cjoint

Publicité

Priorité au Logiciel Libre! Je soutiens l'April.

Publicité

Priorité au Logiciel Libre! Je soutiens l'April.

Format du document : text/plain

Prévisualisation

Rapport de ZHPDiag v2013.4.7.45 par Nicolas Coolman, Update du 07/04/2013
Run by Pixis at 10/04/2013 00:14:21
State : Nouvelle version disponible
High Elevated Privileges : OK
UAC : Deactivate by program


---\\ Web Browser
MSIE: Internet Explorer v10.0.9200.16521
MFIE: Mozilla Firefox 19.0.2 v19.0.2 (Defaut)
GCIE: Google Chrome v26.0.1410.43

---\\ Windows Product Information
~ Langage: Fran�ais
Windows 7 Home Premium Edition, 64-bit Service Pack 1 (Build 7601)
Windows Server License Manager Script : OK
~ Windows(R) 7, OEM_SLP channel
System Locked Preinstallation (OEM_SLP) : OK
Windows ID Activation : OK
~ Windows Partial Key : 3Q6C9
Windows License : OK
~ Windows Remaining Initializations Number : 0
Software Protection Service (Protection logicielle) : OK
Windows Automatic Updates : OK
Windows Activation Technologies : OK

---\\ System Information
~ Processor: Intel64 Family 6 Model 58 Stepping 9, GenuineIntel
~ Operating System: 64 Bits
Boot mode: Normal (Normal boot)
Total RAM: 6039 MB (58% free)
System Restore: Activ� (Enable)
System drive C: has 498 GB (64%) free of 768 GB

---\\ Logged in mode
~ Computer Name: BETEZED
~ User Name: Pixis
~ All Users Names: UpdatusUser, Pixis, HomeGroupUser$, Guest, Administrator,
~ Unselected Option: None
Logged in as Administrator

---\\ Environnement Variables
~ System Unit : C:\
~ %AppData% : C:\Users\Pixis\AppData\Roaming\
~ %Desktop% : C:\Users\Pixis\Desktop\
~ %Favorites% : C:\Users\Pixis\Favorites\
~ %LocalAppData% : C:\Users\Pixis\AppData\Local\
~ %StartMenu% : C:\Users\Pixis\AppData\Roaming\Microsoft\Windows\Start Menu\
~ %Windir% : C:\Windows\
~ %System% : C:\Windows\System32\

---\\ DOS/Devices
C:\ Hard drive, Flash drive, Thumb drive (Free 498 Go of 768 Go)
D:\ Hard drive, Flash drive, Thumb drive (Free 2 Go of 21 Go)
E:\ CD-ROM drive (Free 0 Go of 0 Go)
F:\ Floppy drive, Flash card reader, USB Key (Free 1 Go of 2 Go)
G:\ Hard drive, Flash drive, Thumb drive (Free 143 Go of 143 Go)
H:\ CD-ROM drive (Not Inserted)
K:\ Floppy drive, Flash card reader, USB Key (Free 13 Go of 14 Go)



---\\ Security Center & Tools Informations
[HKLM\SOFTWARE\Microsoft\Security Center\Svc] AntiSpywareOverride: OK
[HKLM\SOFTWARE\Microsoft\Security Center\Svc] AntiVirusOverride: OK
[HKLM\SOFTWARE\Microsoft\Security Center\Svc] FirewallOverride: OK
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer] NoActiveDesktopChanges: Modified
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system] EnableLUA: OK
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\NOHIDDEN] CheckedValue: OK
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL] CheckedValue: OK
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Associations] Application: OK
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] Shell: OK
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\Results\Install] LastSuccessTime : OK
~ Security Center: Scanned in 00mn 00s



---\\ Recherche particuli�re de fichiers g�n�riques
[MD5.332FEAB1435662FC6C672E25BEB37BE3] - (.Microsoft Corporation - Explorateur Windows.) (.01/03/2012 - 00:24:58.) -- C:\Windows\Explorer.exe [2871808]
[MD5.94355C28C1970635A31B3FE52EB7CEBA] - (.Microsoft Corporation - Application de d�marrage de Windows.) (.14/07/2009 - 02:39:52.) -- C:\Windows\System32\Wininit.exe [129024]
[MD5.69F1D418B4C4EC23033D598E4CBC6B73] - (.Microsoft Corporation - Extensions Internet pour Win32.) (.19/03/2013 - 01:59:21.) -- C:\Windows\System32\wininet.dll [2240512]
[MD5.1151B1BAA6F350B1DB6598E0FEA7C457] - (.Microsoft Corporation - Application d�ouverture de session Windows.) (.21/11/2010 - 04:24:29.) -- C:\Windows\System32\Winlogon.exe [390656]
[MD5.067FA52BFB59A56110A12312EF9AF243] - (.Microsoft Corporation - Biblioth�que de licences.) (.21/11/2010 - 04:24:16.) -- C:\Windows\System32\sppcomapi.dll [232448]
[MD5.1C7857B62DE5994A75B054A9FD4C3825] - (.Microsoft Corporation - Ancillary Function Driver for WinSock.) (.28/12/2011 - 04:59:24.) -- C:\Windows\system32\Drivers\AFD.sys [498688]
[MD5.02062C0B390B7729EDC9E69C680A6F3C] - (.Microsoft Corporation - ATAPI IDE Miniport Driver.) (.14/07/2009 - 02:52:21.) -- C:\Windows\system32\Drivers\atapi.sys [24128]
[MD5.B8BD2BB284668C84865658C77574381A] - (.Microsoft Corporation - CD-ROM File System Driver.) (.14/07/2009 - 00:19:47.) -- C:\Windows\system32\Drivers\Cdfs.sys [92160]
[MD5.F036CE71586E93D94DAB220D7BDF4416] - (.Microsoft Corporation - SCSI CD-ROM Driver.) (.21/11/2010 - 04:23:47.) -- C:\Windows\system32\Drivers\Cdrom.sys [147456]
[MD5.9BB2EF44EAA163B29C4A4587887A0FE4] - (.Microsoft Corporation - DFS Namespace Client Driver.) (.21/11/2010 - 04:24:32.) -- C:\Windows\system32\Drivers\DfsC.sys [102400]
[MD5.97BFED39B6B79EB12CDDBFEED51F56BB] - (.Microsoft Corporation - High Definition Audio Bus Driver.) (.21/11/2010 - 04:23:47.) -- C:\Windows\system32\Drivers\HDAudBus.sys [122368]
[MD5.FA55C73D4AFFA7EE23AC4BE53B4592D3] - (.Microsoft Corporation - Pilote de port i8042.) (.14/07/2009 - 00:19:57.) -- C:\Windows\system32\Drivers\i8042prt.sys [105472]
[MD5.AF9B39A7E7B6CAA203B3862582E9F2D0] - (.Microsoft Corporation - IP Network Address Translator.) (.14/07/2009 - 01:10:03.) -- C:\Windows\system32\Drivers\IpNat.sys [116224]
[MD5.A5D9106A73DC88564C825D317CAC68AC] - (.Microsoft Corporation - Windows NT SMB Minirdr.) (.01/03/2012 - 00:26:44.) -- C:\Windows\system32\Drivers\MRxSmb.sys [158208]
[MD5.09594D1089C523423B32A4229263F068] - (.Microsoft Corporation - MBT Transport driver.) (.21/11/2010 - 04:23:51.) -- C:\Windows\system32\Drivers\netBT.sys [261632]
[MD5.E453ACF4E7D44E5530B5D5F2B9CA8563] - (.Microsoft Corporation - Pilote du syst�me de fichiers NT.) (.31/08/2012 - 19:19:35.) -- C:\Windows\system32\Drivers\ntfs.sys [1659760]
[MD5.0086431C29C35BE1DBC43F52CC273887] - (.Microsoft Corporation - Pilote de port parall�le.) (.14/07/2009 - 01:00:41.) -- C:\Windows\system32\Drivers\Parport.sys [97280]
[MD5.471815800AE33E6F1C32FB1B97C490CA] - (.Microsoft Corporation - RAS L2TP mini-port/call-manager driver.) (.21/11/2010 - 04:24:33.) -- C:\Windows\system32\Drivers\Rasl2tp.sys [129536]
[MD5.548260A7B8654E024DC30BF8A7C5BAA4] - (.Microsoft Corporation - SMB Transport driver.) (.14/07/2009 - 01:09:09.) -- C:\Windows\system32\Drivers\smb.sys [93184]
[MD5.DDAD5A7AB24D8B65F8D724F5C20FD806] - (.Microsoft Corporation - TDI Translation Driver.) (.21/11/2010 - 04:24:32.) -- C:\Windows\system32\Drivers\tdx.sys [119296]
[MD5.DF8126BD41180351A093A3AD2FC8903B] - (.Microsoft Corporation - Pilote de clich� instantan� du volume.) (.01/03/2012 - 00:23:22.) -- C:\Windows\system32\Drivers\volsnap.sys [296320]
~ Generic Processes: Scanned in 00mn 00s



---\\ Etat des fichiers cach�s (Cach�/Total)
~ Mes musiques (My Musics) : 1/2197
~ Mes Videos (My Videos) : 1/171
~ Mes Favoris (My Favorites) : 1/11
~ Mes Documents (My Documents) : 1/6156
~ Mon Bureau (My Desktop) : 1/19911
~ Menu demarrer (Programs) : 1/32
~ Hidden Files: Scanned in 00mn 19s



---\\ Processus lanc�s
[MD5.F88D89A73142BA1148453654EEC12E02] - (.HP - BioMonitor.) -- C:\Program Files (x86)\HP SimplePass\BioMonitor.exe [148296] [PID.4604]
[MD5.3D710201E462BF75843CFDF7EA83928B] - (.Google - Google Drive.) -- C:\Program Files (x86)\Google\Drive\googledrivesync.exe [19357112] [PID.4448]
[MD5.7E4E3EE20FF5D10A60E6267A8EE67786] - (.Intel Corporation - Intel(R) USB 3.0 Monitor.) -- C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe [291096] [PID.4476]
[MD5.BD15FC46496D6291BEA63F37A291F95A] - (.Hewlett-Packard Development Company, L.P. - HP Message Service.) -- C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch\HPMSGSVC.exe [576568] [PID.4484]
[MD5.8A3B69683E63808719D24E1C68C21CC7] - (.Hewlett-Packard Development Company, L.P. - HP On Screen Display.) -- C:\Program Files (x86)\Hewlett-Packard\HP On Screen Display\HPOSD.exe [379960] [PID.4532]
[MD5.148C545849C1379A3D4448F5DE768E86] - (.AVAST Software - avast! Antivirus.) -- C:\Program Files\AVAST Software\Avast\AvastUI.exe [4767304] [PID.4560]
[MD5.E6DEED311D830678E1A0B4889F3C2F0E] - (.UASSOFT.COM - DRIVER AUTORUN.) -- C:\Program Files (x86)\Multimedia Mouse Driver\V5\StartAutorun.exe [212992] [PID.1188]
[MD5.053B2F7FA7BB1BE106D21844FA4AAD39] - (.UASSOFT.COM - USB Keyboard And PS/2 Keyboard Driver.) -- C:\Program Files (x86)\Multimedia Mouse Driver\V5\KMConfig.exe [1470464] [PID.1648]
[MD5.B7F55E2AE978D3D34F7876EE5D689AAE] - (.CyberLink - YouCam Mirage.) -- C:\Program Files (x86)\CyberLink\YouCam\YCMMirage.exe [136488] [PID.5296]
[MD5.12401502481540DE194408F8CE71C5F3] - (.UASSOFT.COM - Keyboard And Mouse Processing.) -- C:\Program Files (x86)\Multimedia Mouse Driver\V5\KMProcess.exe [561152] [PID.5544]
[MD5.73F3118CD145756A812A2529281D6F36] - (.AuthenTec Inc. - TouchControl.) -- C:\Program Files (x86)\HP SimplePass\TouchControl.exe [875336] [PID.4024]
[MD5.BF2F2717C13A4BD4FD73F2788534E86B] - (.Mozilla Corporation - Firefox.) -- C:\Program Files (x86)\Mozilla Firefox\firefox.exe [917400] [PID.6276]
[MD5.605664E657464F558F51C84A0F93029F] - (.Nicolas Coolman - ZHPDiag.) -- C:\Program Files (x86)\ZHPDiag\ZHPDiag.exe [6558208] [PID.5932]
[MD5.AA6844A5127ED4B20DF6D313467B929D] - (.Mozilla Corporation - Plugin Container for Firefox.) -- C:\Program Files (x86)\Mozilla Firefox\plugin-container.exe [17304] [PID.4632]
[MD5.680AD8F376970696B45269F074A8A28E] - (.Adobe Systems, Inc. - Adobe Flash Player 11.6 r602.) -- C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerPlugin_11_6_602_180.exe [1822424] [PID.1680]
[MD5.BA0F98B69D84EFAE63EA80A957F9EF31] - (.HP - HP Service.) -- C:\Program Files (x86)\HP SimplePass\TrueSuiteService.exe [260424] [PID.452]
[MD5.41735B82DB57E4EBE9504EC400FD120E] - (.AVAST Software - avast! Service.) -- C:\Program Files\AVAST Software\Avast\AvastSvc.exe [45248] [PID.1588]
[MD5.3927397AC60D943DAF8808AFFED582B7] - (.Adobe Systems Incorporated - Adobe Acrobat Update Service.) -- C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe [65192] [PID.2352]
[MD5.CA793DCC1D5F619021EF1D37CC7A831E] - (.EasyBits Software AS - Shared EasyBits services for Windows.) -- C:\Windows\SysWOW64\ezSharedSvcHost.exe [514232] [PID.2448]
[MD5.3D85344F1B6A74B5EB1D97BB8DAEE224] - (.Hewlett-Packard Company - HP Quick Synchronization Service.) -- C:\Program Files (x86)\Hewlett-Packard\Shared\HPDrvMntSvc.exe [227896] [PID.2572]
[MD5.77C15D7E8F002A173EEBFF0B20CD697D] - (.Hewlett-Packard Development Company, L.P. - HP Quick Launch WMI Service.) -- C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch\HPWMISVC.exe [34872] [PID.2600]
[MD5.C9DCE1CB628AEED3C0C30ABBF4F1E718] - (...) -- C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\FWService\IntelMeFWService.exe [128280] [PID.2688]
[MD5.3628933AF5305EAB8173949BFF912F04] - (.Intel Corporation - Intel(R) Dynamic Application Loader Host In.) -- C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe [161560] [PID.2720]
[MD5.F1D29D9C5DB9C144769F5CD7212BE555] - (.VMware, Inc. - VMware NAT Service.) -- C:\Windows\SysWOW64\vmnat.exe [435864] [PID.2868]
[MD5.7171B884DA8BFB1CE5C8BAE46D993CB1] - (.VMware, Inc. - VMware Authorization Service.) -- C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe [79872] [PID.3036]
[MD5.03A7980C30E9F00F1EAC752612DC80CE] - (.VMware, Inc. - VMware VMnet DHCP service.) -- C:\Windows\SysWOW64\vmnetdhcp.exe [357016] [PID.1764]
[MD5.5C6121C09B35B01705EEF7B948B92338] - (...) -- C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe [15680000] [PID.3168]
[MD5.7BBD5B17B77CE24BAB3ADF54991ABB36] - (.Hewlett-Packard Company - HP Software Framework WMI Service.) -- C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe [981048] [PID.5600]
[MD5.506708142BC63DABA64F2D3AD1DCD5BF] - (.Google Inc. - Programme d'installation de Google.) -- C:\Program Files (x86)\Google\Update\GoogleUpdate.exe [116648] [PID.2120]
[MD5.7D4B9A48430ED57ACA6373B71D5904CA] - (.Intel Corporation - IAStorDataSvc.) -- C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe [13592] [PID.5016]
[MD5.BF22ACF4CF3734D61357E67F0521BC03] - (.Intel Corporation - Local Manageability Service.) -- C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe [277784] [PID.7028]
[MD5.FD6F5B42DB429FD1AE1A4483DB4DD2E0] - (.NVIDIA Corporation - NVIDIA Settings Update Manager.) -- C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\daemonu.exe [2458944] [PID.7092]
[MD5.B097EBA0E3FEB020BB65FE43AF5ECCFF] - (.Intel Corporation - User Notification Service.) -- C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe [363800] [PID.992]
~ Processes Running: Scanned in 00mn 01s



---\\ Google Chrome, D�marrage,Recherche,Extensions (G0,G1,G2)
C:\Users\Pixis\AppData\Local\Google\Chrome\User Data\Default\Preferences
G1 - GCS: Preference [User Data\Default] None
~ Google Browser: Scanned in 00mn 00s



---\\ Mozilla Firefox, Plugins,Demarrage,Recherche,Extensions (P2,M0,M1,M2,M3)
C:\Users\Pixis\AppData\Roaming\Mozilla\Firefox\Profiles\apuifor4.default\prefs.js
M0 - MFSP: prefs.js [Pixis - apuifor4.default] http://www.facebook.com
P2 - FPN: [HKCU] [pandonetworks.com/PandoWebPlugin] - (.Pando Networks - Pando Web Plugin.) -- C:\Program Files (x86)\Pando Networks\Media Booster\npPandoWebPlugin.dll
~ Firefox Browser: 14 Legitimates Scanned in 00mn 00s



---\\ Internet Explorer, D�marrage,Recherche,URLSearchHook, Phishing (R0,R1,R3,R4)
R0 - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://g.uk.msn.com
R0 - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com
R0 - HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com
R1 - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com
R1 - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Page_URL = http://g.uk.msn.com
R1 - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Extensions Off Page = about:noadd-ons
R1 - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Security Risk Page = about:securityrisk
R1 - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com
R1 - HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Main,Extensions Off Page = about:noadd-ons
R1 - HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Main,Security Risk Page = about:securityrisk
R3 - URLSearchHook: Microsoft Url Search Hook [64Bits] - {CFBFAE00-17A6-11D0-99CB-00C04FD64497} . (.Microsoft Corporation - Navigateur Internet.) (10.00.9200.16521 (win8_gdr_soc_ie.130216-2100)) -- C:\Windows\SysWOW64\ieframe.dll
~ IE Browser: Scanned in 00mn 00s



---\\ Internet Explorer, Proxy Management (R5)
R5 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = no key
R5 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyEnable = 0
R5 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,MigrateProxy = 1
R5 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,EnableHttp1_1 = 1
R5 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigProxy = wininet.dll
~ Proxy management: Scanned in 00mn 00s



---\\ Analyse des lignes F0, F1, F2, F3 - IniFiles, Autoloading programs
F2 - REG:system.ini: USERINIT=C:\Windows\system32\userinit.exe,
F2 - REG:system.ini: Shell=C:\Windows\explorer.exe
F2 - REG:system.ini: VMApplet=C:\Windows\System32\SystemPropertiesPerformance.exe
~ Keys: Scanned in 00mn 00s



---\\ Redirection du fichier Hosts (O1)
~ Le fichier hosts est sain (The hosts file is clean).
~ Hosts File: Scanned in 00mn 00s
~ Nombre de lignes (Lines number): 21



---\\ Browser Helper Objects de navigateur (O2)
~ BHO: 5 Legitimates Scanned in 00mn 00s



---\\ Internet Explorer Toolbars (O3)
O3 - Toolbar: HP SimplePass Toolbar [64Bits] - [HKLM]{C98EE38D-21E4-4A50-907D-2B56FEC7013E} . (.HP - Website Log On.) -- C:\Program Files (x86)\HP SimplePass\IEBHO.dll
O3 - Toolbar: (no name) [64Bits] - [HKLM]{318A227B-5E9F-45bd-8999-7F8F10CA4CF5} Cl� orpheline
~ Toolbar: Scanned in 00mn 00s



---\\ Applications d�marr�es par registre & par dossier (O4)
O4 - HKLM\..\Run: [IgfxTray] . (.Intel Corporation - igfxTray Module.) -- C:\Windows\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] . (.Intel Corporation - hkcmd Module.) -- C:\Windows\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] . (.Intel Corporation - persistence Module.) -- C:\Windows\system32\igfxpers.exe
O4 - HKLM\..\Run: [SysTrayApp] . (.IDT, Inc. - IDT PC Audio.) -- C:\Program Files\IDT\WDM\sttray64.exe
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files (x86)\Synaptics\SynTP\SynTPEnh.exe (.not file.)
O4 - HKLM\..\Run: [AdobeAAMUpdater-1.0] . (.Adobe Systems Incorporated - Adobe Updater Startup Utility.) -- C:\Program Files (x86)\Common Files\Adobe\OOBE\PDApp\UWA\UpdaterStartupUtility.exe
O4 - HKCU\..\Run: [AdobeBridge] Cl� orpheline
O4 - HKCU\..\Run: [GoogleDriveSync] . (.Google - Google Drive.) -- C:\Program Files (x86)\Google\Drive\googledrivesync.exe
O4 - HKLM\..\Wow6432Node\Run: [USB3MON] . (.Intel Corporation - Intel(R) USB 3.0 Monitor.) -- C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe
O4 - HKLM\..\Wow6432Node\Run: [HP Quick Launch] . (.Hewlett-Packard Development Company, L.P. - HP Message Service.) -- C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch\HPMSGSVC.exe
O4 - HKLM\..\Wow6432Node\Run: [HPOSD] . (.Hewlett-Packard Development Company, L.P. - HP On Screen Display.) -- C:\Program Files (x86)\Hewlett-Packard\HP On Screen Display\HPOSD.exe
O4 - HKLM\..\Wow6432Node\Run: [avast] . (.AVAST Software - avast! Antivirus.) -- C:\Program Files\AVAST Software\Avast\avastUI.exe
O4 - HKLM\..\Wow6432Node\Run: [KMConfig] . (.UASSOFT.COM - DRIVER AUTORUN.) -- C:\Program Files (x86)\Multimedia Mouse Driver\V5\StartAutorun.exe
O4 - HKLM\..\Wow6432Node\Run: [SwitchBoard] . (.Adobe Systems Incorporated - SwitchBoard Server (32 bit).) -- C:\Program Files (x86)\Common Files\Adobe\SwitchBoard\SwitchBoard.exe
O4 - HKLM\..\Wow6432Node\Run: [AdobeCS6ServiceManager] . (.Adobe Systems Incorporated - Adobe CS6 Service Manager.) -- C:\Program Files (x86)\Common Files\Adobe\CS6ServiceManager\CS6ServiceManager.exe
O4 - HKLM\..\Wow6432Node\Run: [AdobeCS5.5ServiceManager] . (.Adobe Systems Incorporated - Adobe CS5.5 Service Manager.) -- C:\Program Files (x86)\Common Files\Adobe\CS5.5ServiceManager\CS5.5ServiceManager.exe
O4 - HKLM\..\Wow6432Node\Run: [Adobe ARM] . (.Adobe Systems Incorporated - Adobe Reader and Acrobat Manager.) -- C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe
O4 - HKLM\..\Wow6432Node\RunOnce: [SymSilent] . (.Symantec Corporation - Symantec Application.) -- C:\Program Files (x86)\SymSilent\SymSilent.exe
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] . (.Microsoft Corporation - Gadgets du Bureau Windows.) -- C:\Program Files (x86)\Windows Sidebar\Sidebar.exe
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] . (.Microsoft Corporation - Gadgets du Bureau Windows.) -- C:\Program Files (x86)\Windows Sidebar\Sidebar.exe
O4 - HKUS\S-1-5-19\..\RunOnce: [mctadmin] . (.Microsoft Corporation - MCTAdmin.) -- C:\Windows\System32\mctadmin.exe
O4 - HKUS\S-1-5-20\..\RunOnce: [mctadmin] . (.Microsoft Corporation - MCTAdmin.) -- C:\Windows\System32\mctadmin.exe
O4 - HKUS\S-1-5-21-1105701712-1843842314-172653648-1001\..\Run: [AdobeBridge] Cl� orpheline
O4 - HKUS\S-1-5-21-1105701712-1843842314-172653648-1001\..\Run: [GoogleDriveSync] . (.Google - Google Drive.) -- C:\Program Files (x86)\Google\Drive\googledrivesync.exe
~ Application: Scanned in 00mn 00s



---\\ Autres liens utilisateurs (O4)
O4 - GS\QuickLaunch: VMware Workstation.lnk . (.VMware, Inc. - VMware Workstation.) -- C:\Program Files (x86)\VMware\VMware Workstation\vmware.exe
O4 - GS\QuickLaunch: Wireshark.lnk . (.The Wireshark developer community, http://w - Wireshark.) -- C:\Program Files\Wireshark\wireshark.exe
O4 - GS\Accessories: Private Character Editor.lnk . (.Microsoft Corporation - �diteur de caract�res priv�s.) -- C:\Windows\system32\eudcedit.exe
O4 - GS\SendTo: Fax Recipient.lnk . (.Microsoft Corporation - Microsoft Windows Fax and Scan.) -- C:\Windows\system32\WFS.exe
O4 - GS\Desktop: HijackThis.lnk . (.Trend Micro Inc. - HijackThis.) -- C:\Program Files (x86)\Trend Micro\HiJackThis\HiJackThis.exe
O4 - GS\Desktop: MASM32 Editor.lnk . (.Steve Hutchesson - MASM32 Code Editor.) -- C:\masm32\qeditor.exe
O4 - GS\Desktop: TreeDBNotes Pro 4.lnk . (.SoftArtStudio - TreeDBNotes - Notes manager.) -- C:\Program Files (x86)\TreeDBNotes Pro 4\TreeDBNotes.exe
O4 - GS\Desktop: VB Decompiler Pro.lnk . (.GPcH Soft - VB P-Code, Native Code Decompiler.) -- C:\Program Files (x86)\VB Decompiler Pro\VB Decompiler.exe
O4 - GS\TaskBar: Adobe After Effects CS6.lnk . (.Adobe Systems Incorporated - Adobe After Effects CS6.) -- C:\Program Files\Adobe\Adobe After Effects CS6\Support Files\AfterFX.exe
O4 - GS\TaskBar: Adobe Dreamweaver CS6.lnk . (.Adobe Systems, Inc. - Adobe Dreamweaver CS6.) -- C:\Program Files (x86)\Adobe\Adobe Dreamweaver CS6\Dreamweaver.exe
O4 - GS\TaskBar: Adobe Illustrator CS6 (64 Bit).lnk . (.Adobe Systems Inc. - Adobe Illustrator CS6.) -- C:\Program Files\Adobe\Adobe Illustrator CS6 (64 Bit)\Support Files\Contents\Windows\Illustrator.exe
O4 - GS\TaskBar: Adobe Photoshop CS6 (64 Bit).lnk . (.Adobe Systems, Incorporated - Adobe Photoshop CS6.) -- C:\Program Files\Adobe\Adobe Photoshop CS6 (64 Bit)\Photoshop.exe
O4 - GS\TaskBar: CINEMA 4D 64 Bit.lnk . (.MAXON Computer GmbH - CINEMA 4D �.) -- C:\Program Files\MAXON\CINEMA 4D R13\CINEMA 4D 64 Bit.exe
O4 - GS\TaskBar: FormatFactory.lnk . (.Free Time - FormatFactory.) -- C:\Program Files (x86)\FreeTime\FormatFactory\FormatFactory.exe
O4 - GS\TaskBar: Google Chrome.lnk . (.Google Inc. - Google Chrome.) -- C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
O4 - GS\TaskBar: Minecraft.lnk . (...) -- C:\Users\Pixis\Desktop\Minecraft.exe
O4 - GS\TaskBar: Mozilla Firefox.lnk . (.Mozilla Corporation - Firefox.) -- C:\Program Files (x86)\Mozilla Firefox\firefox.exe
O4 - GS\TaskBar: Vegas Pro 12.0 (64-bit).lnk . (...) -- C:\Program Files (x86)\Sony\Vegas Pro 12.0\vegas120.exe (.not file.)
O4 - GS\TaskBar: Winamp.lnk . (.Nullsoft, Inc. - Winamp.) -- C:\Program Files (x86)\Winamp\winamp.exe
O4 - GS\TaskBar: Windows Explorer.lnk . (.Microsoft Corporation - Explorateur Windows.) -- C:\Windows\explorer.exe
O4 - GS\Programs: Internet Explorer.lnk . (.Microsoft Corporation - Internet Explorer.) -- C:\Program Files (x86)\Internet Explorer\iexplore.exe
O4 - GS\QuickLaunch: Google Chrome.lnk . (.Google Inc. - Google Chrome.) -- C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
O4 - GS\QuickLaunch: Launch Internet Explorer Browser.lnk . (.Microsoft Corporation - Internet Explorer.) -- C:\Program Files (x86)\Internet Explorer\iexplore.exe
O4 - GS\QuickLaunch: Vuze.lnk . (.Vuze Inc. - Pas de description.) -- C:\Program Files (x86)\Vuze\Azureus.exe
O4 - GS\QuickLaunch: Zoner Photo Studio 15 x64.lnk . (.ZONER software - Zoner Photo Studio 15.) -- C:\Program Files\Zoner\Photo Studio 15\Program64\Zps.exe
O4 - GS\QuickLaunch: Zoner Photo Studio 15.lnk . (.ZONER software - Zoner Photo Studio 15.) -- C:\Program Files\Zoner\Photo Studio 15\Program32\Zps.exe
O4 - GS\Accessories: Internet Explorer (No Add-ons).lnk . (.Microsoft Corporation - Internet Explorer.) -- C:\Program Files (x86)\Internet Explorer\iexplore.exe
O4 - GS\SendTo: Format Factory.lnk . (.Free Time - FormatFactory.) -- C:\Program Files (x86)\FreeTime\FormatFactory\FormatFactory.exe
O4 - GS\Desktop: Google Drive.lnk . (...) -- C:\Users\Pixis\Google Drive
O4 - GS\Desktop: HiJackThis.lnk . (.Trend Micro Inc. - HijackThis.) -- C:\Users\Pixis\AppData\Roaming\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
O4 - GS\Desktop: Portrait Professional Studio 10.lnk . (.Anthropics Technology Ltd. - Portrait Professional.) -- C:\Program Files (x86)\Portrait Professional Studio 10\PortraitProfessionalStudio.exe
O4 - GS\TaskBar: HP Recommended.LNK . (...) -- C:\Program Files (x86)\Hewlett-Packard\HP LaunchBox\HPTaskBar1.exe (.not file.)
O4 - GS\TaskBar: Internet Explorer (2).lnk . (.Microsoft Corporation - Internet Explorer.) -- C:\Program Files (x86)\Internet Explorer\iexplore.exe
O4 - GS\TaskBar: Internet Explorer (3).lnk . (.Microsoft Corporation - Internet Explorer.) -- C:\Program Files (x86)\Internet Explorer\iexplore.exe
O4 - GS\TaskBar: Internet Explorer (4).lnk . (.Microsoft Corporation - Internet Explorer.) -- C:\Program Files (x86)\Internet Explorer\iexplore.exe
O4 - GS\TaskBar: Internet Explorer (5).lnk . (.Microsoft Corporation - Internet Explorer.) -- C:\Program Files (x86)\Internet Explorer\iexplore.exe
O4 - GS\TaskBar: Internet Explorer.lnk . (.Microsoft Corporation - Internet Explorer.) -- C:\Program Files (x86)\Internet Explorer\iexplore.exe
O4 - GS\TaskBar: Photos Snapfish (2).lnk . (...) -- C:\Program Files (x86)\Hewlett-Packard\Shared\WizLink.exe
O4 - GS\TaskBar: Photos Snapfish.lnk . (...) -- C:\Program Files (x86)\Hewlett-Packard\Shared\WizLink.exe
O4 - GS\TaskBar: Windows Explorer (2).lnk . (.Microsoft Corporation - Explorateur Windows.) -- C:\Windows\explorer.exe
O4 - GS\TaskBar: Windows Explorer (3).lnk . (.Microsoft Corporation - Explorateur Windows.) -- C:\Windows\explorer.exe
O4 - GS\TaskBar: Windows Explorer (4).lnk . (.Microsoft Corporation - Explorateur Windows.) -- C:\Windows\explorer.exe
O4 - GS\TaskBar: Windows Explorer (5).lnk . (.Microsoft Corporation - Explorateur Windows.) -- C:\Windows\explorer.exe
O4 - GS\TaskBar: Windows Live.LNK . (...) -- C:\Program Files (x86)\Hewlett-Packard\HP LaunchBox\HPTaskBar2.exe (.not file.)
O4 - GS\TaskBar: Windows Media Player (2).lnk . (.Microsoft Corporation - Lecteur Windows Media.) -- C:\Program Files (x86)\Windows Media Player\wmplayer.exe
O4 - GS\TaskBar: Windows Media Player (3).lnk . (.Microsoft Corporation - Lecteur Windows Media.) -- C:\Program Files (x86)\Windows Media Player\wmplayer.exe
O4 - GS\TaskBar: Windows Media Player (4).lnk . (.Microsoft Corporation - Lecteur Windows Media.) -- C:\Program Files (x86)\Windows Media Player\wmplayer.exe
O4 - GS\TaskBar: Windows Media Player (5).lnk . (.Microsoft Corporation - Lecteur Windows Media.) -- C:\Program Files (x86)\Windows Media Player\wmplayer.exe
O4 - GS\TaskBar: Windows Media Player.lnk . (.Microsoft Corporation - Lecteur Windows Media.) -- C:\Program Files (x86)\Windows Media Player\wmplayer.exe
O4 - GS\Programs: Internet Explorer (64-bit).lnk . (.Microsoft Corporation - Internet Explorer.) -- C:\Program Files (x86)\Internet Explorer\iexplore.exe
O4 - GS\SendTo: Skype.lnk . (.Skype Technologies S.A. - Skype.) -- C:\Program Files (x86)\Skype\Phone\Skype.exe
~ Global Startup: Scanned in 00mn 01s



---\\ Invisibilit� de l'ic�ne d'options IE dans le panneau de Configuration (O5)
~ IE Control Panel: 1 Legitimates Scanned in 00mn 00s



---\\ Boutons situ�s sur la barre d'outils principale d'Internet Explorer (O9)
O9 - Extra button: &Envoyer � OneNote [64Bits] - {2670000A-7350-4f3c-8081-5663EE0C6C49} -- C:\Program Files (x86)\MICROS~2\Office14\ONBttnIE.dll (.not file.)
O9 - Extra button: Notes &li�es OneNote [64Bits] - {789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} -- C:\Program Files (x86)\MICROS~2\Office14\ONBTTN~1.dll (.not file.)
O9 - Extra button: @C:\Program Files\WIDCOMM\Bluetooth Software\btrez.dll,-12650 [64Bits] - {CCA281CA-C863-46ef-9331-5C8D4460577F} . (...) -- C:\Program Files\WIDCOMM\Bluetooth Software\bt_hot_icon.ico
~ IE Extra Buttons: Scanned in 00mn 00s



---\\ Winsock hijacker (Layered Service Provider) (O10)
~ Winsock: 9 Legitimates Scanned in 00mn 00s



---\\ Modification Domaine/Adresses DNS (O17)
O17 - HKLM\System\CCS\Services\Tcpip\..\{3B57DFCB-1C81-4D60-820C-3F25F32C023F}: DhcpNameServer = 192.168.1.1
O17 - HKLM\System\CCS\Services\Tcpip\..\{4391CABB-84DD-4655-8752-71EF1CC9B5BE}: DhcpNameServer = 192.169.0.2
O17 - HKLM\System\CS1\Services\Tcpip\..\{3B57DFCB-1C81-4D60-820C-3F25F32C023F}: DhcpNameServer = 192.168.1.1
O17 - HKLM\System\CS1\Services\Tcpip\..\{4391CABB-84DD-4655-8752-71EF1CC9B5BE}: DhcpNameServer = 192.169.0.2
O17 - HKLM\System\CS2\Services\Tcpip\..\{3B57DFCB-1C81-4D60-820C-3F25F32C023F}: DhcpNameServer = 192.168.1.1
O17 - HKLM\System\CS2\Services\Tcpip\..\{4391CABB-84DD-4655-8752-71EF1CC9B5BE}: DhcpNameServer = 192.169.0.2
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 192.168.1.1
~ Domain: Scanned in 00mn 00s



---\\ Protocole additionnel (O18)
O18 - Handler: wlpg [64Bits] - {E43EF6CD-A37A-4A9B-9E6F-83F89B8E6324} . (...) --
O18 - Filter: text/xml [64Bits] - {807573E5-5146-11D5-A672-00B0D022E945} . (.Microsoft Corporation - Microsoft Office XML MIME Filter.) -- C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLMF.dll
~ Protocole Additionnel: Scanned in 00mn 00s



---\\ Valeur de Registre AppInit_DLLs et sous-cl�s Winlogon Notify (autorun) (O20)
O20 - Winlogon Notify: igfxcui . (.Intel Corporation - igfxdev Module.) -- C:\Windows\System32\igfxdev.dll
~ Winlogon: Scanned in 00mn 00s



---\\ Valeur de Registre AppInit_DLLs et sous-cl�s Winlogon Notify (autorun) (O20)
O20 - AppInit_DLLs: . (.NVIDIA Corporation - NVIDIA shim initialization dll, Version 295.) - C:\Windows\system32\nvinitx.dll
~ AppInit DLL: Scanned in 00mn 00s



---\\ Cl� de Registre autorun ShellServiceObjectDelayLoad (SSO/SSODL) (O21)
~ SSODL: 1 Legitimates Scanned in 00mn 00s



---\\ Liste des services NT non Microsoft et non d�sactiv�s (O23)
~ Services: 27 Legitimates Scanned in 00mn 07s



---\\ Enum�ration Active Desktop & MHTML Editor (O24)
~ Desktop Component: 1 Legitimates Scanned in 00mn 00s



---\\ BootExecute (O34)
~ BEX: 1 Legitimates Scanned in 00mn 00s



---\\ T�ches planifi�es en automatique (O39)
[MD5.D4C514BC30FE3F70BB529F9CAA70CF0A] [APT] [Hybrid] (...) -- C:\IORRT\IORRT.bat [860]
[MD5.D4C514BC30FE3F70BB529F9CAA70CF0A] [APT] [IORRT] (...) -- C:\IORRT\IORRT.bat [860]
[MD5.ACD698C60D6937D535011BE4E83F7C36] [APT] [Red Giant Link] (...) -- C:\Program Files (x86)\Red Giant Link\Common\Red Giant Link.exe [136192]
~ Scheduled Task: 19 Legitimates Scanned in 00mn 04s



---\\ Composants install�s (ActiveSetup Installed Components) (O40)
~ Active Setup: 10 Legitimates Scanned in 00mn 00s



---\\ Pilotes lanc�s au d�marrage (O41)
~ Drivers: 69 Legitimates Scanned in 00mn 00s



---\\ Logiciels install�s (O42)
O42 - Logiciel: Adobe Flash Player 11 ActiveX - (.Adobe Systems Incorporated.) [HKLM][64Bits] -- Adobe Flash Player ActiveX
O42 - Logiciel: Adobe Flash Player 11 Plugin - (.Adobe Systems Incorporated.) [HKLM][64Bits] -- Adobe Flash Player Plugin
O42 - Logiciel: Adobe Reader X (10.1.6) MUI - (.Adobe Systems Incorporated.) [HKLM][64Bits] -- {AC76BA86-7AD7-FFFF-7B44-AA0000000001}
O42 - Logiciel: CINEMA 4D 13.016 - (.MAXON Computer GmbH.) [HKLM][64Bits] -- MAXONFB05E576
O42 - Logiciel: Explorer Suite III - (...) [HKLM][64Bits] -- Explorer Suite_is1
O42 - Logiciel: Java 7 Update 17 (64-bit) - (.Oracle.) [HKLM][64Bits] -- {26A24AE4-039D-4CA4-87B4-2F86417017FF}
O42 - Logiciel: Multimedia Mouse Driver - (.Nom de votre soci�t�.) [HKLM][64Bits] -- InstallShield_{A9495514-098A-4869-A464-C455857BC464}
O42 - Logiciel: NuMega SmartCheck - (...) [HKLM][64Bits] -- SmartCheck
O42 - Logiciel: NuMega SmartCheck 6.2 - (...) [HKLM][64Bits] -- SmartCheck 6.2
O42 - Logiciel: Pando Media Booster - (.Pando Networks Inc..) [HKLM][64Bits] -- {980A182F-E0A2-4A40-94C1-AE0C1235902E}
O42 - Logiciel: Portrait Professional Studio 10.9 - (.Anthropics Technology Ltd..) [HKLM][64Bits] -- PortraitProfessionalStudio10_is1
O42 - Logiciel: Proteus 7 Professional - (.Labcenter Electronics.) [HKLM][64Bits] -- {13C4E8F0-B747-4C7C-9090-884832F9F90A}
O42 - Logiciel: TreeDBNotes Pro 4 - (...) [HKLM][64Bits] -- TreeDBNotes Pro 4
O42 - Logiciel: Ubuntu - (.Ubuntu.) [HKLM][64Bits] -- Wubi
O42 - Logiciel: VB Decompiler Lite - (.DotFix Software.) [HKLM][64Bits] -- VB Decompiler Lite_is1
O42 - Logiciel: VB Decompiler Pro 3.4 - (.GPcH Soft.) [HKLM][64Bits] -- VB Decompiler Pro_is1
O42 - Logiciel: Vuze - (.Vuze Inc..) [HKLM][64Bits] -- 8461-7759-5462-8226
O42 - Logiciel: avast! Free Antivirus v8.0.1483.0 - (.AVAST Software.) [HKLM][64Bits] -- avast
~ Logic: 155 Legitimates Scanned in 00mn 00s



---\\ HKCU & HKLM Software Keys
[HKCU\Software\Anthropics]
[HKCU\Software\Azureus]
[HKCU\Software\Hex-Rays]
[HKCU\Software\KetilO]
[HKCU\Software\Labcenter Electronics]
[HKCU\Software\MC4D]
[HKCU\Software\Multimedia Combo Set]
[HKCU\Software\NTCore]
[HKCU\Software\NuMega]
[HKCU\Software\Pando Networks]
[HKCU\Software\SoftArtStudio]
[HKCU\Software\ZONER]
[HKLM\Software\MAXON Installer]
[HKLM\Software\Wow6432Node\Anthropics]
[HKLM\Software\Wow6432Node\Azureus]
[HKLM\Software\Wow6432Node\Labcenter Electronics]
[HKLM\Software\Wow6432Node\NuMega]
[HKLM\Software\Wow6432Node\Pando Networks]
[HKLM\Software\Wow6432Node\Windows Data Count]
[HKLM\Software\Wow6432Node\ZONER]
[HKLM\Software\ZONER]
~ Key Software: 257 Legitimates Scanned in 00mn 00s



---\\ Contenu des dossiers Programs/ProgramFiles/ProgramData/AppData (O43)
O43 - CFD: 30/03/2013 - 19:28:25 - [387,948] ----D C:\Program Files (x86)\Labcenter Electronics
O43 - CFD: 01/03/2013 - 19:50:41 - [6,302] ----D C:\Program Files (x86)\Multimedia Mouse Driver
O43 - CFD: 02/04/2013 - 00:15:24 - [12,159] ----D C:\Program Files (x86)\NuMega
O43 - CFD: 01/03/2013 - 19:40:42 - [7,234] ----D C:\Program Files (x86)\Pando Networks
O43 - CFD: 07/03/2013 - 19:03:03 - [90,447] ----D C:\Program Files (x86)\Portrait Professional Studio 10
O43 - CFD: 24/03/2013 - 14:50:52 - [0,217] ---AD C:\Program Files (x86)\RSHUT Pro
O43 - CFD: 24/03/2013 - 01:04:58 - [14,372] ----D C:\Program Files (x86)\TreeDBNotes Pro 4
O43 - CFD: 23/03/2013 - 21:26:52 - [9,821] ----D C:\Program Files (x86)\VB Decompiler Lite
O43 - CFD: 23/03/2013 - 21:39:44 - [3,893] ----D C:\Program Files (x86)\VB Decompiler Pro
O43 - CFD: 03/03/2013 - 01:01:51 - [103,702] ----D C:\Program Files (x86)\Vuze
O43 - CFD: 30/03/2013 - 19:29:08 - [0,746] ----D C:\Program Files (x86)\Common Files\Labcenter Electronics
O43 - CFD: 18/03/2013 - 07:55:46 - [0,001] ----D C:\ProgramData\TrueSuite
O43 - CFD: 07/03/2013 - 19:10:37 - [0,010] ----D C:\ProgramData\Zoner
O43 - CFD: 07/03/2013 - 19:05:44 - [0,001] ----D C:\Users\Pixis\AppData\Roaming\Anthropics
O43 - CFD: 08/04/2013 - 21:17:15 - [4,507] ----D C:\Users\Pixis\AppData\Roaming\Azureus
O43 - CFD: 26/03/2013 - 20:38:09 - [0] ----D C:\Users\Pixis\AppData\Roaming\Hex-Rays
O43 - CFD: 03/03/2013 - 03:20:44 - [1,855] ----D C:\Users\Pixis\AppData\Roaming\MAXON
O43 - CFD: 24/03/2013 - 01:02:47 - [6,135] ----D C:\Users\Pixis\AppData\Roaming\TreeDBNotes Pro 4
O43 - CFD: 07/03/2013 - 19:10:57 - [0] ----D C:\Users\Pixis\AppData\Roaming\Zoner
O43 - CFD: 30/03/2013 - 19:32:38 - [0,001] ----D C:\Users\Pixis\AppData\Local\Labcenter Electronics
O43 - CFD: 07/03/2013 - 19:11:01 - [38,908] ----D C:\Users\Pixis\AppData\Local\Zoner
O43 - CFD: 01/03/2013 - 19:50:44 - [0,004] ----D C:\Users\Pixis\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Multimedia Mouse Driver
O43 - CFD: 24/03/2013 - 00:19:30 - [0] ----D C:\Users\Pixis\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\TreeDBNotes Pro 4
~ Program Folder: 192 Legitimates Scanned in 00mn 23s



---\\ Derniers fichiers modifi�s ou cr�es sous Windows et System32 (O44)
O44 - LFC:[MD5.12F6028271665D64EE0E7281C1B52335] - 01/04/2013 - 23:19:11 ---A- . (...) -- C:\Windows\VBADDIN.INI [47]
O44 - LFC:[MD5.8175238C782ABED103BF99D21D0E9C1C] - 01/04/2013 - 23:15:25 ---A- . (.Preview Software Inc - tl32v20.) -- C:\Windows\tl32v20.dll [91648]
O44 - LFC:[MD5.EABEC5D6C0F1392E4D117FAB7D1B3A0F] - 24/03/2013 - 13:50:52 ---A- . (...) -- C:\Windows\WININIT.INI [75]
O44 - LFC:[MD5.1FF56AC32B38A94C3C88497BD6E00C96] - 19/03/2013 - 01:59:21 ---A- . (...) -- C:\Windows\SysNative\ieuinit.inf [25185]
O44 - LFC:[MD5.1FF56AC32B38A94C3C88497BD6E00C96] - 19/03/2013 - 01:59:21 ---A- . (...) -- C:\Windows\System32\ieuinit.inf [25185]
O44 - LFC:[MD5.135F074F703FEFC6FEC5BF03930718A3] - 07/04/1999 - 12:05:52 ---A- . (...) -- C:\Windows\smrtchck.tsf [2602]
~ Files: 197 Legitimates Scanned in 00mn 22s



---\\ Derniers fichiers cr��s dans Windows Prefetcher (O45)
O45 - LFCP:[MD5.2F2F97212C7672706FBAFADADA10C5FF] - 01/04/2013 - 12:21:11 ---A- - C:\Windows\Prefetch\CNBSYSINFO.EXE-6E25FB63.pf
O45 - LFCP:[MD5.C80CC8DAD6A72C93BA97F6BD4299B7B2] - 01/04/2013 - 17:22:54 ---A- - C:\Windows\Prefetch\UNETBOOTIN-WINDOWS-583.EXE-2E7EC049.pf
O45 - LFCP:[MD5.AEBF29A67468EE9C58B9799D2987DEA0] - 01/04/2013 - 17:28:27 ---A- - C:\Windows\Prefetch\SEVNZ.EXE-D5A1C1D0.pf
O45 - LFCP:[MD5.C196C395D8AC1B383F63CADE70776E8B] - 01/04/2013 - 17:29:05 ---A- - C:\Windows\Prefetch\UN468.EXE-DA315103.pf
O45 - LFCP:[MD5.A916DE1A36AF367F8001FE89D1CB8748] - 01/04/2013 - 18:34:58 ---A- - C:\Windows\Prefetch\PYLF72.TMP.EXE-5289A8B9.pf
O45 - LFCP:[MD5.F5C29ECC973FADC2AE251C41A1FF015C] - 01/04/2013 - 18:34:58 ---A- - C:\Windows\Prefetch\PYRUN.EXE-09DED9AB.pf
O45 - LFCP:[MD5.5FFD8914B633B89CB834FBC9AF4055B9] - 01/04/2013 - 18:35:53 ---A- - C:\Windows\Prefetch\COMPACT.EXE-D59FAA0F.pf
O45 - LFCP:[MD5.D5802D1F3B16C6F8A41201AB09ADA5FA] - 01/04/2013 - 18:36:40 ---A- - C:\Windows\Prefetch\PYL9F52.TMP.EXE-DDFF72AC.pf
O45 - LFCP:[MD5.8F913367F916791FBE63C29368F5D77D] - 01/04/2013 - 18:36:40 ---A- - C:\Windows\Prefetch\PYRUN.EXE-F764000E.pf
O45 - LFCP:[MD5.8B268BA307E1AA2AA222D1BEF587DAC3] - 01/04/2013 - 18:37:18 ---A- - C:\Windows\Prefetch\WUBI.EXE-8611F38C.pf
O45 - LFCP:[MD5.42952AFB1E2855992DC601A091761943] - 01/04/2013 - 18:37:20 ---A- - C:\Windows\Prefetch\PYRUN.EXE-3B54D994.pf
O45 - LFCP:[MD5.9384D92BDAB27C13555581D5ED90468F] - 01/04/2013 - 18:37:21 ---A- - C:\Windows\Prefetch\PYL5AB4.TMP.EXE-A1243752.pf
O45 - LFCP:[MD5.56F36565CFA608347A3FDDC9040E016D] - 01/04/2013 - 18:59:59 ---A- - C:\Windows\Prefetch\QWINGRAPH.EXE-D329637D.pf
O45 - LFCP:[MD5.077A936A5B98463F318754A16205B6F9] - 01/04/2013 - 19:04:44 ---A- - C:\Windows\Prefetch\IDAQ.EXE-07CAA00B.pf
O45 - LFCP:[MD5.58360FD98D57FF7583E2894DB00DAFF3] - 01/04/2013 - 20:13:18 ---A- - C:\Windows\Prefetch\PEID.EXE-5471BD89.pf
O45 - LFCP:[MD5.6A3E76270784E44A4FB6ED3B45C97E0D] - 01/04/2013 - 20:25:12 ---A- - C:\Windows\Prefetch\IMPORTREC.EXE-D89DC844.pf
O45 - LFCP:[MD5.9471D3B56DE19315C037C06029429CD9] - 01/04/2013 - 20:25:23 ---A- - C:\Windows\Prefetch\LORDPE.EXE-D45ACB17.pf
O45 - LFCP:[MD5.DCBA01C730C8A9A2CCC9CA258AE24402] - 01/04/2013 - 21:02:57 ---A- - C:\Windows\Prefetch\BRIDGEPROXY.EXE-ED26B729.pf
O45 - LFCP:[MD5.68E41FBDE0EE8BDC02E61515CC55EEA8] - 01/04/2013 - 23:14:39 ---A- - C:\Windows\Prefetch\_ISDEL.EXE-B5408DAD.pf
O45 - LFCP:[MD5.2A2D712A2802F0E1E0F19E422DBC1655] - 01/04/2013 - 23:16:51 ---A- - C:\Windows\Prefetch\CRACKME2.EXE-47A05B0B.pf
O45 - LFCP:[MD5.A2561C1E488DEE18FFE8F94BC51F293C] - 01/04/2013 - 23:17:35 ---A- - C:\Windows\Prefetch\ZPS.EXE-539DE287.pf
O45 - LFCP:[MD5.A018F047E6B7606C3CF8DAAC66973AA5] - 01/04/2013 - 23:19:03 ---A- - C:\Windows\Prefetch\_INS5576._MP-4ECD9D3A.pf
O45 - LFCP:[MD5.E341799C50158E96DC3C40F63976B502] - 01/04/2013 - 23:19:03 ---A- - C:\Windows\Prefetch\_ISDEL.EXE-D95166C1.pf
O45 - LFCP:[MD5.608F560C3EB6C45225D2AE745901040B] - 01/04/2013 - 23:37:03 ---A- - C:\Windows\Prefetch\SMARTCHK.EXE-EEC3CF48.pf
O45 - LFCP:[MD5.C0F2C0B33ED73D8C2CAC33F77848E07D] - 02/04/2013 - 22:25:19 ---A- - C:\Windows\Prefetch\CRACKME15.EXE-08887E50.pf
O45 - LFCP:[MD5.443BA875D0E3D940B3DBF72078B37293] - 02/04/2013 - 22:26:03 ---A- - C:\Windows\Prefetch\P32DASM.EXE-3E2442B8.pf
O45 - LFCP:[MD5.E3B45AF1CDA50792BB779040969FBC3E] - 04/04/2013 - 22:12:51 ---A- - C:\Windows\Prefetch\RADASM.EXE-5772B1D6.pf
O45 - LFCP:[MD5.27BD29D37A3CADFF1E7F08E85BBE3755] - 06/04/2013 - 15:20:08 ---A- - C:\Windows\Prefetch\VB DECOMPILER.EXE-320017E6.pf
O45 - LFCP:[MD5.7B3199C1DDED5C6C6F1771B9EE693A13] - 06/04/2013 - 15:30:50 ---A- - C:\Windows\Prefetch\RESHACKER.EXE-D37333F5.pf
O45 - LFCP:[MD5.217B5AC6DAC21E10584057557AACE4E4] - 06/04/2013 - 16:11:12 ---A- - C:\Windows\Prefetch\7ZFM.EXE-22E64FB8.pf
O45 - LFCP:[MD5.32E72D388149287F7A7200B385C308B9] - 06/04/2013 - 16:14:28 ---A- - C:\Windows\Prefetch\OLLYDBG.EXE-7FCBA24B.pf
O45 - LFCP:[MD5.3D8A005FC8D50531502BADC5921F3C61] - 08/04/2013 - 20:10:50 ---A- - C:\Windows\Prefetch\AZUREUS.EXE-997C5496.pf
O45 - LFCP:[MD5.0CDBF62B1720CC94849D83EE86657014] - 08/04/2013 - 20:15:49 ---A- - C:\Windows\Prefetch\I4JDEL0.EXE-71874E46.pf
O45 - LFCP:[MD5.FCFB467ADF4263C31B204752FE187CA5] - 09/04/2013 - 19:10:52 ---A- - C:\Windows\Prefetch\WINAMP.EXE-015FB5E1.pf
O45 - LFCP:[MD5.5B3EE1469B5E21A0CE4AE0FC1EEFCC9B] - 31/03/2013 - 14:24:00 ---A- - C:\Windows\Prefetch\SNIFFER_GPU.EXE-4EDF8502.pf
O45 - LFCP:[MD5.B42535ED86176AE5E31B8EAD8D66AE35] - 31/03/2013 - 14:28:45 ---A- - C:\Windows\Prefetch\LINK.EXE-4D35EF71.pf
O45 - LFCP:[MD5.F37580AE592475B1E5428DCA6F5DD4B5] - 31/03/2013 - 14:28:58 ---A- - C:\Windows\Prefetch\TEST.EXE-BACDA1A2.pf
O45 - LFCP:[MD5.C4C0C868A3B027CE53190DF92145AD2D] - 31/03/2013 - 15:01:49 ---A- - C:\Windows\Prefetch\ML.EXE-8EABCDF0.pf
~ Prefetcher: 141 Legitimates Scanned in 00mn 01s



---\\ D�ni du service (Local Security Authority) (O48)
O48 - LSA:Local Security Authority Notification Packages . (.Broadcom Corporation. - BtwProximityCP DLL.) -- C:\Program Files\WIDCOMM\Bluetooth Software\BtwProximityCP.dll
~ LSA: 10 Legitimates Scanned in 00mn 00s



---\\ Contr�le du Safe Boot (CSB) (O49)
~ CBS: 13 Legitimates Scanned in 00mn 00s



---\\ MountPoints2 Shell Key (O51)
O51 - MPSK:{8d9459cc-7fc9-11e2-b3a7-806e6f6e6963}\AutoRun\command. (...) -- E:\autorun1.exe
O51 - MPSK:{9d6fa128-824c-11e2-92e4-e006e6e0a78c}\AutoRun\command. (...) -- H:\wubi.exe (.not file.)
~ Keys: Scanned in 00mn 00s



---\\ Trojan Driver Search Data (HKLM) (O52)
~ TDSD: 2 Legitimates Scanned in 00mn 00s



---\\ ShareTools MSconfig StartupReg (O53)
O53 - SMSR:HKLM\...\startupreg\Pando Media Booster [Key] . (.Pas de propri�taire - Pando Media Booster.) -- C:\Program Files (x86)\Pando Networks\Media Booster\PMB.exe
O53 - SMSR:HKLM\...\startupreg\SearchProtect [Key] . (...) -- C:\Users\Pixis\AppData\Roaming\SearchProtect\bin\cltmng.exe (.not file.)
O53 - SMSR:HKLM\...\startupreg\SearchProtectAll [Key] . (...) -- C:\Program Files (x86)\SearchProtect\bin\cltmng.exe (.not file.)
O53 - SMSR:HKLM\...\startupreg\vmware-tray.exe [Key] . (.VMware, Inc. - VMware Tray Process.) -- C:\Program Files (x86)\VMware\VMware Workstation\vmware-tray.exe
O53 - SMSR:HKLM\...\startupreg\Zoner Photo Studio Autoupdate [Key] . (.ZONER software - Zoner Photo Studio Autoupdate.) -- C:\PROGRAM FILES\ZONER\PHOTO STUDIO 15\Program32\ZPSTRAY.exe
~ SMSR Keys: 10 Legitimates Scanned in 00mn 00s



---\\ Microsoft Control Security Providers (O54)
~ MSCP: 2 Legitimates Scanned in 00mn 00s



---\\ Microsoft Windows Policies System (O55)
O55 - MWPS:[HKLM\...\Policies\System] - "EnableUIADesktopToggle"=0
O55 - MWPS:[HKLM\...\Policies\System] - "FilterAdministratorToken"=0
~ MWPS: 16 Legitimates Scanned in 00mn 00s



---\\ Microsoft Windows Policies Explorer (O56)
O56 - MWPE:[HKLM\...\policies\Explorer] - "NoActiveDesktop"=1
O56 - MWPE:[HKLM\...\policies\Explorer] - "NoActiveDesktopChanges"=1
~ MWPE Keys: 4 Legitimates Scanned in 00mn 00s



---\\ Liste des Drivers Syst�me (O58)
O58 - SDL:[MD5.5C368F4B04ED2A923E6AFCA2D37BAFF5] - 13/05/2011 - 13:57:58 ---A- . (.Hewlett-Packard Company - HP Accelerometer.) -- C:\Windows\System32\Drivers\Accelerometer.sys [43320]
O58 - SDL:[MD5.65EFAEC68FA234F36880533A79D7B1C1] - 12/07/2011 - 09:36:28 ---A- . (.VMware, Inc. - VMware Virtual Storage Volume Driver.) -- C:\Windows\SysWOW64\drivers\vstor2-mntapi10-shared.sys [33392]
~ Drivers: Scanned in 00mn 00s



---\\ Derniers fichiers modifi�s ou cr�es (Utilisateur) (O61)
O61 - LFC: 07/04/2013 - 13:47:52 ---A- C:\Users\Pixis\Links\Google Drive.lnk [1708]
O61 - LFC: 07/04/2013 - 19:29:11 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\torrents\The.Big.Lebowski.DVDRip.AC3.XviD-Bayfilms.torrent [19170]
O61 - LFC: 07/04/2013 - 19:47:53 ---A- C:\Users\Pixis\Documents\Vuze Downloads\The.Big.Lebowski.DVDRip.AC3.XviD-Bayfilms\The.Big.Lebowski-Kubrick@Bayfilms.txt [778]
O61 - LFC: 07/04/2013 - 20:02:15 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\torrents\Ouvert � Double Tour.torrent [17959]
O61 - LFC: 07/04/2013 - 20:13:56 ---A- C:\Users\Pixis\Documents\Vuze Downloads\The.Big.Lebowski.DVDRip.AC3.XviD-Bayfilms\The.Big.Lebowski.1998.DVDRip.AC3.XviD-Bayfilms.avi [839409664]
O61 - LFC: 08/04/2013 - 17:15:56 ---A- C:\Users\Pixis\AppData\Local\Zoner\ZPS 15\MSGC\{0001-US-01424000}\68a7053324031144d826d976eed7a9bc.png [2323]
O61 - LFC: 08/04/2013 - 17:15:56 ---A- C:\Users\Pixis\AppData\Local\Zoner\ZPS 15\MSGC\{0001-US-01424000}\6e2cd1f7b97135ebf4d38e4030dc4908.png [11091]
O61 - LFC: 08/04/2013 - 17:15:56 ---A- C:\Users\Pixis\AppData\Local\Zoner\ZPS 15\MSGC\{0001-US-01424000}\autoupdate.xml [1574]
O61 - LFC: 08/04/2013 - 18:58:34 ---A- C:\Users\Pixis\Downloads\Wireshark-win64-1.8.6.exe [26847472]
O61 - LFC: 08/04/2013 - 19:13:40 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\ipfilter.cache [0]
O61 - LFC: 08/04/2013 - 19:14:07 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\torrents\Cisco Packet Tracer 5.3.torrent [24954]
O61 - LFC: 08/04/2013 - 19:14:13 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\dht\version.dat [20]
O61 - LFC: 08/04/2013 - 19:15:00 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\subs\118F6C274745A47C4A3D.vuze [3242]
O61 - LFC: 08/04/2013 - 19:15:01 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\subs\DC355E579F59B60644C7.vuze [3215]
O61 - LFC: 08/04/2013 - 19:15:01 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\subs\EF0D07F8DD38E8F626A2.vuze [3222]
O61 - LFC: 08/04/2013 - 19:15:02 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\subs\A29987CF9CA4C6EAEA4D.vuze [3006]
O61 - LFC: 08/04/2013 - 19:15:22 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\099B0E6AE8CFD249216DD3F7338BEAC12DDF27BB.dat [22804]
O61 - LFC: 08/04/2013 - 19:15:22 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\C79A2D7CEB833459D4497A739D06690A01E6C80D.dat [20927]
O61 - LFC: 08/04/2013 - 19:16:55 ---A- C:\Users\Pixis\Documents\Vuze Downloads\Cisco Packet Tracer 5.3\Torrent downloaded from Demonoid.com.txt [47]
O61 - LFC: 08/04/2013 - 19:17:33 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\757F6226A624CFE7EB5E7754AF9F4161D72A9C0D.dat [32117]
O61 - LFC: 08/04/2013 - 19:17:33 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\F7696A65B6F9DCFC9321926B0632E8C796A0FEA4.dat [61719]
O61 - LFC: 08/04/2013 - 19:17:41 ---A- C:\Users\Pixis\Documents\Vuze Downloads\Cisco Packet Tracer 5.3\PacketTracer53_setup.exe [77533021]
O61 - LFC: 08/04/2013 - 19:18:03 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\6E35EA2C042E35E1C035C565C5983AEA0BCBB07C.dat [29220]
O61 - LFC: 08/04/2013 - 19:19:19 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\cache\1539613700.ico [4136]
O61 - LFC: 08/04/2013 - 19:20:05 ---A- C:\Users\Pixis\.packettracer [180]
O61 - LFC: 08/04/2013 - 19:23:34 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\5185806C09E801FDFE2DA3C73DA572003A61C5A6.dat [3709]
O61 - LFC: 08/04/2013 - 19:23:34 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\6D75FA39EE54B1E767EB7373460DB80F893EE8DF.dat [42296]
O61 - LFC: 08/04/2013 - 19:24:10 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\subs\5104299B7F6E02C00DEA.vuze [2606]
O61 - LFC: 08/04/2013 - 19:24:11 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\subs\58F7E6C1081515F0B1ED.vuze [3766]
O61 - LFC: 08/04/2013 - 19:24:11 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\subscriptions.config [46848]
O61 - LFC: 08/04/2013 - 19:24:44 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\8D6EDF261D5ECB5A6CD6F8D8DB95D6787968D888.dat [8420]
O61 - LFC: 08/04/2013 - 19:57:15 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\58C46B1485FFF8DD211FBBE5D0997CCE785DFE11.dat [21177]
O61 - LFC: 08/04/2013 - 20:04:48 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\devices.config [7114]
O61 - LFC: 08/04/2013 - 20:08:36 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\65D2780EE1C62C34ADA31D5D15AE072008A9D2E0.dat [8904]
O61 - LFC: 08/04/2013 - 20:08:36 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\B7C56142B0ACA87B7E73EAC647410FB2AAFF00C3.dat [78456]
O61 - LFC: 08/04/2013 - 20:08:36 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\F63644AB669B5DA3B164BCC3E4F32C923BDF6C2D.dat [16281]
O61 - LFC: 08/04/2013 - 20:09:14 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\dht\addresses.dat [249]
O61 - LFC: 08/04/2013 - 20:10:26 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\9928F1270A109EAA7B715B2CF46CD7F3465B3C94.dat [49025]
O61 - LFC: 08/04/2013 - 20:10:51 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\torrents\Wireshark Network Analysis (Second Edition).torrent [12939]
O61 - LFC: 08/04/2013 - 20:11:01 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\plugins\azupnpav\cd.dat [1901]
O61 - LFC: 08/04/2013 - 20:11:11 ---A- C:\Users\Pixis\Documents\Vuze Downloads\Wireshark Network Analysis (Second Edition)\README.nfo [2049]
O61 - LFC: 08/04/2013 - 20:12:36 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\878CF84A8FA4BD3A66AA1A99CEF4D33CF16BFD61.dat [36304]
O61 - LFC: 08/04/2013 - 20:12:36 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\D5AD2F2D3E170C21CFD54D90800916E3690AB36A.dat [19607]
O61 - LFC: 08/04/2013 - 20:12:37 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\73B0A20DC924984C3C6506CD186442924ADECA1A.dat [38551]
O61 - LFC: 08/04/2013 - 20:12:37 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\DFF8650139ADB1BCEDF6FAC146A3CA82DAE64F51.dat [50919]
O61 - LFC: 08/04/2013 - 20:14:00 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\rcm.config [66328]
O61 - LFC: 08/04/2013 - 20:15:45 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\VuzeActivities.config [598]
O61 - LFC: 08/04/2013 - 20:15:45 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\azureus.statistics [176]
O61 - LFC: 08/04/2013 - 20:15:45 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\dht\contacts.dat [548]
O61 - LFC: 08/04/2013 - 20:15:45 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\dht\diverse.dat [1317]
O61 - LFC: 08/04/2013 - 20:15:45 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\dht\general.dat [11]
O61 - LFC: 08/04/2013 - 20:15:45 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\net\pm_3215.dat [27159]
O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\06D39D5D155032F5CE4310E98F1548BD3EAB8CE5.dat [4640]
O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\07FA7B39B2C3FC52B40782215B65D8DCBA41E545.dat [45607]
O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\2059964916364FD7D111D3AB3295B9543F13BEE6.dat [16977]
O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\2D2EA419FBE78B7AACDACA77D8237A925B375B4B.dat [630456]
O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\2F5B87B30E064A7B465F8105CF263AD748FD72F4.dat [47456]
O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\30F2F39908D7167181DE1EA05A56D67C6ACF281D.dat [49513]
O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\3E022A4E3617F832F1A43478669A1523310BCDCA.dat [4193]
O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\56E3F1954F8225EBB52E8E8123CDD6FD992162FC.dat [25126]
O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\8968AF1B669F3795C20EFF5CD35BF4252916C549.dat [40838]
O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\92FF6F156E85B9574CFE4355AC52FCC3938DB3D0.dat [25878]
O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\B468CBFF391CBCBECC910CCEADB246F847EF7A90.dat [18474]
O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\C8C5A42201B890195D409682BF887CC71E038B2F.dat [20054]
O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\C90DB98C5AABE64DCD7F730D816E755242FFFBD4.dat [47895]
O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\CD501B94DC4341CB0A8B813B430D5334413192CB.dat [47314]
O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\F570DCD5A5C48FC69CE25BEFEBBC57E6AFCE30AF.dat [233995]
O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\cache.dat [12054]
O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\downloads.config [19944]
O61 - LFC: 08/04/2013 - 20:15:48 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\azureus.config [10968]
O61 - LFC: 08/04/2013 - 20:15:48 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\sidebarauto.config [585]
O61 - LFC: 08/04/2013 - 20:15:48 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\tables.config [15833]
O61 - LFC: 08/04/2013 - 20:16:29 ---A- C:\Users\Pixis\AppData\Roaming\Wireshark\recent [2077]
O61 - LFC: 08/04/2013 - 20:16:29 ---A- C:\Users\Pixis\AppData\Roaming\Wireshark\recent_common [2075]
O61 - LFC: 08/04/2013 - 21:36:27 ---A- C:\Users\Pixis\Downloads\ToolsDiags.exe [535823]
O61 - LFC: 09/04/2013 - 18:04:35 ---A- C:\Users\Pixis\AppData\Local\Google\Chrome\User Data\Certificate Revocation Lists [268548]
O61 - LFC: 09/04/2013 - 18:37:32 ---A- C:\Users\Pixis\AppData\Local\Google\Chrome\User Data\Local State [26336]
O61 - LFC: 09/04/2013 - 18:37:33 ---A- C:\Users\Pixis\AppData\Local\Google\Chrome\User Data\chrome_shutdown_ms.txt [4]
O61 - LFC: 09/04/2013 - 19:48:36 ---A- C:\Users\Pixis\AppData\Roaming\Todae\LMPwa\LMP_default.rtv [113632]
~ 379 Fichiers temporaires (Temporary files)
~ Files: 847 Legitimates Scanned in 01mn 38s



---\\ Liste des outils de nettoyage (O63)
O63 - Logiciel: HijackThis 2.0.2 - (.TrendMicro.) [HKLM] -- HijackThis
O63 - Logiciel: ZHPDiag 2013 - (.Nicolas Coolman.) [HKLM] -- ZHPDiag_is1
O63 - Logiciel: HiJackThis - (.Trend Micro.) [HKLM] -- {45A66726-69BC-466B-A7A4-12FCBA4883D7}
~ ADS: Scanned in 00mn 00s



---\\ Liste des services Legacy (O64)
O64 - Services: CurCS - 07/03/2013 - Pas de propri�taire (aswRvrt) .(...) - LEGACY_ASWRVRT
O64 - Services: CurCS - 07/03/2013 - Pas de propri�taire (aswVmm) .(...) - LEGACY_ASWVMM
~ Legacy: 80 Legitimates Scanned in 00mn 00s



---\\ File Associations Shell Spawning (O67)
~ FASS Keys: 19 Legitimates Scanned in 00mn 00s



---\\ Start Menu Internet (O68)
O68 - StartMenuInternet: [HKLM\..\Shell\open\Command] (.Mozilla Corporation - Firefox.) -- C:\Program Files (x86)\Mozilla Firefox\firefox.exe
O68 - StartMenuInternet: [HKLM\..\Shell\open\Command] (.Google Inc. - Google Chrome.) -- C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
O68 - StartMenuInternet: [HKLM\..\Shell\open\Command] (.Microsoft Corporation - Internet Explorer.) -- C:\Program Files\Internet Explorer\iexplore.exe
~ Keys: Scanned in 00mn 00s



---\\ Search Browser Infection (O69)
O69 - SBI: SearchScopes [HKCU] {0633EE93-D776-472f-A0FF-E1416B8B2E3A} [DefaultScope] - (Bing) - http://www.bing.com
O69 - SBI: SearchScopes [HKCU] {38267303-CBDD-4950-BA57-D4FDAE76BE6A} - (Propositions de recherche Amazon.fr) - http://www.amazon.fr
O69 - SBI: SearchScopes [HKCU] {b7fca997-d0fb-4fe0-8afd-255e89cf9671} - (Yahoo) - http://fr.search.yahoo.com
O69 - SBI: SearchScopes [HKCU] {d43b3890-80c7-4010-a95d-1e77b5924dc3} - (Wikipedia) - http://fr.wikipedia.org
O69 - SBI: SearchScopes [HKCU] {D944BB61-2E34-4DBF-A683-47E505C587DC} - (eBay) - http://rover.ebay.com
~ Keys: Scanned in 00mn 00s



---\\ Crack & Keygen Files (O82)
C:\Users\Pixis\Desktop\Cracking\Crackme\Crackmes\Am0kCM_2.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\Crackmes\crackme1.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\Crackmes\f3rgo_chl1.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\Crackmes\hackereh@.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\Crackmes\KeygenME.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\Daemon Crack\N�13\crackme3.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\Daemon Crack\N�13\Lancez-moi.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\Daemon Crack\N�15\crackme3.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\Daemon Crack\N�15\due-cm2.dat
C:\Users\Pixis\Desktop\Cracking\Crackme\Daemon Crack\N�15\due-cm2.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\Daemon Crack\N�15\Lancez-moi.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\1.crackme1\crackme1.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\3.crackme3\crackme3.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\4.crackme4\crackme4.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\6.crackme\crackme15.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\crackme12.zip
C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\crackme4.zip
C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\Folcrack\crackme2.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_10\Target\Crackme6.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_11\CrackmeConsole.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_16A\crackme12.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_16b\Target\crackme12.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_16b\Target\crackme12_patched.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_16c\Files\crackme12.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_17\Targets\DelphiCrackme.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_19\Files\Saturday Night Crackme.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_19\Files\Saturday Night Crackme.exe.BAK
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_19\Files\saturday.night.crackme-patch.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_20A\Targets\CrackmeVB1.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_20A\Targets\CrackmeVB2.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_20A\Targets\CrackmeVB3.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_20B\Targets\CrackmeVB3.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_20B\Targets\CrackmeVB4.Exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_20B\Targets\Point-H Crackme.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_21\Target\Anti-crackme.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_6\Crackme2.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_6\Crackme2_patched.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_7\Crackme8.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_7\Crackme8_modified.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_7\Crackme8_modified_patched.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_8\Crackme3.EXE
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_8\Crackme3_patched.EXE
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_9\Crackme6.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_9\Crackme6_patched.exe
C:\Users\Pixis\Downloads\crackme15(1).zip
C:\Users\Pixis\Downloads\crackme15(2).zip
C:\Users\Pixis\Downloads\crackme15.zip
C:\Users\Pixis\Downloads\crackme17.zip
C:\Users\Pixis\Google Drive\Cracking\Crackme\Crackmes\Am0kCM_2.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\Crackmes\crackme1.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\Crackmes\f3rgo_chl1.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\Crackmes\hackereh@.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\Crackmes\KeygenME.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\Daemon Crack\N�13\crackme3.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\Daemon Crack\N�13\Lancez-moi.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\Daemon Crack\N�15\crackme3.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\Daemon Crack\N�15\due-cm2.dat
C:\Users\Pixis\Google Drive\Cracking\Crackme\Daemon Crack\N�15\due-cm2.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\Daemon Crack\N�15\Lancez-moi.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\NewbieContest\1.crackme1\crackme1.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\NewbieContest\3.crackme3\crackme3.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\NewbieContest\4.crackme4\crackme4.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\NewbieContest\6.crackme\crackme15.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\NewbieContest\crackme12.zip
C:\Users\Pixis\Google Drive\Cracking\Crackme\NewbieContest\crackme4.zip
C:\Users\Pixis\Google Drive\Cracking\Crackme\NewbieContest\Folcrack\crackme2.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_10\Target\Crackme6.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_11\CrackmeConsole.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_16A\crackme12.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_16b\Target\crackme12.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_16b\Target\crackme12_patched.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_16c\Files\crackme12.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_17\Targets\DelphiCrackme.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_19\Files\Saturday Night Crackme.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_19\Files\Saturday Night Crackme.exe.BAK
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_19\Files\saturday.night.crackme-patch.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_20A\Targets\CrackmeVB1.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_20A\Targets\CrackmeVB2.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_20A\Targets\CrackmeVB3.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_20B\Targets\CrackmeVB3.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_20B\Targets\CrackmeVB4.Exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_20B\Targets\Point-H Crackme.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_21\Target\Anti-crackme.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_6\Crackme2.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_6\Crackme2_patched.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_7\Crackme8.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_7\Crackme8_modified.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_7\Crackme8_modified_patched.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_8\Crackme3.EXE
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_8\Crackme3_patched.EXE
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_9\Crackme6.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_9\Crackme6_patched.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\Crackmes\Am0kCM_2.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\Crackmes\crackme1.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\Crackmes\f3rgo_chl1.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\Crackmes\hackereh@.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\Crackmes\KeygenME.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\Daemon Crack\N�13\crackme3.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\Daemon Crack\N�13\Lancez-moi.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\Daemon Crack\N�15\crackme3.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\Daemon Crack\N�15\due-cm2.dat
C:\Users\Pixis\Desktop\Cracking\Crackme\Daemon Crack\N�15\due-cm2.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\Daemon Crack\N�15\Lancez-moi.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\1.crackme1\crackme1.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\3.crackme3\crackme3.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\4.crackme4\crackme4.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\6.crackme\crackme15.exe
C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\crackme12.zip
C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\crackme4.zip
C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\Folcrack\crackme2.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_10\Target\Crackme6.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_11\CrackmeConsole.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_16A\crackme12.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_16b\Target\crackme12.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_16b\Target\crackme12_patched.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_16c\Files\crackme12.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_17\Targets\DelphiCrackme.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_19\Files\Saturday Night Crackme.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_19\Files\Saturday Night Crackme.exe.BAK
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_19\Files\saturday.night.crackme-patch.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_20A\Targets\CrackmeVB1.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_20A\Targets\CrackmeVB2.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_20A\Targets\CrackmeVB3.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_20B\Targets\CrackmeVB3.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_20B\Targets\CrackmeVB4.Exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_20B\Targets\Point-H Crackme.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_21\Target\Anti-crackme.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_6\Crackme2.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_6\Crackme2_patched.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_7\Crackme8.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_7\Crackme8_modified.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_7\Crackme8_modified_patched.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_8\Crackme3.EXE
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_8\Crackme3_patched.EXE
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_9\Crackme6.exe
C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_9\Crackme6_patched.exe
C:\Users\Pixis\Downloads\crackme15(1).zip
C:\Users\Pixis\Downloads\crackme15(2).zip
C:\Users\Pixis\Downloads\crackme15.zip
C:\Users\Pixis\Downloads\crackme17.zip
C:\Users\Pixis\Google Drive\Cracking\Crackme\Crackmes\Am0kCM_2.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\Crackmes\crackme1.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\Crackmes\f3rgo_chl1.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\Crackmes\hackereh@.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\Crackmes\KeygenME.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\Daemon Crack\N�13\crackme3.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\Daemon Crack\N�13\Lancez-moi.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\Daemon Crack\N�15\crackme3.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\Daemon Crack\N�15\due-cm2.dat
C:\Users\Pixis\Google Drive\Cracking\Crackme\Daemon Crack\N�15\due-cm2.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\Daemon Crack\N�15\Lancez-moi.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\NewbieContest\1.crackme1\crackme1.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\NewbieContest\3.crackme3\crackme3.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\NewbieContest\4.crackme4\crackme4.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\NewbieContest\6.crackme\crackme15.exe
C:\Users\Pixis\Google Drive\Cracking\Crackme\NewbieContest\crackme12.zip
C:\Users\Pixis\Google Drive\Cracking\Crackme\NewbieContest\crackme4.zip
C:\Users\Pixis\Google Drive\Cracking\Crackme\NewbieContest\Folcrack\crackme2.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_10\Target\Crackme6.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_11\CrackmeConsole.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_16A\crackme12.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_16b\Target\crackme12.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_16b\Target\crackme12_patched.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_16c\Files\crackme12.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_17\Targets\DelphiCrackme.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_19\Files\Saturday Night Crackme.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_19\Files\Saturday Night Crackme.exe.BAK
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_19\Files\saturday.night.crackme-patch.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_20A\Targets\CrackmeVB1.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_20A\Targets\CrackmeVB2.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_20A\Targets\CrackmeVB3.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_20B\Targets\CrackmeVB3.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_20B\Targets\CrackmeVB4.Exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_20B\Targets\Point-H Crackme.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_21\Target\Anti-crackme.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_6\Crackme2.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_6\Crackme2_patched.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_7\Crackme8.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_7\Crackme8_modified.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_7\Crackme8_modified_patched.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_8\Crackme3.EXE
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_8\Crackme3_patched.EXE
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_9\Crackme6.exe
C:\Users\Pixis\Google Drive\Cracking\Tuto\R4ndom\R4ndom_tutorial_9\Crackme6_patched.exe
~ Files: Scanned in 01mn 42s



---\\ Recherche des services d�marr�s par Svchost (O83)
~ Services: 32 Legitimates Scanned in 00mn 00s



---\\ Recherche particuliere � la racine de certains dossiers (O84)
[MD5.08AF557C8E6E74D7D92314F6B2C86273] [SPRF][08/04/2013] (...) -- C:\Users\Pixis\AppData\Local\Temp\i4jdel0.exe [4608]
[MD5.0A8DF307F2765955F56AA10F2A944F1A] [SPRF][09/04/2013] (...) -- C:\Users\Pixis\AppData\Local\Temp\pyl6542.tmp.exe [49152]
[MD5.0A8DF307F2765955F56AA10F2A944F1A] [SPRF][09/04/2013] (...) -- C:\Users\Pixis\AppData\Local\Temp\pylE2FE.tmp.exe [49152]
[MD5.A4BF011891E40520C127DF8E646A373B] [SPRF][18/03/2013] (...) -- C:\Users\Pixis\Desktop\eteindre.bat [37]
[MD5.B63CCB43F2779CBEA5D8D3CE2E3D90FB] [SPRF][08/03/2013] (...) -- C:\Users\Pixis\Desktop\Minecraft.exe [263186]
~ Files: Scanned in 00mn 00s



---\\ Firewall Active Exception List (FirewallRules) (O87)
O87 - FAEL: "{A2E1CB46-F470-46C6-9745-7536613D845A}" | In - Private - P6 - TRUE | .(.Vuze Inc. - Pas de description.) -- C:\Program Files (x86)\Vuze\Azureus.exe
O87 - FAEL: "{25D83240-F59F-4DEC-B947-E145EDC761A6}" | In - Private - P17 - TRUE | .(.Vuze Inc. - Pas de description.) -- C:\Program Files (x86)\Vuze\Azureus.exe
O87 - FAEL: "{28B0A181-2AB1-4EB9-BBEB-E4432FABF9C3}" | In - Domain - P6 - TRUE | .(.Pas de propri�taire - Pando Media Booster.) -- C:\Program Files (x86)\Pando Networks\Media Booster\PMB.exe
O87 - FAEL: "{276F22AC-719E-480A-8339-C76FDE3D3C94}" | In - Domain - P17 - TRUE | .(.Pas de propri�taire - Pando Media Booster.) -- C:\Program Files (x86)\Pando Networks\Media Booster\PMB.exe
O87 - FAEL: "{49ABD7E7-AB24-45B6-B8F5-0FE1EC0EAA26}" | In - Private - P6 - TRUE | .(.Pas de propri�taire - Pando Media Booster.) -- C:\Program Files (x86)\Pando Networks\Media Booster\PMB.exe
O87 - FAEL: "{BFA2FA8F-A63C-483F-86C6-A0EFBEE9B526}" | In - Private - P17 - TRUE | .(.Pas de propri�taire - Pando Media Booster.) -- C:\Program Files (x86)\Pando Networks\Media Booster\PMB.exe
O87 - FAEL: "{8DD29C7E-664E-445A-B7DD-5533B1B494EE}" | In - None - P17 - TRUE | .(.Pas de propri�taire - Pando Media Booster.) -- C:\Program Files (x86)\Pando Networks\Media Booster\PMB.exe
O87 - FAEL: "TCP Query User{F86C9E8F-7EE4-4B65-BFAA-F5CA3EA9D609}C:\program files (x86)\vuze\azureus.exe" | In - Public - P6 - TRUE | .(.Vuze Inc. - Pas de description.) -- C:\program files (x86)\vuze\azureus.exe
O87 - FAEL: "UDP Query User{5460AF9E-A3AD-4DDA-83EB-F6768E966FD7}C:\program files (x86)\vuze\azureus.exe" | In - Public - P17 - TRUE | .(.Vuze Inc. - Pas de description.) -- C:\program files (x86)\vuze\azureus.exe
O87 - FAEL: "TCP Query User{BE477DD8-7F65-4E9B-BE3A-F783A0790752}C:\users\pixis\documents\ida pro\ida pro advanced edition\idaq.exe" | In - Private - P6 - TRUE | .(.Hex-Rays SA.) -- C:\users\pixis\documents\ida pro\ida pro advanced edition\idaq.exe
O87 - FAEL: "UDP Query User{DB1DA29A-6892-4352-92A0-A7D80C830EAB}C:\users\pixis\documents\ida pro\ida pro advanced edition\idaq.exe" | In - Private - P17 - TRUE | .(.Hex-Rays SA.) -- C:\users\pixis\documents\ida pro\ida pro advanced edition\idaq.exe
O87 - FAEL: "{726CD58C-A3D1-4DEC-9934-3B42DD848903}" | In - Public - P17 - TRUE | .(.Hex-Rays SA - The Interactive Disassembler.) -- C:\users\pixis\documents\ida pro\ida pro advanced edition\idaq.exe
O87 - FAEL: "{D3BB0823-3049-46FD-9F8C-ACA6F98749A8}" | In - Public - P6 - TRUE | .(.Hex-Rays SA - The Interactive Disassembler.) -- C:\users\pixis\documents\ida pro\ida pro advanced edition\idaq.exe
~ Firewall: 217 Legitimates Scanned in 00mn 00s



---\\ Scan Additionnel (O88)
Database Version : v2.11492 - (07/04/2013)
Cl�s trouv�es (Keys found) : 8
Valeurs trouv�es (Values found) : 0
Dossiers trouv�s (Folders found) : 0
Fichiers trouv�s (Files found) : 0

[HKLM\Software\Wow6432Node\Microsoft\Tracing\BingBar_RASMANCS] =>Toolbar.Bing
[HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{C98EE38D-21E4-4A50-907D-2B56FEC7013E}] =>Toolbar.Agent
[HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{C98EE38D-21E4-4A50-907D-2B56FEC7013E}] =>Toolbar.Agent
[HKLM\Software\Classes\CLSID\{C98EE38D-21E4-4A50-907D-2B56FEC7013E}] =>Toolbar.Agent
[HKLM\Software\Wow6432Node\Microsoft\Tracing\BingBar_RASAPI32] =>Toolbar.Bing
[HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}] =>Toolbar.Bing
[HKLM\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}] =>Toolbar.Bing
[HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}] =>Toolbar.Bing
~ Additionnel: Scanned in 00mn 16s



---\\ Product Upgrade Codes (O90)
O90 - PUC: "31ED90C3C7689824F9595401BBA3F575" . (.Magic Bullet Suite 64-bit.) -- C:\Windows\Installer\{3C09DE13-867C-4289-9F95-4510BB3A5F57}\ARPPRODUCTICON.exe
O90 - PUC: "4155949AA89096844A464C5558B74C46" . (.Multimedia Mouse Driver.) -- C:\Windows\Installer\{A9495514-098A-4869-A464-C455857BC464}\ARPPRODUCTICON.exe
~ Update Products: 125 Legitimates Scanned in 00mn 00s



---\\ Etat g�n�ral des services non Microsoft (EGS) (SR=Running, SS=Stopped)
SR - | Auto 18/12/2012 65192 | (AdobeARMservice) . (.Adobe Systems Incorporated.) - C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
SS - | Demand 12/03/2013 253656 | (AdobeFlashPlayerUpdateSvc) . (.Adobe Systems Incorporated.) - C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe
SR - | Auto 07/03/2013 45248 | (avast! Antivirus) . (.AVAST Software.) - C:\Program Files\AVAST Software\Avast\AvastSvc.exe
SR - | Auto 05/12/2011 1084192 | (btwdins) . (.Broadcom Corporation..) - C:\Program Files\WIDCOMM\Bluetooth Software\btwdins.exe
SS - | Auto 20/04/2011 241648 | (CLKMSVC10_38F51D56) . (.CyberLink.) - C:\Program Files (x86)\CyberLink\PowerDVD10\NavFilter\kmsvc.exe
SS - | Demand 30/01/2012 276248 | (cphs) . (.Intel Corporation.) - C:\Windows\SysWow64\IntelCpHeciSvc.exe
SR - | Auto ??\??\???? 0 | (ezSharedSvc) . (.EasyBits Software AS.) - C:\Windows\System32\ezSharedSvcHost.exe
SR - | Auto 11/12/2011 260424 | (FPLService) . (.HP.) - C:\Program Files (x86)\HP SimplePass\TrueSuiteService.exe
SS - | Auto 01/03/2013 116648 | (gupdate) . (.Google Inc..) - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
SS - | Demand 01/03/2013 116648 | (gupdatem) . (.Google Inc..) - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
SR - | Auto 09/09/2011 86072 | (HP Support Assistant Service) . (.Hewlett-Packard Company.) - C:\Program Files (x86)\Hewlett-Packard\HP Support Framework\hpsa_service.exe
SR - | Auto 16/02/2011 682040 | (HPAuto) . (.Hewlett-Packard.) - C:\Program Files\Hewlett-Packard\HP Auto\HPAuto.exe
SR - | Auto 11/10/2010 346168 | (HPClientSvc) . (.Hewlett-Packard Company.) - C:\Program Files\Hewlett-Packard\HP Client Services\HPClientServices.exe
SR - | Auto 22/11/2011 227896 | (HPDrvMntSvc.exe) . (.Hewlett-Packard Company.) - C:\Program Files (x86)\Hewlett-Packard\Shared\HPDrvMntSvc.exe
SR - | Demand 22/11/2011 981048 | (hpqwmiex) . (.Hewlett-Packard Company.) - C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe
SR - | Auto 13/05/2011 30520 | (hpsrv) . (.Hewlett-Packard Company.) - C:\Windows\System32\Hpservice.exe
SR - | Auto 29/11/2011 34872 | (HPWMISVC) . (.Hewlett-Packard Development Company, L.P..) - C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch\HPWMISVC.exe
SR - | Auto 30/11/2011 13592 | (IAStorDataMgrSvc) . (.Intel Corporation.) - C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe
SR - | Auto 08/12/2011 607456 | (Intel(R) Capability Licensing Service Interface) . (.Intel(R) Corporation.) - C:\Program Files\Intel\iCLS Client\HeciServer.exe
SR - | Auto 128280 | (Intel(R) ME Service) . (...) - C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\FWService\IntelMeFWService.exe
SR - | Auto 16/12/2011 161560 | (jhi_service) . (.Intel Corporation.) - C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe
SR - | Auto 16/12/2011 277784 | (LMS) . (.Intel Corporation.) - C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe
SS - | Demand 08/03/2013 115608 | (MozillaMaintenance) . (.Mozilla Foundation.) - C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
SR - | Auto 28/01/2012 889664 | (nvsvc) . (.NVIDIA Corporation.) - C:\Windows\system32\nvvsvc.exe
SR - | Auto 02/02/2012 2458944 | (nvUpdatusService) . (.NVIDIA Corporation.) - C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\daemonu.exe
SS - | Demand 25/06/2010 117264 | (rpcapd) . (.CACE Technologies, Inc..) - C:\Program Files (x86)\WinPcap\rpcapd.exe
SS - | Auto 13/07/2012 160944 | (SkypeUpdate) . (.Skype Technologies.) - C:\Program Files (x86)\Skype\Updater\Updater.exe
SR - | Auto 04/01/2012 311808 | (STacSV) . (.IDT, Inc..) - C:\Program Files\IDT\WDM\STacSV64.exe
SS - | Demand 19/02/2010 517096 | (SwitchBoard) . (.Adobe Systems Incorporated.) - C:\Program Files (x86)\Common Files\Adobe\SwitchBoard\SwitchBoard.exe
SR - | Demand 09/12/2011 269640 | (TrueService) . (.AuthenTec, Inc..) - C:\Program Files\Common Files\AuthenTec\TrueService.exe
SR - | Auto 16/12/2011 363800 | (UNS) . (.Intel Corporation.) - C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe
SR - | Auto 15/08/2012 79872 | (VMAuthdService) . (.VMware, Inc..) - C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe
SR - | Auto ??\??\???? 0 | (VMnetDHCP) . (.VMware, Inc..) - C:\Windows\system32\vmnetdhcp.exe
SR - | Auto 01/08/2012 917656 | (VMUSBArbService) . (.VMware, Inc..) - C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe
SR - | Auto ??\??\???? 0 | (VMware NAT Service) . (.VMware, Inc..) - C:\Windows\system32\vmnat.exe
SR - | Auto 15680000 | (VMwareHostd) . (...) - C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe
SR - | Auto 14/07/2009 27136 | C:\Program Files (x86)\Windows Defender\mpsvc.dll (WinDefend) . (.Microsoft Corporation.) - C:\Windows\System32\svchost.exe
SR - | Auto 0 | (WMPNetworkSvc) . (...) - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe
SR - | Auto 14/07/2009 27136 | C:\Windows\System32\wuaueng.dll (wuauserv) . (.Microsoft Corporation.) - C:\Windows\System32\svchost.exe
~ Services: Scanned in 00mn 01s



---\\ Recherche Master Boot Record Infection (MBR)(O80)
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Run by Pixis at 10/04/2013 00:19:39

device: opened successfully
user: error reading MBR

Disk trace:
error: Read Descripteur non valide
kernel: error reading MBR
~ MBR: 9 Legitimates Scanned in 00mn 02s



---\\ Recherche Master Boot Record Infection (MBRCheck)(O80)
Written by ad13, http://ad13.geekstog
Run by Pixis at 10/04/2013 00:19:41

********* Dump file Name *********
C:\PhysicalDisk0_MBR.bin
~ MBR: Scanned in 00mn 04s



~ 2330 Legitimates filtered by white list
End of the scan (1022 lines in 05mn 20s)(184)

Publicité

Soutenons La Quadrature du Net ! Soutenons La Quadrature du Net !

Signaler le contenu de ce document

Publicité

Soutenons La Quadrature du Net !