Bonsoir SkyTech! tu vas bien!!

Avant tout je te souhaite bonnes vacances et Je te remercie pour ta réponse;
comme demandait, voici les rapports de scan de Virustotal des fichiers selectionnés :
SkyTech a écrit :
Fais analyser le fichier : D:\Documents and Settings\APPLICATIONS\Bureau\Sharing Cne.exe
Fichier Sharing_Cne.exe reçu le 2009.08.02 18:28:21 (UTC)
Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.24 2009.08.02 -
AhnLab-V3 5.0.0.2 2009.08.01 -
AntiVir 7.9.0.238 2009.08.02 -
Antiy-AVL 2.0.3.7 2009.07.31 -
Authentium 5.1.2.4 2009.08.02 -
Avast 4.8.1335.0 2009.08.01 -
AVG 8.5.0.406 2009.08.02 -
BitDefender 7.2 2009.08.02 -
CAT-QuickHeal 10.00 2009.07.30 -
ClamAV 0.94.1 2009.08.02 -
Comodo 1841 2009.08.02 -
DrWeb 5.0.0.12182 2009.08.02 -
eSafe 7.0.17.0 2009.07.30 -
eTrust-Vet 31.6.6650 2009.08.01 -
F-Prot 4.4.4.56 2009.08.02 -
F-Secure 8.0.14470.0 2009.08.01 -
Fortinet 3.120.0.0 2009.08.02 -
GData 19 2009.08.02 -
Ikarus T3.1.1.64.0 2009.08.02 -
Jiangmin 11.0.800 2009.08.02 -
K7AntiVirus 7.10.808 2009.08.01 -
Kaspersky 7.0.0.125 2009.08.02 -
McAfee 5695 2009.08.01 -
McAfee+Artemis 5695 2009.08.01 -
McAfee-GW-Edition 6.8.5 2009.08.02 -
Microsoft 1.4903 2009.08.02 -
NOD32 4299 2009.08.02 -
Norman 6.01.09 2009.07.31 -
nProtect 2009.1.8.0 2009.08.02 -
Panda 10.0.0.14 2009.08.02 -
PCTools 4.4.2.0 2009.08.02 -
Prevx 3.0 2009.08.02 -
Rising 21.40.62.00 2009.08.02 -
Sophos 4.44.0 2009.08.02 -
Sunbelt 3.2.1858.2 2009.08.02 -
Symantec 1.4.4.12 2009.08.02 -
TheHacker 6.3.4.3.375 2009.08.01 -
TrendMicro 8.950.0.1094 2009.07.31 -
VBA32 3.12.10.9 2009.08.02 -
ViRobot 2009.7.31.1863 2009.07.31 -
VirusBuster 4.6.5.0 2009.08.02 -
Information additionnelle
File size: 10018263 bytes
MD5...: f0fcb83337e29251dbbc6595acde6be5
SHA1..: b54ee481d625cd86dc7ad183c797f4fe1c28e74b
SHA256: 8a0b9e01890290c9f6f6eef461d86ce41c3e6dc62d8c50c7bba8c309c0e25ebe
ssdeep: 98304:xr8fPEjHf8wTutmYP/sf1TVDhR6mhaNewJhy80O+VmYPldb1TVQ4R6fqlb<br>9zM5Ny:+mHf8pP4m48MLb3p<br>
PEiD..: -
TrID..: File type identification<br>Win32 Executable Borland Delphi 7 (84.6%)<br>InstallShield setup (5.4%)<br>Win32 EXE PECompact compressed (generic) (5.2%)<br>Win32 Executable Delphi generic (1.8%)<br>Win32 Executable Generic (1.0%)
PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0xafe8<br>timedatestamp.....: 0x2a425e19 (Fri Jun 19 22:22:17 1992)<br>machinetype.......: 0x14c (I386)<br><br>( 8 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>CODE 0x1000 0xa9f8 0xaa00 6.53 1f56712892c4116767e9962ee171a8d1<br>DATA 0xc000 0x578 0x600 3.92 674c495281ec78d2ce6c5a60a5272575<br>BSS 0xd000 0x80ab9 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e<br>.idata 0x8e000 0xa74 0xc00 4.42 6869d5c8d3e0f80787e6c27b8df9b60c<br>.tls 0x8f000 0x8 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e<br>.rdata 0x90000 0x36 0x200 0.71 6692c9e0de0dfe13d33fa15b9dd42621<br>.reloc 0x91000 0xef0 0x1000 6.42 9ad0fb4f235736b66fb502fd58604982<br>.rsrc 0x92000 0x45dc 0x4600 5.26 d68ed3186d7b17a693471a33df84585e<br><br>( 9 imports ) <br>> kernel32.dll: DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetVersion, GetCurrentThreadId, WideCharToMultiByte, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetFileType, CreateFileA, CloseHandle<br>> user32.dll: GetKeyboardType, LoadStringA, MessageBoxA, CharNextA<br>> advapi32.dll: RegQueryValueExA, RegOpenKeyExA, RegCloseKey<br>> oleaut32.dll: SysFreeString<br>> kernel32.dll: TlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA<br>> kernel32.dll: WriteFile, WaitForSingleObject, VirtualQuery, SetFileTime, SetFileAttributesA, RemoveDirectoryA, LocalFileTimeToFileTime, GetVersionExA, GetThreadLocale, GetTempPathA, GetSystemDefaultLangID, GetStringTypeExA, GetStdHandle, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFileAttributesA, GetExitCodeProcess, GetDiskFreeSpaceA, GetCurrentProcessId, GetCPInfo, GetACP, FormatMessageA, FindNextFileA, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumCalendarInfoA, DosDateTimeToFileTime, DeleteFileA, CreateDirectoryA, CloseHandle<br>> gdi32.dll: TextOutA, SetTextColor, SetBkColor, SelectObject, GetTextExtentPoint32A, ExtTextOutA, DeleteObject, CreateFontA<br>> user32.dll: CreateWindowExA, RegisterClassExA, PeekMessageA, MessageBoxA, LoadStringA, InvalidateRect, GetSystemMetrics, GetSysColor, EndPaint, DrawEdge, DispatchMessageA, DestroyWindow, DefWindowProcA, BeginPaint, CharNextA, CharToOemA<br>> shell32.dll: ShellExecuteExA<br><br>( 0 exports ) <br>
PDFiD.: -
RDS...: NSRL Reference Data Set<br>-
Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.24 2009.08.02 -
AhnLab-V3 5.0.0.2 2009.08.01 -
AntiVir 7.9.0.238 2009.08.02 -
Antiy-AVL 2.0.3.7 2009.07.31 -
Authentium 5.1.2.4 2009.08.02 -
Avast 4.8.1335.0 2009.08.01 -
AVG 8.5.0.406 2009.08.02 -
BitDefender 7.2 2009.08.02 -
CAT-QuickHeal 10.00 2009.07.30 -
ClamAV 0.94.1 2009.08.02 -
Comodo 1841 2009.08.02 -
DrWeb 5.0.0.12182 2009.08.02 -
eSafe 7.0.17.0 2009.07.30 -
eTrust-Vet 31.6.6650 2009.08.01 -
F-Prot 4.4.4.56 2009.08.02 -
F-Secure 8.0.14470.0 2009.08.01 -
Fortinet 3.120.0.0 2009.08.02 -
GData 19 2009.08.02 -
Ikarus T3.1.1.64.0 2009.08.02 -
Jiangmin 11.0.800 2009.08.02 -
K7AntiVirus 7.10.808 2009.08.01 -
Kaspersky 7.0.0.125 2009.08.02 -
McAfee 5695 2009.08.01 -
McAfee+Artemis 5695 2009.08.01 -
McAfee-GW-Edition 6.8.5 2009.08.02 -
Microsoft 1.4903 2009.08.02 -
NOD32 4299 2009.08.02 -
Norman 6.01.09 2009.07.31 -
nProtect 2009.1.8.0 2009.08.02 -
Panda 10.0.0.14 2009.08.02 -
PCTools 4.4.2.0 2009.08.02 -
Prevx 3.0 2009.08.02 -
Rising 21.40.62.00 2009.08.02 -
Sophos 4.44.0 2009.08.02 -
Sunbelt 3.2.1858.2 2009.08.02 -
Symantec 1.4.4.12 2009.08.02 -
TheHacker 6.3.4.3.375 2009.08.01 -
TrendMicro 8.950.0.1094 2009.07.31 -
VBA32 3.12.10.9 2009.08.02 -
ViRobot 2009.7.31.1863 2009.07.31 -
VirusBuster 4.6.5.0 2009.08.02 -
Information additionnelle
File size: 10018263 bytes
MD5...: f0fcb83337e29251dbbc6595acde6be5
SHA1..: b54ee481d625cd86dc7ad183c797f4fe1c28e74b
SHA256: 8a0b9e01890290c9f6f6eef461d86ce41c3e6dc62d8c50c7bba8c309c0e25ebe
ssdeep: 98304:xr8fPEjHf8wTutmYP/sf1TVDhR6mhaNewJhy80O+VmYPldb1TVQ4R6fqlb<br>9zM5Ny:+mHf8pP4m48MLb3p<br>
PEiD..: -
TrID..: File type identification<br>Win32 Executable Borland Delphi 7 (84.6%)<br>InstallShield setup (5.4%)<br>Win32 EXE PECompact compressed (generic) (5.2%)<br>Win32 Executable Delphi generic (1.8%)<br>Win32 Executable Generic (1.0%)
PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0xafe8<br>timedatestamp.....: 0x2a425e19 (Fri Jun 19 22:22:17 1992)<br>machinetype.......: 0x14c (I386)<br><br>( 8 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>CODE 0x1000 0xa9f8 0xaa00 6.53 1f56712892c4116767e9962ee171a8d1<br>DATA 0xc000 0x578 0x600 3.92 674c495281ec78d2ce6c5a60a5272575<br>BSS 0xd000 0x80ab9 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e<br>.idata 0x8e000 0xa74 0xc00 4.42 6869d5c8d3e0f80787e6c27b8df9b60c<br>.tls 0x8f000 0x8 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e<br>.rdata 0x90000 0x36 0x200 0.71 6692c9e0de0dfe13d33fa15b9dd42621<br>.reloc 0x91000 0xef0 0x1000 6.42 9ad0fb4f235736b66fb502fd58604982<br>.rsrc 0x92000 0x45dc 0x4600 5.26 d68ed3186d7b17a693471a33df84585e<br><br>( 9 imports ) <br>> kernel32.dll: DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetVersion, GetCurrentThreadId, WideCharToMultiByte, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetFileType, CreateFileA, CloseHandle<br>> user32.dll: GetKeyboardType, LoadStringA, MessageBoxA, CharNextA<br>> advapi32.dll: RegQueryValueExA, RegOpenKeyExA, RegCloseKey<br>> oleaut32.dll: SysFreeString<br>> kernel32.dll: TlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA<br>> kernel32.dll: WriteFile, WaitForSingleObject, VirtualQuery, SetFileTime, SetFileAttributesA, RemoveDirectoryA, LocalFileTimeToFileTime, GetVersionExA, GetThreadLocale, GetTempPathA, GetSystemDefaultLangID, GetStringTypeExA, GetStdHandle, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFileAttributesA, GetExitCodeProcess, GetDiskFreeSpaceA, GetCurrentProcessId, GetCPInfo, GetACP, FormatMessageA, FindNextFileA, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumCalendarInfoA, DosDateTimeToFileTime, DeleteFileA, CreateDirectoryA, CloseHandle<br>> gdi32.dll: TextOutA, SetTextColor, SetBkColor, SelectObject, GetTextExtentPoint32A, ExtTextOutA, DeleteObject, CreateFontA<br>> user32.dll: CreateWindowExA, RegisterClassExA, PeekMessageA, MessageBoxA, LoadStringA, InvalidateRect, GetSystemMetrics, GetSysColor, EndPaint, DrawEdge, DispatchMessageA, DestroyWindow, DefWindowProcA, BeginPaint, CharNextA, CharToOemA<br>> shell32.dll: ShellExecuteExA<br><br>( 0 exports ) <br>
PDFiD.: -
RDS...: NSRL Reference Data Set<br>-
SkyTech a écrit :
D:\Documents and Settings\APPLICATIONS\Application Data\Microsoft\Notification de cadeaux MSN\lsnfier.exe
Fichier lsnfier.exe reçu le 2009.08.02 18:36:44 (UTC)
Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.24 2009.08.02 -
AhnLab-V3 5.0.0.2 2009.08.01 -
AntiVir 7.9.0.238 2009.08.02 -
Antiy-AVL 2.0.3.7 2009.07.31 -
Authentium 5.1.2.4 2009.08.02 -
Avast 4.8.1335.0 2009.08.01 -
AVG 8.5.0.406 2009.08.02 -
BitDefender 7.2 2009.08.02 -
CAT-QuickHeal 10.00 2009.07.30 -
ClamAV 0.94.1 2009.08.02 -
Comodo 1841 2009.08.02 -
DrWeb 5.0.0.12182 2009.08.02 -
eSafe 7.0.17.0 2009.07.30 Suspicious File
eTrust-Vet 31.6.6650 2009.08.01 -
F-Prot 4.4.4.56 2009.08.02 -
F-Secure 8.0.14470.0 2009.08.01 -
Fortinet 3.120.0.0 2009.08.02 -
GData 19 2009.08.02 -
Ikarus T3.1.1.64.0 2009.08.02 -
Jiangmin 11.0.800 2009.08.02 -
K7AntiVirus 7.10.808 2009.08.01 -
Kaspersky 7.0.0.125 2009.08.02 -
McAfee 5695 2009.08.01 -
McAfee+Artemis 5695 2009.08.01 -
McAfee-GW-Edition 6.8.5 2009.08.02 Heuristic.LooksLike.Win32.Suspicious.H
Microsoft 1.4903 2009.08.02 -
NOD32 4299 2009.08.02 -
Norman 6.01.09 2009.07.31 -
nProtect 2009.1.8.0 2009.08.02 -
Panda 10.0.0.14 2009.08.02 Suspicious file
PCTools 4.4.2.0 2009.08.02 -
Prevx 3.0 2009.08.02 -
Rising 21.40.62.00 2009.08.02 -
Sophos 4.44.0 2009.08.02 -
Sunbelt 3.2.1858.2 2009.08.02 -
Symantec 1.4.4.12 2009.08.02 -
TheHacker 6.3.4.3.375 2009.08.01 -
TrendMicro 8.950.0.1094 2009.07.31 -
VBA32 3.12.10.9 2009.08.02 -
ViRobot 2009.7.31.1863 2009.07.31 -
VirusBuster 4.6.5.0 2009.08.02 -
Information additionnelle
File size: 135680 bytes
MD5...: bc9c9be7bb74d629362608ace470e7da
SHA1..: aeede8873673275d437d32ca7fe34580fbf1b9ed
SHA256: 7a93c87e62d7908b992dbd494070db1626855e149a46ecb989c38853e5621cef
ssdeep: 1536:j7f+kJBYwWFQV2Nx+itTM4Ol+fUeqE12tqNVysk0x1PFpsM3UnoqJ6IpuaV<br>xEuPy:f3vY5G2N9D9lqcPjkoqJ6F8gRRh8kSY<br>
PEiD..: UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser
TrID..: File type identification<br>UPX compressed Win32 Executable (39.5%)<br>Win32 EXE Yoda's Crypter (34.3%)<br>Win32 Executable Generic (11.0%)<br>Win32 Dynamic Link Library (generic) (9.8%)<br>Generic Win/DOS Executable (2.5%)
PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0x2fab0<br>timedatestamp.....: 0x49bea41c (Mon Mar 16 19:10:20 2009)<br>machinetype.......: 0x14c (I386)<br><br>( 3 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>UPX0 0x1000 0x27000 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e<br>UPX1 0x28000 0x8000 0x7e00 7.87 143ba0e823234b7b48bc0158ae5ea21f<br>.rsrc 0x30000 0x19000 0x19000 7.50 d0d48ffcbbe1fedcf0a4634b234066bf<br><br>( 5 imports ) <br>> KERNEL32.DLL: LoadLibraryA, GetProcAddress, ExitProcess<br>> ADVAPI32.dll: RegCloseKey<br>> SHELL32.dll: ShellExecuteW<br>> urlmon.dll: URLDownloadToCacheFileW<br>> USER32.dll: LoadImageW<br><br>( 0 exports ) <br>
PDFiD.: -
RDS...: NSRL Reference Data Set<br>-
ThreatExpert info: <a href='
http://www.threatexpert.com/report.aspx ... ace470e7da' target='_blank'>
http://www.threatexpert.com/report.aspx ... 470e7da</a>
packers (Kaspersky): UPX
packers (F-Prot): UPX
Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.24 2009.08.02 -
AhnLab-V3 5.0.0.2 2009.08.01 -
AntiVir 7.9.0.238 2009.08.02 -
Antiy-AVL 2.0.3.7 2009.07.31 -
Authentium 5.1.2.4 2009.08.02 -
Avast 4.8.1335.0 2009.08.01 -
AVG 8.5.0.406 2009.08.02 -
BitDefender 7.2 2009.08.02 -
CAT-QuickHeal 10.00 2009.07.30 -
ClamAV 0.94.1 2009.08.02 -
Comodo 1841 2009.08.02 -
DrWeb 5.0.0.12182 2009.08.02 -
eSafe 7.0.17.0 2009.07.30 Suspicious File
eTrust-Vet 31.6.6650 2009.08.01 -
F-Prot 4.4.4.56 2009.08.02 -
F-Secure 8.0.14470.0 2009.08.01 -
Fortinet 3.120.0.0 2009.08.02 -
GData 19 2009.08.02 -
Ikarus T3.1.1.64.0 2009.08.02 -
Jiangmin 11.0.800 2009.08.02 -
K7AntiVirus 7.10.808 2009.08.01 -
Kaspersky 7.0.0.125 2009.08.02 -
McAfee 5695 2009.08.01 -
McAfee+Artemis 5695 2009.08.01 -
McAfee-GW-Edition 6.8.5 2009.08.02 Heuristic.LooksLike.Win32.Suspicious.H
Microsoft 1.4903 2009.08.02 -
NOD32 4299 2009.08.02 -
Norman 6.01.09 2009.07.31 -
nProtect 2009.1.8.0 2009.08.02 -
Panda 10.0.0.14 2009.08.02 Suspicious file
PCTools 4.4.2.0 2009.08.02 -
Prevx 3.0 2009.08.02 -
Rising 21.40.62.00 2009.08.02 -
Sophos 4.44.0 2009.08.02 -
Sunbelt 3.2.1858.2 2009.08.02 -
Symantec 1.4.4.12 2009.08.02 -
TheHacker 6.3.4.3.375 2009.08.01 -
TrendMicro 8.950.0.1094 2009.07.31 -
VBA32 3.12.10.9 2009.08.02 -
ViRobot 2009.7.31.1863 2009.07.31 -
VirusBuster 4.6.5.0 2009.08.02 -
Information additionnelle
File size: 135680 bytes
MD5...: bc9c9be7bb74d629362608ace470e7da
SHA1..: aeede8873673275d437d32ca7fe34580fbf1b9ed
SHA256: 7a93c87e62d7908b992dbd494070db1626855e149a46ecb989c38853e5621cef
ssdeep: 1536:j7f+kJBYwWFQV2Nx+itTM4Ol+fUeqE12tqNVysk0x1PFpsM3UnoqJ6IpuaV<br>xEuPy:f3vY5G2N9D9lqcPjkoqJ6F8gRRh8kSY<br>
PEiD..: UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser
TrID..: File type identification<br>UPX compressed Win32 Executable (39.5%)<br>Win32 EXE Yoda's Crypter (34.3%)<br>Win32 Executable Generic (11.0%)<br>Win32 Dynamic Link Library (generic) (9.8%)<br>Generic Win/DOS Executable (2.5%)
PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0x2fab0<br>timedatestamp.....: 0x49bea41c (Mon Mar 16 19:10:20 2009)<br>machinetype.......: 0x14c (I386)<br><br>( 3 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>UPX0 0x1000 0x27000 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e<br>UPX1 0x28000 0x8000 0x7e00 7.87 143ba0e823234b7b48bc0158ae5ea21f<br>.rsrc 0x30000 0x19000 0x19000 7.50 d0d48ffcbbe1fedcf0a4634b234066bf<br><br>( 5 imports ) <br>> KERNEL32.DLL: LoadLibraryA, GetProcAddress, ExitProcess<br>> ADVAPI32.dll: RegCloseKey<br>> SHELL32.dll: ShellExecuteW<br>> urlmon.dll: URLDownloadToCacheFileW<br>> USER32.dll: LoadImageW<br><br>( 0 exports ) <br>
PDFiD.: -
RDS...: NSRL Reference Data Set<br>-
ThreatExpert info: <a href='
http://www.threatexpert.com/report.aspx ... ace470e7da' target='_blank'>
http://www.threatexpert.com/report.aspx ... 470e7da</a>
packers (Kaspersky): UPX
packers (F-Prot): UPX
SkyTech a écrit :
D:\DOCUME~1\APPLIC~1\LOCALS~1\Temp\~sfx00000EC4\1200D\Loader.exe
Fichier loader.exe reçu le 2009.08.02 18:54:53 (UTC)
Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.24 2009.08.02 -
AhnLab-V3 5.0.0.2 2009.08.01 -
AntiVir 7.9.0.238 2009.08.02 -
Antiy-AVL 2.0.3.7 2009.07.31 -
Authentium 5.1.2.4 2009.08.02 -
Avast 4.8.1335.0 2009.08.01 -
AVG 8.5.0.406 2009.08.02 -
BitDefender 7.2 2009.08.02 -
CAT-QuickHeal 10.00 2009.07.30 -
ClamAV 0.94.1 2009.08.02 -
Comodo 1841 2009.08.02 -
DrWeb 5.0.0.12182 2009.08.02 -
eSafe 7.0.17.0 2009.07.30 -
eTrust-Vet 31.6.6650 2009.08.01 -
F-Prot 4.4.4.56 2009.08.02 -
F-Secure 8.0.14470.0 2009.08.01 -
Fortinet 3.120.0.0 2009.08.02 -
GData 19 2009.08.02 -
Ikarus T3.1.1.64.0 2009.08.02 -
Jiangmin 11.0.800 2009.08.02 -
K7AntiVirus 7.10.808 2009.08.01 -
Kaspersky 7.0.0.125 2009.08.02 -
McAfee 5695 2009.08.01 -
McAfee+Artemis 5695 2009.08.01 -
McAfee-GW-Edition 6.8.5 2009.08.02 -
Microsoft 1.4903 2009.08.02 -
NOD32 4299 2009.08.02 -
Norman 6.01.09 2009.07.31 -
nProtect 2009.1.8.0 2009.08.02 -
Panda 10.0.0.14 2009.08.02 -
PCTools 4.4.2.0 2009.08.02 -
Prevx 3.0 2009.08.02 -
Rising 21.40.62.00 2009.08.02 -
Sophos 4.44.0 2009.08.02 -
Sunbelt 3.2.1858.2 2009.08.02 -
Symantec 1.4.4.12 2009.08.02 -
TheHacker 6.3.4.3.375 2009.08.01 -
TrendMicro 8.950.0.1094 2009.07.31 -
VBA32 3.12.10.9 2009.08.02 -
ViRobot 2009.7.31.1863 2009.07.31 -
VirusBuster 4.6.5.0 2009.08.02 -
Information additionnelle
File size: 226816 bytes
MD5...: 82a3f10ab4948edf30ff1d5f33771be3
SHA1..: 0ff9a016747f59af9e3e598d293615a5f9e123e2
SHA256: f40df4529fe723311784835549af366f7285383097039a86107180ae47310eff
ssdeep: 3072:kTen+oxnRuCVMS5bqm/hvpIx4c0jpG6UuKUxWSZHbW3p2GtapAslml3DLqe<br>SNV5z:kK+u8CKM8V8c6p/WSZHzuD2x<br>
PEiD..: -
TrID..: File type identification<br>Win32 Executable MS Visual C++ (generic) (72.0%)<br>Win32 Executable Generic (16.2%)<br>Win16/32 Executable Delphi generic (3.9%)<br>Generic Win/DOS Executable (3.8%)<br>DOS Executable Generic (3.8%)
PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0x1000<br>timedatestamp.....: 0x4909d1b6 (Thu Oct 30 15:24:38 2008)<br>machinetype.......: 0x14c (I386)<br><br>( 5 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>.text 0x1000 0x2ebb8 0x2ec00 6.34 703d9f192b32ca890c4f6bc5904356f7<br>.data 0x30000 0xde4 0xe00 5.68 cb54c8419b80b5039777f88d73293598<br>.rdata 0x31000 0x6a1c 0x6c00 6.89 ea8cacdb5b1a3b1d44bce4eff05f9a93<br>.bss 0x38000 0x47ba0 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e<br>.idata 0x80000 0xa98 0xc00 4.11 32bde42ac32c3c24553e2a740d8513a2<br><br>( 3 imports ) <br>> cygwin1.dll: __assert, __errno, __main, _ctype_, _fcntl64, _fopen64, _impure_ptr, _mmap64, _open64, _stat64, accept, alarm, atoi, bind, calloc, cfsetispeed, cfsetospeed, close, connect, ctime, cygwin_internal, daemon, dll_crt0__FP11per_process, exit, fclose, fflush, fgets, fork, fprintf, fputc, fputs, free, ftime, fwrite, gethostbyname, getopt, getpid, getppid, getpriority, getprotobyname, getsockopt, gmtime, inet_addr, inet_network, inet_ntoa, ioctl, kill, listen, localtime, malloc, memcpy, memmove, memset, munmap, nanosleep, openlog, optarg, pipe, poll, rand, read, realloc, recv, recvfrom, rename, select, send, sendto, setsockopt, sigaction, sigemptyset, sleep, snprintf, socket, sprintf, strchr, strcmp, strcpy, strlen, strncat, strncmp, strncpy, strrchr, strstr, strtok, syslog, tcflush, tcgetattr, tcsetattr, time, unlink, usleep, vsprintf, waitpid, write, _fcntl64, _fopen64, _mmap64, _open64, _stat64<br>> cygwin1.dll: __getreent, pthread_create, pthread_detach<br>> KERNEL32.dll: GetCurrentProcess, GetModuleHandleA, SetPriorityClass<br><br>( 0 exports ) <br>
PDFiD.: -
RDS...: NSRL Reference Data Set<br>-
Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.24 2009.08.02 -
AhnLab-V3 5.0.0.2 2009.08.01 -
AntiVir 7.9.0.238 2009.08.02 -
Antiy-AVL 2.0.3.7 2009.07.31 -
Authentium 5.1.2.4 2009.08.02 -
Avast 4.8.1335.0 2009.08.01 -
AVG 8.5.0.406 2009.08.02 -
BitDefender 7.2 2009.08.02 -
CAT-QuickHeal 10.00 2009.07.30 -
ClamAV 0.94.1 2009.08.02 -
Comodo 1841 2009.08.02 -
DrWeb 5.0.0.12182 2009.08.02 -
eSafe 7.0.17.0 2009.07.30 -
eTrust-Vet 31.6.6650 2009.08.01 -
F-Prot 4.4.4.56 2009.08.02 -
F-Secure 8.0.14470.0 2009.08.01 -
Fortinet 3.120.0.0 2009.08.02 -
GData 19 2009.08.02 -
Ikarus T3.1.1.64.0 2009.08.02 -
Jiangmin 11.0.800 2009.08.02 -
K7AntiVirus 7.10.808 2009.08.01 -
Kaspersky 7.0.0.125 2009.08.02 -
McAfee 5695 2009.08.01 -
McAfee+Artemis 5695 2009.08.01 -
McAfee-GW-Edition 6.8.5 2009.08.02 -
Microsoft 1.4903 2009.08.02 -
NOD32 4299 2009.08.02 -
Norman 6.01.09 2009.07.31 -
nProtect 2009.1.8.0 2009.08.02 -
Panda 10.0.0.14 2009.08.02 -
PCTools 4.4.2.0 2009.08.02 -
Prevx 3.0 2009.08.02 -
Rising 21.40.62.00 2009.08.02 -
Sophos 4.44.0 2009.08.02 -
Sunbelt 3.2.1858.2 2009.08.02 -
Symantec 1.4.4.12 2009.08.02 -
TheHacker 6.3.4.3.375 2009.08.01 -
TrendMicro 8.950.0.1094 2009.07.31 -
VBA32 3.12.10.9 2009.08.02 -
ViRobot 2009.7.31.1863 2009.07.31 -
VirusBuster 4.6.5.0 2009.08.02 -
Information additionnelle
File size: 226816 bytes
MD5...: 82a3f10ab4948edf30ff1d5f33771be3
SHA1..: 0ff9a016747f59af9e3e598d293615a5f9e123e2
SHA256: f40df4529fe723311784835549af366f7285383097039a86107180ae47310eff
ssdeep: 3072:kTen+oxnRuCVMS5bqm/hvpIx4c0jpG6UuKUxWSZHbW3p2GtapAslml3DLqe<br>SNV5z:kK+u8CKM8V8c6p/WSZHzuD2x<br>
PEiD..: -
TrID..: File type identification<br>Win32 Executable MS Visual C++ (generic) (72.0%)<br>Win32 Executable Generic (16.2%)<br>Win16/32 Executable Delphi generic (3.9%)<br>Generic Win/DOS Executable (3.8%)<br>DOS Executable Generic (3.8%)
PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0x1000<br>timedatestamp.....: 0x4909d1b6 (Thu Oct 30 15:24:38 2008)<br>machinetype.......: 0x14c (I386)<br><br>( 5 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>.text 0x1000 0x2ebb8 0x2ec00 6.34 703d9f192b32ca890c4f6bc5904356f7<br>.data 0x30000 0xde4 0xe00 5.68 cb54c8419b80b5039777f88d73293598<br>.rdata 0x31000 0x6a1c 0x6c00 6.89 ea8cacdb5b1a3b1d44bce4eff05f9a93<br>.bss 0x38000 0x47ba0 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e<br>.idata 0x80000 0xa98 0xc00 4.11 32bde42ac32c3c24553e2a740d8513a2<br><br>( 3 imports ) <br>> cygwin1.dll: __assert, __errno, __main, _ctype_, _fcntl64, _fopen64, _impure_ptr, _mmap64, _open64, _stat64, accept, alarm, atoi, bind, calloc, cfsetispeed, cfsetospeed, close, connect, ctime, cygwin_internal, daemon, dll_crt0__FP11per_process, exit, fclose, fflush, fgets, fork, fprintf, fputc, fputs, free, ftime, fwrite, gethostbyname, getopt, getpid, getppid, getpriority, getprotobyname, getsockopt, gmtime, inet_addr, inet_network, inet_ntoa, ioctl, kill, listen, localtime, malloc, memcpy, memmove, memset, munmap, nanosleep, openlog, optarg, pipe, poll, rand, read, realloc, recv, recvfrom, rename, select, send, sendto, setsockopt, sigaction, sigemptyset, sleep, snprintf, socket, sprintf, strchr, strcmp, strcpy, strlen, strncat, strncmp, strncpy, strrchr, strstr, strtok, syslog, tcflush, tcgetattr, tcsetattr, time, unlink, usleep, vsprintf, waitpid, write, _fcntl64, _fopen64, _mmap64, _open64, _stat64<br>> cygwin1.dll: __getreent, pthread_create, pthread_detach<br>> KERNEL32.dll: GetCurrentProcess, GetModuleHandleA, SetPriorityClass<br><br>( 0 exports ) <br>
PDFiD.: -
RDS...: NSRL Reference Data Set<br>-
SkyTech a écrit :
D:\DOCUME~1\APPLIC~1\LOCALS~1\Temp\~sfx00000EC4\Fouad_Minou.exe
j'ai pas trouvé ce fichier!!...j'ai trouvé seulement: "FOUAD_MINOU.EXE-09CCB83C.pf" ; "FOUAD_MINOU.EXE-21C0F4E4.pf" et "FOUAD_MINOU.EXE-3004761A.pf" dans le dossier: D:\WINDOWS\Preftech....
