] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_CLOSE] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_DEVICE_CONTROL] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_INTERNAL_DEVICE_CONTROL] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_SYSTEM_CONTROL] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
IRP[IRP_MJ_DEVICE_CHANGE] : Unknown -> HOOKED ([MAJOR] atapi.sys @ 0xB9DFEB40)
¤¤¤ Infection : ¤¤¤
¤¤¤ Fichier HOSTS: ¤¤¤
127.0.0.1 localhost
127.0.0.1 www.007guard.com
127.0.0.1 007guard.com
127.0.0.1 008i.com
127.0.0.1 www.008k.com
127.0.0.1 008k.com
127.0.0.1 www.00hq.com
127.0.0.1 00hq.com
127.0.0.1 010402.com
127.0.0.1 www.032439.com
127.0.0.1 032439.com
127.0.0.1 www.0scan.com
127.0.0.1 0scan.com
127.0.0.1 1000gratisproben.com
127.0.0.1 www.1000gratisproben.com
127.0.0.1 www.1001namen.com
127.0.0.1 1001namen.com
127.0.0.1 www.100888290cs.com
127.0.0.1 100888290cs.com
127.0.0.1 www.100sexlinks.com
[...]
¤¤¤ MBR Verif: ¤¤¤
+++++ PhysicalDrive0: MAXTOR STM3500320AS +++++
--- User ---
[MBR] 831d9681d5fafaf207a5a660287f4e56
[BSP] 6d2de05141d6f1f7dd08e3138bdb3ffb : Windows XP MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 476929 Mo
User = LL1 ... OK!
User = LL2 ... OK!
Termine : << RKreport[5].txt >>
RKreport[1].txt ; RKreport[2].txt ; RKreport[3].txt ; RKreport[4].txt ; RKreport[5].txt
Ce n'est pas le bon rapport.
Tu devrais avoir un dossier RK_Quarantine sur ton Bureau, c'est dedans que tu trouveras le fichier debug.
Tu devrais avoir un dossier RK_Quarantine sur ton Bureau, c'est dedans que tu trouveras le fichier debug.