Aller au contenu

Maheva

Membres
  • Compteur de contenus

    43
  • Inscription

  • Dernière visite

Maheva's Achievements

Member

Member (4/12)

0

Réputation sur la communauté

  1. Bonjour, Fin décembre 2010, j'ai acheté un ordinateur portable. Jusqu'à présent je n'avais jamais tenté d'utiliser le graveur, j'ai essayé pour la première fois il y a quelques jours et il ne marche pas. J'ai utilisé comme logiciel de gravure: celui de windows, nero, cyberlink power2go et cdburnerxp. Aucun ne marche. J'ai changé plusieurs fois de dvd vierge et rien n'y fait. J'ai finalement gravé sur l'ordinateur d'un ami avec les mêmes dvd et avec nero. J'en conclu que c'est mon graveur qui ne marche pas. Ordinateur: Asus N73JQ OS: Windows 7 Graveur: Slimtype BD E DS4ES1 Fichier à graver: .avi DVD vierge: DVD+RW de Philips Quelqu'un aurait-il une solution ? Merci J'ai oublié de préciser que mon ordinateur lit très bien les DVD et même les DVD+RW. Ce n'est que la gravure qui ne marche pas.
  2. Maheva

    Erreur de gravure

    Ah ok ! Merci. Mais pourtant j'ai déjà graver avec ces dvd. C'est une pile que j'ai acheté il y a quelques mois. Bon si je trouve d'autres dvd + RW je vais essayer avec.
  3. Maheva

    Erreur de gravure

    Alors il me met un message d'erreur: " Une erreur de gravure est survenue Une erreur de gravure est survenue pendant la gravure du disque. Le disque risque d'être inutilisable. Ces erreurs surviennent généralement lorsque les médias insérés ne sont pas compatibles avec le graveur ou sont de mauvaise qualité. (devCannotFormatMedium_IncompatibleMedium) Could not write to Disc (LBA: 0 Length: 32). Cannot Format Medium ? Incompatible Medium. - 0x053006 " Je vois pas comment les médias pourrait être de mauvaise qualité. C'est une vidéo que j'ai faite. Que ce soit en format .avi ou .mpeg ça marche pas.
  4. Maheva

    Erreur de gravure

    Mon ordinateur a à peine 1 et demi, j'espère que le graveur n'est pas déjà mort. Dans le gestionnaire de périphérique, tout est ok. Je vais essayer de télécharger CDBunerXP pour voir ce que ça donne.
  5. Maheva

    Erreur de gravure

    Bonjour, Alors voilà je n'arrive plus à graver de dvd de données sur mon ordinateur. Je précise que j'utilise la même boîte de dvd + RW, que j'ai déjà graver des dvd de données avec. Quand j'utilise nero, il me dit "échec de la gravure" alors qu'il commence le formatage. Quand j'utilise le graveur windows, il me dit qu'il n'a pas réussi à faire le formatage. Mes dvd sont bien vierge et j'ai essayé avec différents DVD. J'ai même mis mes pilotes à jour mais rien ni fait. Si vous pouvez m'aider. Merci
  6. Maheva

    Internet rame

    Bonsoir Tonton57, Maintenant que tu le dit, c'est vrai que le démarrage est assez lent lui aussi.
  7. Bonsoir, Je ne sais pas si c'est le bon endroit pour poster ce sujet mais je me lance. Cela fait quelque semaine que mon internet rame. Pour acceder à une page, je met des blombes et si j'en lance 2 c'est catastrophique, internet ne répond plus ! J'ai fait des analyse antivirus mais apparament je n'ai rien. Quelqu'un pourrait m'aider ? Merci
  8. Merci pour tout Falkra. Tu m'as vraiment aidé. Je vais essayer de faire attention maintenant. Promis.
  9. Voici le rapport de Hijackthis Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 18:53:58, on 13/12/2009 Platform: Windows Vista SP2 (WinNT 6.00.1906) MSIE: Internet Explorer v8.00 (8.00.6001.18865) Boot mode: Normal Running processes: C:\Windows\system32\Dwm.exe C:\Windows\Explorer.EXE C:\Windows\system32\taskeng.exe C:\Windows\system32\taskeng.exe C:\Program Files\ASUS\ASUS Live Update\ALU.exe C:\Program Files\ASUS\SmartLogon\sensorsrv.exe C:\Program Files\Windows Defender\MSASCui.exe C:\Windows\System32\rundll32.exe C:\Program Files\ATK Hotkey\HControlUser.exe C:\Program Files\ATKOSD2\ATKOSD2.exe C:\Windows\RtHDVCpl.exe C:\Program Files\Synaptics\SynTP\SynTPEnh.exe C:\Program Files\ASUS\ATK Media\DMedia.exe C:\Windows\ASScrPro.exe C:\Program Files\Orange\Systray\SystrayApp.exe C:\Program Files\Orange\Antivirus Firewall\Common\FSM32.EXE C:\Program Files\Windows Sidebar\sidebar.exe C:\Program Files\Common Files\LightScribe\LightScribeControlPanel.exe C:\Windows\ehome\ehtray.exe C:\Program Files\Windows Media Player\wmpnscfg.exe C:\Windows\ehome\ehmsas.exe C:\Program Files\Orange\Launcher\Launcher.exe C:\Windows\System32\mobsync.exe C:\PROGRA~1\COMMON~1\France Telecom\Shared Modules\AlertModule\0\AlertModule.exe C:\Program Files\Synaptics\SynTP\SynTPHelper.exe C:\Program Files\Orange\connectivity\connectivitymanager.exe C:\Program Files\Orange\connectivity\CoreCom\CoreCom.exe C:\Program Files\Orange\connectivity\CoreCom\OraConfigRecover.exe C:\PROGRA~1\COMMON~1\France Telecom\Shared Modules\FTCOMModule\0\FTCOMModule.exe C:\Windows\system32\wbem\unsecapp.exe C:\Windows\system32\SearchProtocolHost.exe C:\Windows\system32\SearchFilterHost.exe C:\Users\Carole\Desktop\hijackthis-2.0.2.75917.exe C:\Users\Carole\AppData\Local\Temp\hijackthis-2.0.2.75917.exe R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.fr/ R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = R3 - URLSearchHook: Search Class - {08C06D61-F1F3-4799-86F8-BE1A89362C85} - C:\Program Files\Orange\SearchURLHook\SearchPageURL.dll O2 - BHO: Aide pour le lien d'Adobe PDF Reader - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll O2 - BHO: LitmusBHO - {C6867EB7-8350-4856-877F-93CF8AE3DC9C} - C:\Program Files\Orange\Antivirus Firewall\NRS\iescript\baselitmus.dll O2 - BHO: (no name) - {DBC80044-A445-435b-BC74-9C25C1C588A9} - (no file) O3 - Toolbar: Browsing Protection Toolbar - {265EEE8E-3228-44D3-AEA5-F7FDF5860049} - C:\Program Files\Orange\Antivirus Firewall\NRS\iescript\baselitmus.dll O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInit O4 - HKLM\..\Run: [HControlUser] "C:\Program Files\ATK Hotkey\HcontrolUser.exe" O4 - HKLM\..\Run: [ATKOSD2] "C:\Program Files\ATKOSD2\ATKOSD2.exe" O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe O4 - HKLM\..\Run: [synTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe O4 - HKLM\..\Run: [ATKMEDIA] C:\Program Files\ASUS\ATK Media\DMedia.exe O4 - HKLM\..\Run: [ASUS Camera ScreenSaver] C:\Windows\AsScrProlog.exe O4 - HKLM\..\Run: [ASUS Screen Saver Protector] C:\Windows\ASScrPro.exe O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe" O4 - HKLM\..\Run: [systrayORAHSS] "C:\Program Files\Orange\Systray\SystrayApp.exe" O4 - HKLM\..\Run: [ORAHSSSessionManager] C:\Program Files\Orange\SessionManager\SessionManager.exe O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript O4 - HKLM\..\Run: [F-Secure Manager] "C:\Program Files\Orange\Antivirus Firewall\Common\FSM32.EXE" /splash O4 - HKLM\..\Run: [F-Secure TNB] "C:\Program Files\Orange\Antivirus Firewall\FSGUI\TNBUtil.exe" /CHECKALL /WAITFORSW O4 - HKCU\..\Run: [sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun O4 - HKCU\..\Run: [LightScribe Control Panel] C:\Program Files\Common Files\LightScribe\LightScribeControlPanel.exe -hidden O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000 O9 - Extra button: Envoyer à OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll O9 - Extra 'Tools' menuitem: &Envoyer à OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL O15 - Trusted Zone: http://www.orange.fr O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} (get_atlcom Class) - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab O23 - Service: ADSM Service (ADSMService) - Unknown owner - C:\Program Files\ASUS\ASUS Data Security Manager\ADSMSrv.exe O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe O23 - Service: ASLDR Service (ASLDRService) - Unknown owner - C:\Program Files\ATK Hotkey\ASLDRSrv.exe O23 - Service: ATKGFNEX Service (ATKGFNEXSrv) - Unknown owner - C:\Program Files\ATKGFNEX\GFNEXSrv.exe O23 - Service: Service Bonjour (Bonjour Service) - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe O23 - Service: FSGKHS (F-Secure Gatekeeper Handler Starter) - F-Secure Corporation - C:\Program Files\Orange\Antivirus Firewall\Anti-Virus\fsgk32st.exe O23 - Service: F-Secure Anti-Virus Firewall Daemon (FSDFWD) - F-Secure Corporation - C:\Program Files\Orange\Antivirus Firewall\FWES\Program\fsdfwd.exe O23 - Service: F-Secure Management Agent (FSMA) - F-Secure Corporation - C:\Program Files\Orange\Antivirus Firewall\Common\FSMA32.EXE O23 - Service: F-Secure ORSP Client (FSORSPClient) - F-Secure Corporation - C:\Program Files\Orange\Antivirus Firewall\ORSP Client\fsorsp.exe O23 - Service: France Telecom Routing Table Service (FTRTSVC) - France Telecom SA - C:\PROGRA~1\COMMON~1\France Telecom\Shared Modules\FTRTSVC\0\FTRTSVC.exe O23 - Service: Image Converter SCSI Service (ICScsiSV) - Sony Corporation - C:\Program Files\Sony\IMAGE CONVERTER 3\ICScsiSV.exe O23 - Service: IcVzMonLauncher - Sony Corporation - C:\Program Files\Sony\IMAGE CONVERTER 3\IcVzMonLauncher.exe O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe O23 - Service: Image Converter video recording monitor for VAIO Entertainment - Sony Corporation - C:\Program Files\Sony\IMAGE CONVERTER 3\IcVzMon.exe O23 - Service: Service de l’iPod (iPod Service) - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe O23 - Service: MSCSPTISRV - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\MSCSPTISRV.exe O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\Windows\system32\nvvsvc.exe O23 - Service: PACSPTISVR - Unknown owner - C:\Program Files\Common Files\Sony Shared\AVLib\PACSPTISVR.exe O23 - Service: SonicStage Back-End Service - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SsBeSvc.exe O23 - Service: spmgr - Unknown owner - C:\Program Files\ASUS\NB Probe\SPM\spmgr.exe O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exe O23 - Service: SonicStage SCSI Service (SSScsiSV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SSScsiSV.exe -- End of file - 8262 bytes
  10. Ben de puis quelques jours non. Mon antivirus ne me signale plus rien.
  11. Voici le rapport mbr Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net device: opened successfully user: MBR read successfully kernel: MBR read successfully user & kernel MBR OK
  12. Celui de halmacpi.dll Fichier halmacpi.dll reçu le 2009.12.13 10:12:53 (UTC)Antivirus Version Dernière mise à jour Résultat a-squared 4.5.0.43 2009.12.13 - AhnLab-V3 5.0.0.2 2009.12.12 - AntiVir 7.9.1.108 2009.12.11 - Antiy-AVL 2.0.3.7 2009.12.11 - Authentium 5.2.0.5 2009.12.02 - Avast 4.8.1351.0 2009.12.12 - AVG 8.5.0.427 2009.12.13 - BitDefender 7.2 2009.12.13 - CAT-QuickHeal 10.00 2009.12.12 - ClamAV 0.94.1 2009.12.13 - Comodo 3226 2009.12.13 - DrWeb 5.0.0.12182 2009.12.13 - eSafe 7.0.17.0 2009.12.10 - eTrust-Vet 35.1.7171 2009.12.11 - F-Prot 4.5.1.85 2009.12.12 - F-Secure 9.0.15370.0 2009.12.13 - Fortinet 4.0.14.0 2009.12.13 - GData 19 2009.12.13 - Ikarus T3.1.1.74.0 2009.12.13 - Jiangmin 13.0.900 2009.12.13 - K7AntiVirus 7.10.918 2009.12.11 - Kaspersky 7.0.0.125 2009.12.13 - McAfee 5830 2009.12.12 - McAfee+Artemis 5830 2009.12.12 - McAfee-GW-Edition 6.8.5 2009.12.13 - Microsoft 1.5302 2009.12.13 - NOD32 4682 2009.12.12 - Norman 6.04.03 2009.12.12 - nProtect 2009.1.8.0 2009.12.13 - Panda 10.0.2.2 2009.12.12 - PCTools 7.0.3.5 2009.12.12 - Prevx 3.0 2009.12.13 - Rising 22.25.06.05 2009.12.13 - Sophos 4.48.0 2009.12.13 - Sunbelt 3.2.1858.2 2009.12.13 - Symantec 1.4.4.12 2009.12.13 - TheHacker 6.5.0.2.092 2009.12.12 - TrendMicro 9.100.0.1001 2009.12.13 - VBA32 3.12.12.0 2009.12.12 - ViRobot 2009.12.12.2085 2009.12.12 - VirusBuster 5.0.21.0 2009.12.12 - Information additionnelle File size: 177128 bytes MD5...: b8d52005181a15d7d1470cbf2af214dd SHA1..: 5be37b8e2cdf4cea334d0070ecf0421b08936732 SHA256: b6d9de353b13e61eaccdc41eb73043919b7f3cb232756233f0d732071023afe8 ssdeep: 3072:0cO3wEqEyxFOY1lHgpm7p7QmNNxQuUaWf+tE6zPPZJnifFxV1DIs:0ctd6Y<BR>1lz7vbWfQP2fTIs<BR> PEiD..: - PEInfo: PE Structure information<BR><BR>( base data )<BR>entrypointaddress.: 0x0<BR>timedatestamp.....: 0x49e018d9 (Sat Apr 11 04:13:13 2009)<BR>machinetype.......: 0x14c (I386)<BR><BR>( 12 sections )<BR>name viradd virsiz rawdsiz ntrpy md5<BR>.text 0x1000 0x15494 0x15600 6.73 0bfa8446e3ab601ba8e0e91eb3d85139<BR>_PAGELK 0x17000 0x150b 0x1600 5.90 20e6fcbff686f899aba43894f3ec8f4c<BR>.data 0x19000 0x3ca3 0xc00 3.01 f687241e14db8ff585f12b28b8e34cf3<BR>INITDAT 0x1d000 0x1e0 0x200 2.79 72f4d24ad8699caa32b7a3fe1c89f685<BR>PAGELK 0x1e000 0x4416 0x4600 6.65 ad808b3f165155d0865ef7f98317518a<BR>PAGELK16 0x23000 0x82 0x200 1.61 5fe7505eff85308dbc158fb8dc2cc406<BR>PAGE 0x24000 0x2b44 0x2c00 6.55 ce9839e32fc0280ffbb4f99f46db62cb<BR>PAGEKD 0x27000 0x2518 0x2600 6.43 ce9ceb21bdbbd6bc16fc40688eae88ea<BR>.edata 0x2a000 0xecb 0x1000 5.43 d3d253b515907048894c940570cc1783<BR>INIT 0x2b000 0x42a6 0x4400 6.37 9aaca8bf779ccf95b2085b02c3f5a5eb<BR>.rsrc 0x30000 0x410 0x600 2.49 0b783164b370415d24915802dd619b79<BR>.reloc 0x31000 0x1fde 0x2000 6.46 595347ec37d66061f4cd46492d50ea51<BR><BR>( 3 imports ) <BR>> ntoskrnl.exe: KiIpiServiceRoutine, KeProfileInterrupt, KeUpdateRunTime, KeWaitForSingleObject, RtlMoveMemory, IoAllocateAdapterChannel, ObCreateObject, MmAllocateMappingAddress, MmUnmapReservedMapping, MmMapLockedPagesWithReservedMapping, memcpy, MmMapLockedPagesSpecifyCache, MmGetPhysicalAddress, MmAllocateContiguousMemorySpecifyCache, MmFreeContiguousMemory, RtlFindClearBitsAndSet, KeRemoveDeviceQueue, RtlClearBits, ObfDereferenceObject, Mm64BitPhysicalAddress, IoFreeMdl, IoAllocateMdl, MmUnlockPagableImageSection, MmLockPagableDataSection, MmMapIoSpace, ExAllocatePoolWithTag, RtlSetAllBits, RtlInitializeBitMap, KeInitializeDeviceQueue, ZwClose, ObInsertObject, ObReferenceObjectByPointer, IoAdapterObjectType, memset, KeSetEvent, ExFreePoolWithTag, MmUnmapLockedPages, RtlSetBits, IoRegisterPlugPlayNotification, IofCallDriver, IoBuildSynchronousFsdRequest, KeInitializeEvent, IoGetDeviceObjectPointer, RtlInitUnicodeString, IoGetDeviceInterfaces, _allshr, ExQueueWorkItem, KeInsertDeviceQueue, RtlCompareMemory, ExiAcquireFastMutex, ExiReleaseFastMutex, KeQuerySystemTime, WheaReportHwError, WheaGetErrorSource, KeRevertToUserAffinityThread, KeSetSystemAffinityThread, KefReleaseSpinLockFromDpcLevel, KefAcquireSpinLockAtDpcLevel, KeQueryActiveProcessors, KeSetTimerEx, KeInitializeMutex, KeInitializeTimerEx, KeInitializeDpc, _allmul, ZwQueryValueKey, ZwOpenKey, KiDispatchInterrupt, KiDeliverApc, KiCheckForSListAddress, MmUnmapIoSpace, EmpProviderRegister, DbgPrint, KeFindConfigurationNextEntry, KeFindConfigurationEntry, strncmp, RtlEqualString, RtlInitString, ZwEnumerateValueKey, PsChargeProcessCpuCycles, ZwSetValueKey, ZwCreateKey, InbvDisplayString, IoAssignDriveLetters, IoReadPartitionTable, IoSetPartitionInformation, IoWritePartitionTable, _stricmp, InbvCheckDisplayOwnership, KiBugCheckData, WRITE_REGISTER_UCHAR, InbvAcquireDisplayOwnership, EtwWrite, EtwEventEnabled, WRITE_REGISTER_ULONG, READ_REGISTER_ULONG, _aulldiv, KeSetTimeIncrement, HalPrivateDispatchTable, _vsnwprintf, RtlFindLeastSignificantBit, _wcsicmp, KeRevertToUserAffinityThreadEx, KeSetSystemAffinityThreadEx, MmLockPagableSectionByHandle, KeEnterKernelDebugger, KdDebuggerEnabled, KdDebuggerNotPresent, InbvSetScrollRegion, InbvEnableDisplayString, InbvInstallDisplayStringFilter, InbvSetTextColor, InbvSolidColorFill, InbvResetDisplay, InbvIsBootDriverInstalled, RtlIntegerToUnicodeString, RtlClearAllBits, RtlAreBitsClear, RtlFindNextForwardRunClear, RtlFindFirstRunClear, RtlTestBit, IoGetStackLimits, PoSetFixedWakeSource, RtlTimeFieldsToTime, RtlTimeToTimeFields, DbgPrintEx, IoDeleteDevice, IoAttachDeviceToDeviceStack, IoCreateDevice, EtwRegister, MmIsVerifierEnabled, IofCompleteRequest, PoStartNextPowerIrp, ObfReferenceObject, IoReportDetectedDevice, IoCreateDriver, MmAllocateContiguousMemory, PoSetHiberRange, KeInsertQueueDpc, KeSetTargetProcessorDpc, KeSetImportanceDpc, ExReleaseSpinLockShared, ExAcquireSpinLockShared, ExReleaseSpinLockExclusive, ExAcquireSpinLockExclusive, IoReportHalResourceUsage, ZwPowerInformation, ExRegisterCallback, ExCreateCallback, HalDispatchTable, KeQueryTimeIncrement, KeTickCount, _alldiv, atoi, strstr, WheaRegisterErrSrcInitializer, ZwQueryLicenseValue, KeRegisterBugCheckCallback, KeSetProfileIrql, PsGetCurrentProcessId, _allshl, EmClientQueryRuleState, Kei386EoiHelper, KeUpdateSystemTime, KeSaveStateForHibernate, KeBugCheckEx, ZwQueryKey, DbgBreakPoint, ZwDeleteValueKey, _aulldvrm, _alldvrm, RtlUnwind<BR>> KDCOM.dll: KdRestore<BR>> PSHED.dll: PshedRetrieveErrorInfo, PshedIsSystemWheaEnabled, PshedGetErrorSourceInfo<BR><BR>( 113 exports ) <BR>ExAcquireFastMutex, ExReleaseFastMutex, ExTryToAcquireFastMutex, HalAcquireDisplayOwnership, HalAdjustResourceList, HalAllProcessorsStarted, HalAllocateAdapterChannel, HalAllocateCommonBuffer, HalAllocateCrashDumpRegisters, HalAssignSlotResources, HalBeginSystemInterrupt, HalBugCheckSystem, HalCalibratePerformanceCounter, HalClearSoftwareInterrupt, HalConvertDeviceIdtToIrql, HalDisableInterrupt, HalDisplayString, HalEnableInterrupt, HalEndSystemInterrupt, HalEnumerateEnvironmentVariablesEx, HalFlushCommonBuffer, HalFreeCommonBuffer, HalGetAdapter, HalGetBusData, HalGetBusDataByOffset, HalGetEnvironmentVariable, HalGetEnvironmentVariableEx, HalGetInterruptTargetInformation, HalGetInterruptVector, HalGetMessageRoutingInfo, HalGetProcessorIdByNtNumber, HalGetVectorInput, HalHandleNMI, HalInitSystem, HalInitializeBios, HalInitializeOnResume, HalInitializeProcessor, HalMakeBeep, HalProcessorIdle, HalQueryDisplayParameters, HalQueryEnvironmentVariableInfoEx, HalQueryMaximumProcessorCount, HalQueryRealTimeClock, HalReadDmaCounter, HalRegisterDynamicProcessor, HalRegisterErrataCallbacks, HalReportResourceUsage, HalRequestIpi, HalRequestSoftwareInterrupt, HalReturnToFirmware, HalSetBusData, HalSetBusDataByOffset, HalSetDisplayParameters, HalSetEnvironmentVariable, HalSetEnvironmentVariableEx, HalSetProfileInterval, HalSetRealTimeClock, HalSetTimeIncrement, HalStartDynamicProcessor, HalStartNextProcessor, HalStartProfileInterrupt, HalStopProfileInterrupt, HalSystemVectorDispatchEntry, HalTranslateBusAddress, IoAssignDriveLetters, IoFlushAdapterBuffers, IoFreeAdapterChannel, IoFreeMapRegisters, IoMapTransfer, IoReadPartitionTable, IoSetPartitionInformation, IoWritePartitionTable, KdComPortInUse, KeAcquireInStackQueuedSpinLock, KeAcquireInStackQueuedSpinLockRaiseToSynch, KeAcquireQueuedSpinLock, KeAcquireQueuedSpinLockRaiseToSynch, KeAcquireSpinLock, KeAcquireSpinLockRaiseToSynch, KeFlushWriteBuffer, KeGetCurrentIrql, KeLowerIrql, KeQueryPerformanceCounter, KeRaiseIrql, KeRaiseIrqlToDpcLevel, KeRaiseIrqlToSynchLevel, KeReleaseInStackQueuedSpinLock, KeReleaseQueuedSpinLock, KeReleaseSpinLock, KeStallExecutionProcessor, KeTryToAcquireQueuedSpinLock, KeTryToAcquireQueuedSpinLockRaiseToSynch, KfAcquireSpinLock, KfLowerIrql, KfRaiseIrql, KfReleaseSpinLock, READ_PORT_BUFFER_UCHAR, READ_PORT_BUFFER_ULONG, READ_PORT_BUFFER_USHORT, READ_PORT_UCHAR, READ_PORT_ULONG, READ_PORT_USHORT, WRITE_PORT_BUFFER_UCHAR, WRITE_PORT_BUFFER_ULONG, WRITE_PORT_BUFFER_USHORT, WRITE_PORT_UCHAR, WRITE_PORT_ULONG, WRITE_PORT_USHORT, x86BiosAllocateBuffer, x86BiosCall, x86BiosFreeBuffer, x86BiosReadMemory, x86BiosWriteMemory<BR> RDS...: NSRL Reference Data Set<BR>- pdfid.: - trid..: Windows Screen Saver (51.1%)<BR>Win32 Executable Generic (33.2%)<BR>Generic Win/DOS Executable (7.8%)<BR>DOS Executable Generic (7.8%)<BR>Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%) sigcheck:<BR>publisher....: Microsoft Corporation<BR>copyright....: © Microsoft Corporation. All rights reserved.<BR>product......: Microsoft_ Windows_ Operating System<BR>description..: Hardware Abstraction Layer DLL<BR>original name: halmacpi.dll<BR>internal name: halmacpi.dll<BR>file version.: 6.0.6002.18005 (lh_sp2rtm.090410-1830)<BR>comments.....: n/a<BR>signers......: -<BR>signing date.: -<BR>verified.....: Unsigned<BR> Antivirus Version Dernière mise à jour Résultat a-squared 4.5.0.43 2009.12.13 - AhnLab-V3 5.0.0.2 2009.12.12 - AntiVir 7.9.1.108 2009.12.11 - Antiy-AVL 2.0.3.7 2009.12.11 - Authentium 5.2.0.5 2009.12.02 - Avast 4.8.1351.0 2009.12.12 - AVG 8.5.0.427 2009.12.13 - BitDefender 7.2 2009.12.13 - CAT-QuickHeal 10.00 2009.12.12 - ClamAV 0.94.1 2009.12.13 - Comodo 3226 2009.12.13 - DrWeb 5.0.0.12182 2009.12.13 - eSafe 7.0.17.0 2009.12.10 - eTrust-Vet 35.1.7171 2009.12.11 - F-Prot 4.5.1.85 2009.12.12 - F-Secure 9.0.15370.0 2009.12.13 - Fortinet 4.0.14.0 2009.12.13 - GData 19 2009.12.13 - Ikarus T3.1.1.74.0 2009.12.13 - Jiangmin 13.0.900 2009.12.13 - K7AntiVirus 7.10.918 2009.12.11 - Kaspersky 7.0.0.125 2009.12.13 - McAfee 5830 2009.12.12 - McAfee+Artemis 5830 2009.12.12 - McAfee-GW-Edition 6.8.5 2009.12.13 - Microsoft 1.5302 2009.12.13 - NOD32 4682 2009.12.12 - Norman 6.04.03 2009.12.12 - nProtect 2009.1.8.0 2009.12.13 - Panda 10.0.2.2 2009.12.12 - PCTools 7.0.3.5 2009.12.12 - Prevx 3.0 2009.12.13 - Rising 22.25.06.05 2009.12.13 - Sophos 4.48.0 2009.12.13 - Sunbelt 3.2.1858.2 2009.12.13 - Symantec 1.4.4.12 2009.12.13 - TheHacker 6.5.0.2.092 2009.12.12 - TrendMicro 9.100.0.1001 2009.12.13 - VBA32 3.12.12.0 2009.12.12 - ViRobot 2009.12.12.2085 2009.12.12 - VirusBuster 5.0.21.0 2009.12.12 - Information additionnelle File size: 177128 bytes MD5...: b8d52005181a15d7d1470cbf2af214dd SHA1..: 5be37b8e2cdf4cea334d0070ecf0421b08936732 SHA256: b6d9de353b13e61eaccdc41eb73043919b7f3cb232756233f0d732071023afe8 ssdeep: 3072:0cO3wEqEyxFOY1lHgpm7p7QmNNxQuUaWf+tE6zPPZJnifFxV1DIs:0ctd6Y<BR>1lz7vbWfQP2fTIs<BR> PEiD..: - PEInfo: PE Structure information<BR><BR>( base data )<BR>entrypointaddress.: 0x0<BR>timedatestamp.....: 0x49e018d9 (Sat Apr 11 04:13:13 2009)<BR>machinetype.......: 0x14c (I386)<BR><BR>( 12 sections )<BR>name viradd virsiz rawdsiz ntrpy md5<BR>.text 0x1000 0x15494 0x15600 6.73 0bfa8446e3ab601ba8e0e91eb3d85139<BR>_PAGELK 0x17000 0x150b 0x1600 5.90 20e6fcbff686f899aba43894f3ec8f4c<BR>.data 0x19000 0x3ca3 0xc00 3.01 f687241e14db8ff585f12b28b8e34cf3<BR>INITDAT 0x1d000 0x1e0 0x200 2.79 72f4d24ad8699caa32b7a3fe1c89f685<BR>PAGELK 0x1e000 0x4416 0x4600 6.65 ad808b3f165155d0865ef7f98317518a<BR>PAGELK16 0x23000 0x82 0x200 1.61 5fe7505eff85308dbc158fb8dc2cc406<BR>PAGE 0x24000 0x2b44 0x2c00 6.55 ce9839e32fc0280ffbb4f99f46db62cb<BR>PAGEKD 0x27000 0x2518 0x2600 6.43 ce9ceb21bdbbd6bc16fc40688eae88ea<BR>.edata 0x2a000 0xecb 0x1000 5.43 d3d253b515907048894c940570cc1783<BR>INIT 0x2b000 0x42a6 0x4400 6.37 9aaca8bf779ccf95b2085b02c3f5a5eb<BR>.rsrc 0x30000 0x410 0x600 2.49 0b783164b370415d24915802dd619b79<BR>.reloc 0x31000 0x1fde 0x2000 6.46 595347ec37d66061f4cd46492d50ea51<BR><BR>( 3 imports ) <BR>> ntoskrnl.exe: KiIpiServiceRoutine, KeProfileInterrupt, KeUpdateRunTime, KeWaitForSingleObject, RtlMoveMemory, IoAllocateAdapterChannel, ObCreateObject, MmAllocateMappingAddress, MmUnmapReservedMapping, MmMapLockedPagesWithReservedMapping, memcpy, MmMapLockedPagesSpecifyCache, MmGetPhysicalAddress, MmAllocateContiguousMemorySpecifyCache, MmFreeContiguousMemory, RtlFindClearBitsAndSet, KeRemoveDeviceQueue, RtlClearBits, ObfDereferenceObject, Mm64BitPhysicalAddress, IoFreeMdl, IoAllocateMdl, MmUnlockPagableImageSection, MmLockPagableDataSection, MmMapIoSpace, ExAllocatePoolWithTag, RtlSetAllBits, RtlInitializeBitMap, KeInitializeDeviceQueue, ZwClose, ObInsertObject, ObReferenceObjectByPointer, IoAdapterObjectType, memset, KeSetEvent, ExFreePoolWithTag, MmUnmapLockedPages, RtlSetBits, IoRegisterPlugPlayNotification, IofCallDriver, IoBuildSynchronousFsdRequest, KeInitializeEvent, IoGetDeviceObjectPointer, RtlInitUnicodeString, IoGetDeviceInterfaces, _allshr, ExQueueWorkItem, KeInsertDeviceQueue, RtlCompareMemory, ExiAcquireFastMutex, ExiReleaseFastMutex, KeQuerySystemTime, WheaReportHwError, WheaGetErrorSource, KeRevertToUserAffinityThread, KeSetSystemAffinityThread, KefReleaseSpinLockFromDpcLevel, KefAcquireSpinLockAtDpcLevel, KeQueryActiveProcessors, KeSetTimerEx, KeInitializeMutex, KeInitializeTimerEx, KeInitializeDpc, _allmul, ZwQueryValueKey, ZwOpenKey, KiDispatchInterrupt, KiDeliverApc, KiCheckForSListAddress, MmUnmapIoSpace, EmpProviderRegister, DbgPrint, KeFindConfigurationNextEntry, KeFindConfigurationEntry, strncmp, RtlEqualString, RtlInitString, ZwEnumerateValueKey, PsChargeProcessCpuCycles, ZwSetValueKey, ZwCreateKey, InbvDisplayString, IoAssignDriveLetters, IoReadPartitionTable, IoSetPartitionInformation, IoWritePartitionTable, _stricmp, InbvCheckDisplayOwnership, KiBugCheckData, WRITE_REGISTER_UCHAR, InbvAcquireDisplayOwnership, EtwWrite, EtwEventEnabled, WRITE_REGISTER_ULONG, READ_REGISTER_ULONG, _aulldiv, KeSetTimeIncrement, HalPrivateDispatchTable, _vsnwprintf, RtlFindLeastSignificantBit, _wcsicmp, KeRevertToUserAffinityThreadEx, KeSetSystemAffinityThreadEx, MmLockPagableSectionByHandle, KeEnterKernelDebugger, KdDebuggerEnabled, KdDebuggerNotPresent, InbvSetScrollRegion, InbvEnableDisplayString, InbvInstallDisplayStringFilter, InbvSetTextColor, InbvSolidColorFill, InbvResetDisplay, InbvIsBootDriverInstalled, RtlIntegerToUnicodeString, RtlClearAllBits, RtlAreBitsClear, RtlFindNextForwardRunClear, RtlFindFirstRunClear, RtlTestBit, IoGetStackLimits, PoSetFixedWakeSource, RtlTimeFieldsToTime, RtlTimeToTimeFields, DbgPrintEx, IoDeleteDevice, IoAttachDeviceToDeviceStack, IoCreateDevice, EtwRegister, MmIsVerifierEnabled, IofCompleteRequest, PoStartNextPowerIrp, ObfReferenceObject, IoReportDetectedDevice, IoCreateDriver, MmAllocateContiguousMemory, PoSetHiberRange, KeInsertQueueDpc, KeSetTargetProcessorDpc, KeSetImportanceDpc, ExReleaseSpinLockShared, ExAcquireSpinLockShared, ExReleaseSpinLockExclusive, ExAcquireSpinLockExclusive, IoReportHalResourceUsage, ZwPowerInformation, ExRegisterCallback, ExCreateCallback, HalDispatchTable, KeQueryTimeIncrement, KeTickCount, _alldiv, atoi, strstr, WheaRegisterErrSrcInitializer, ZwQueryLicenseValue, KeRegisterBugCheckCallback, KeSetProfileIrql, PsGetCurrentProcessId, _allshl, EmClientQueryRuleState, Kei386EoiHelper, KeUpdateSystemTime, KeSaveStateForHibernate, KeBugCheckEx, ZwQueryKey, DbgBreakPoint, ZwDeleteValueKey, _aulldvrm, _alldvrm, RtlUnwind<BR>> KDCOM.dll: KdRestore<BR>> PSHED.dll: PshedRetrieveErrorInfo, PshedIsSystemWheaEnabled, PshedGetErrorSourceInfo<BR><BR>( 113 exports ) <BR>ExAcquireFastMutex, ExReleaseFastMutex, ExTryToAcquireFastMutex, HalAcquireDisplayOwnership, HalAdjustResourceList, HalAllProcessorsStarted, HalAllocateAdapterChannel, HalAllocateCommonBuffer, HalAllocateCrashDumpRegisters, HalAssignSlotResources, HalBeginSystemInterrupt, HalBugCheckSystem, HalCalibratePerformanceCounter, HalClearSoftwareInterrupt, HalConvertDeviceIdtToIrql, HalDisableInterrupt, HalDisplayString, HalEnableInterrupt, HalEndSystemInterrupt, HalEnumerateEnvironmentVariablesEx, HalFlushCommonBuffer, HalFreeCommonBuffer, HalGetAdapter, HalGetBusData, HalGetBusDataByOffset, HalGetEnvironmentVariable, HalGetEnvironmentVariableEx, HalGetInterruptTargetInformation, HalGetInterruptVector, HalGetMessageRoutingInfo, HalGetProcessorIdByNtNumber, HalGetVectorInput, HalHandleNMI, HalInitSystem, HalInitializeBios, HalInitializeOnResume, HalInitializeProcessor, HalMakeBeep, HalProcessorIdle, HalQueryDisplayParameters, HalQueryEnvironmentVariableInfoEx, HalQueryMaximumProcessorCount, HalQueryRealTimeClock, HalReadDmaCounter, HalRegisterDynamicProcessor, HalRegisterErrataCallbacks, HalReportResourceUsage, HalRequestIpi, HalRequestSoftwareInterrupt, HalReturnToFirmware, HalSetBusData, HalSetBusDataByOffset, HalSetDisplayParameters, HalSetEnvironmentVariable, HalSetEnvironmentVariableEx, HalSetProfileInterval, HalSetRealTimeClock, HalSetTimeIncrement, HalStartDynamicProcessor, HalStartNextProcessor, HalStartProfileInterrupt, HalStopProfileInterrupt, HalSystemVectorDispatchEntry, HalTranslateBusAddress, IoAssignDriveLetters, IoFlushAdapterBuffers, IoFreeAdapterChannel, IoFreeMapRegisters, IoMapTransfer, IoReadPartitionTable, IoSetPartitionInformation, IoWritePartitionTable, KdComPortInUse, KeAcquireInStackQueuedSpinLock, KeAcquireInStackQueuedSpinLockRaiseToSynch, KeAcquireQueuedSpinLock, KeAcquireQueuedSpinLockRaiseToSynch, KeAcquireSpinLock, KeAcquireSpinLockRaiseToSynch, KeFlushWriteBuffer, KeGetCurrentIrql, KeLowerIrql, KeQueryPerformanceCounter, KeRaiseIrql, KeRaiseIrqlToDpcLevel, KeRaiseIrqlToSynchLevel, KeReleaseInStackQueuedSpinLock, KeReleaseQueuedSpinLock, KeReleaseSpinLock, KeStallExecutionProcessor, KeTryToAcquireQueuedSpinLock, KeTryToAcquireQueuedSpinLockRaiseToSynch, KfAcquireSpinLock, KfLowerIrql, KfRaiseIrql, KfReleaseSpinLock, READ_PORT_BUFFER_UCHAR, READ_PORT_BUFFER_ULONG, READ_PORT_BUFFER_USHORT, READ_PORT_UCHAR, READ_PORT_ULONG, READ_PORT_USHORT, WRITE_PORT_BUFFER_UCHAR, WRITE_PORT_BUFFER_ULONG, WRITE_PORT_BUFFER_USHORT, WRITE_PORT_UCHAR, WRITE_PORT_ULONG, WRITE_PORT_USHORT, x86BiosAllocateBuffer, x86BiosCall, x86BiosFreeBuffer, x86BiosReadMemory, x86BiosWriteMemory<BR> RDS...: NSRL Reference Data Set<BR>- pdfid.: - trid..: Windows Screen Saver (51.1%)<BR>Win32 Executable Generic (33.2%)<BR>Generic Win/DOS Executable (7.8%)<BR>DOS Executable Generic (7.8%)<BR>Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%) sigcheck:<BR>publisher....: Microsoft Corporation<BR>copyright....: © Microsoft Corporation. All rights reserved.<BR>product......: Microsoft_ Windows_ Operating System<BR>description..: Hardware Abstraction Layer DLL<BR>original name: halmacpi.dll<BR>internal name: halmacpi.dll<BR>file version.: 6.0.6002.18005 (lh_sp2rtm.090410-1830)<BR>comments.....: n/a<BR>signers......: -<BR>signing date.: -<BR>verified.....: Unsigned<BR>
  13. Celui de acpi.sys Fichier acpi.sys reçu le 2009.12.13 10:04:11 (UTC)Antivirus Version Dernière mise à jour Résultat a-squared 4.5.0.43 2009.12.13 - AhnLab-V3 5.0.0.2 2009.12.12 - AntiVir 7.9.1.108 2009.12.11 - Antiy-AVL 2.0.3.7 2009.12.11 - Authentium 5.2.0.5 2009.12.02 - Avast 4.8.1351.0 2009.12.12 - AVG 8.5.0.427 2009.12.12 - BitDefender 7.2 2009.12.13 - CAT-QuickHeal 10.00 2009.12.12 - ClamAV 0.94.1 2009.12.13 - Comodo 3226 2009.12.13 - DrWeb 5.0.0.12182 2009.12.13 - eSafe 7.0.17.0 2009.12.10 - eTrust-Vet 35.1.7171 2009.12.11 - F-Prot 4.5.1.85 2009.12.12 - F-Secure 9.0.15370.0 2009.12.13 - Fortinet 4.0.14.0 2009.12.13 - GData 19 2009.12.13 - Ikarus T3.1.1.74.0 2009.12.13 - Jiangmin 13.0.900 2009.12.13 - K7AntiVirus 7.10.918 2009.12.11 - Kaspersky 7.0.0.125 2009.12.13 - McAfee 5830 2009.12.12 - McAfee+Artemis 5830 2009.12.12 - McAfee-GW-Edition 6.8.5 2009.12.13 - Microsoft 1.5302 2009.12.13 - NOD32 4682 2009.12.12 - Norman 6.04.03 2009.12.12 - nProtect 2009.1.8.0 2009.12.13 - Panda 10.0.2.2 2009.12.12 - PCTools 7.0.3.5 2009.12.12 - Prevx 3.0 2009.12.13 - Rising 22.25.06.05 2009.12.13 - Sophos 4.48.0 2009.12.13 - Sunbelt 3.2.1858.2 2009.12.13 - Symantec 1.4.4.12 2009.12.13 - TheHacker 6.5.0.2.092 2009.12.12 - TrendMicro 9.100.0.1001 2009.12.13 - VBA32 3.12.12.0 2009.12.12 - ViRobot 2009.12.12.2085 2009.12.12 - VirusBuster 5.0.21.0 2009.12.12 - Information additionnelle File size: 265688 bytes MD5...: 82b296ae1892fe3dbee00c9cf92f8ac7 SHA1..: 5f12aadb1494122d18de6655bb81792228d914a2 SHA256: 54b22ba63e1da616b546992141b0c3117ba057283b8f60cb9bece203661febf3 ssdeep: 3072:SZd3mZrVdKVW+V1tPK53DuqV21+qEcPxMHZjslIKomFfdsPE0TqZezq6O8p<BR>kYLGk:S3W5X7xu6GEYe5jBKomFis0T6KOAGhYl<BR> PEiD..: - PEInfo: PE Structure information<BR><BR>( base data )<BR>entrypointaddress.: 0x3d490<BR>timedatestamp.....: 0x49e01a37 (Sat Apr 11 04:19:03 2009)<BR>machinetype.......: 0x14c (I386)<BR><BR>( 9 sections )<BR>name viradd virsiz rawdsiz ntrpy md5<BR>.text 0x1000 0x23af7 0x23c00 6.55 650de87dfdb2933e54e20f5a802db3a5<BR>.rdata 0x25000 0x1aad 0x1c00 5.55 7f6ccc9b1d7ad8b122fb636df9bdbee8<BR>.data 0x27000 0x3534 0x2000 3.75 725ee92f4c76e3a02773d53255d97dc4<BR>PAGE 0x2b000 0xfa5e 0xfc00 6.60 bea557dc0ffaac3a1e9755c5bd2d2964<BR>.edata 0x3b000 0x77 0x200 1.51 2a8c66c6d954c56804ce2bd4d6e4254b<BR>PAGE 0x3c000 0x4cc 0x600 3.51 79129a22e6468918be484deae17e1b2e<BR>INIT 0x3d000 0x17be 0x1800 5.97 2d22256336395421100d52b1fc4cd23e<BR>.rsrc 0x3f000 0x2160 0x2200 4.17 9c7b3e1fcef6716a3e86a910801dbfa0<BR>.reloc 0x42000 0x309a 0x3200 6.56 9984b4a477e2b300f0d7d4e53ff9680a<BR><BR>( 3 imports ) <BR>> ntoskrnl.exe: InterlockedCompareExchange, IoDeleteDevice, IoAttachDeviceToDeviceStack, IoCreateDevice, IoInvalidateDeviceRelations, IoRequestDeviceEject, KefReleaseSpinLockFromDpcLevel, KefAcquireSpinLockAtDpcLevel, strstr, IoGetAttachedDeviceReference, InterlockedPopEntrySList, InterlockedPushEntrySList, KeWaitForSingleObject, KeInitializeEvent, ExfInterlockedInsertTailList, EmClientRuleEvaluate, IofCompleteRequest, IoInvalidateDeviceState, RtlCompareMemory, ObReferenceObjectByPointer, ObfDereferenceObject, ObReferenceObjectByHandle, PoRequestPowerIrp, ExQueueWorkItem, ZwClose, PsCreateSystemThread, IoReleaseCancelSpinLock, InterlockedExchange, KeQuerySystemTime, _strtoui64, ZwSetValueKey, RtlInitUnicodeString, IoOpenDeviceRegistryKey, IofCallDriver, IoBuildSynchronousFsdRequest, IoSetDependency, IoDuplicateDependency, PoStartNextPowerIrp, PoSetPowerState, IoAcquireCancelSpinLock, KdEnableDebugger, KdDisableDebugger, PoCallDriver, PoSetSystemWake, ExDeleteNPagedLookasideList, IoDetachDevice, MmUnlockPagableImageSection, MmLockPagableDataSection, IoWriteErrorLogEntry, IoAllocateErrorLogEntry, KeCancelTimer, KeSetTimer, ExfInterlockedRemoveHeadList, RtlIntegerToUnicodeString, EmProviderRegister, RtlFreeUnicodeString, RtlAnsiStringToUnicodeString, RtlInitAnsiString, wcsstr, RtlxAnsiStringToUnicodeSize, NlsMbCodePageTag, EmClientQueryRuleState, KeInsertQueueDpc, ZwSetSystemInformation, IoSetDeviceInterfaceState, RtlAddRange, ExfInterlockedCompareExchange64, IoSetDevicePropertyData, IoGetDevicePropertyData, ExRegisterCallback, ExCreateCallback, _strupr, MmMapIoSpace, RtlEqualUnicodeString, MmGetPhysicalAddress, HeadlessDispatch, PoShutdownBugCheck, PsTerminateSystemThread, KeWaitForMultipleObjects, KeRevertToUserAffinityThread, KeTickCount, KeQueryTimeIncrement, KeSetSystemAffinityThread, READ_REGISTER_UCHAR, READ_REGISTER_USHORT, WRITE_REGISTER_UCHAR, WRITE_REGISTER_USHORT, RtlDeleteRange, RtlFindRange, KeStartDynamicProcessor, RtlIoEncodeMemIoResource, ZwCreateKey, ZwQueryValueKey, ZwOpenKey, RtlUnicodeStringToInteger, ZwEnumerateKey, RtlFreeAnsiString, RtlUnicodeStringToAnsiString, MmUnmapIoSpace, RtlFindLeastSignificantBit, IoWMIRegistrationControl, IoWMIWriteEvent, KeClearEvent, EtwRegister, EtwWrite, EtwEventEnabled, ObfReferenceObject, IoFreeWorkItem, IoQueueWorkItem, IoAllocateWorkItem, RtlInvertRangeList, RtlIsRangeAvailable, InterlockedDecrement, InterlockedIncrement, RtlCmDecodeMemIoResource, _aulldiv, RtlIoDecodeMemIoResource, memcpy, memmove, KeSetEvent, memset, RtlCopyUnicodeString, KeInitializeTimer, ExInitializeNPagedLookasideList, HalDispatchTable, ExAllocatePoolWithTag, RtlFreeRangeList, KeQueryActiveProcessors, RtlInitializeRangeList, ExUnregisterCallback, ExNotifyCallback, DbgBreakPoint, READ_REGISTER_ULONG, WRITE_REGISTER_ULONG, KeQueryInterruptTime, HalPrivateDispatchTable, InitSafeBootMode, RtlGetNextRange, RtlGetFirstRange, RtlInvertRangeListEx, RtlCopyRangeList, KeRegisterProcessorChangeCallback, RtlQueryRegistryValues, RtlDeleteOwnersRanges, KeLeaveCriticalRegion, KeEnterCriticalRegion, IoGetDeviceProperty, RtlAnsiCharToUnicodeChar, RtlUnicodeToMultiByteN, DbgPrint, ExFreePoolWithTag, ZwPowerInformation, KeBugCheckEx, KeInitializeDpc, IoRegisterDeviceInterface, IoConnectInterruptEx<BR>> HAL.dll: HalGetInterruptTargetInformation, HalConvertDeviceIdtToIrql, WRITE_PORT_ULONG, READ_PORT_ULONG, KeFlushWriteBuffer, HalGetProcessorIdByNtNumber, WRITE_PORT_USHORT, READ_PORT_USHORT, KeGetCurrentIrql, KfRaiseIrql, KfLowerIrql, HalSetBusDataByOffset, HalGetBusDataByOffset, KdComPortInUse, WRITE_PORT_UCHAR, KeStallExecutionProcessor, READ_PORT_UCHAR, KeQueryPerformanceCounter, KfAcquireSpinLock, KfReleaseSpinLock, HalGetMessageRoutingInfo<BR>> WMILIB.SYS: WmiCompleteRequest, WmiSystemControl<BR><BR>( 2 exports ) <BR>DeRegisterOpRegionHandler, RegisterOpRegionHandler<BR> RDS...: NSRL Reference Data Set<BR>- pdfid.: - trid..: Win64 Executable Generic (87.2%)<BR>Win32 Executable Generic (8.6%)<BR>Generic Win/DOS Executable (2.0%)<BR>DOS Executable Generic (2.0%)<BR>Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%) sigcheck:<BR>publisher....: Microsoft Corporation<BR>copyright....: © Microsoft Corporation. All rights reserved.<BR>product......: Microsoft_ Windows_ Operating System<BR>description..: ACPI Driver for NT<BR>original name: ACPI.sys<BR>internal name: ACPI.sys<BR>file version.: 6.0.6002.18005 (lh_sp2rtm.090410-1830)<BR>comments.....: n/a<BR>signers......: -<BR>signing date.: -<BR>verified.....: Unsigned<BR> Antivirus Version Dernière mise à jour Résultat a-squared 4.5.0.43 2009.12.13 - AhnLab-V3 5.0.0.2 2009.12.12 - AntiVir 7.9.1.108 2009.12.11 - Antiy-AVL 2.0.3.7 2009.12.11 - Authentium 5.2.0.5 2009.12.02 - Avast 4.8.1351.0 2009.12.12 - AVG 8.5.0.427 2009.12.12 - BitDefender 7.2 2009.12.13 - CAT-QuickHeal 10.00 2009.12.12 - ClamAV 0.94.1 2009.12.13 - Comodo 3226 2009.12.13 - DrWeb 5.0.0.12182 2009.12.13 - eSafe 7.0.17.0 2009.12.10 - eTrust-Vet 35.1.7171 2009.12.11 - F-Prot 4.5.1.85 2009.12.12 - F-Secure 9.0.15370.0 2009.12.13 - Fortinet 4.0.14.0 2009.12.13 - GData 19 2009.12.13 - Ikarus T3.1.1.74.0 2009.12.13 - Jiangmin 13.0.900 2009.12.13 - K7AntiVirus 7.10.918 2009.12.11 - Kaspersky 7.0.0.125 2009.12.13 - McAfee 5830 2009.12.12 - McAfee+Artemis 5830 2009.12.12 - McAfee-GW-Edition 6.8.5 2009.12.13 - Microsoft 1.5302 2009.12.13 - NOD32 4682 2009.12.12 - Norman 6.04.03 2009.12.12 - nProtect 2009.1.8.0 2009.12.13 - Panda 10.0.2.2 2009.12.12 - PCTools 7.0.3.5 2009.12.12 - Prevx 3.0 2009.12.13 - Rising 22.25.06.05 2009.12.13 - Sophos 4.48.0 2009.12.13 - Sunbelt 3.2.1858.2 2009.12.13 - Symantec 1.4.4.12 2009.12.13 - TheHacker 6.5.0.2.092 2009.12.12 - TrendMicro 9.100.0.1001 2009.12.13 - VBA32 3.12.12.0 2009.12.12 - ViRobot 2009.12.12.2085 2009.12.12 - VirusBuster 5.0.21.0 2009.12.12 - Information additionnelle File size: 265688 bytes MD5...: 82b296ae1892fe3dbee00c9cf92f8ac7 SHA1..: 5f12aadb1494122d18de6655bb81792228d914a2 SHA256: 54b22ba63e1da616b546992141b0c3117ba057283b8f60cb9bece203661febf3 ssdeep: 3072:SZd3mZrVdKVW+V1tPK53DuqV21+qEcPxMHZjslIKomFfdsPE0TqZezq6O8p<BR>kYLGk:S3W5X7xu6GEYe5jBKomFis0T6KOAGhYl<BR> PEiD..: - PEInfo: PE Structure information<BR><BR>( base data )<BR>entrypointaddress.: 0x3d490<BR>timedatestamp.....: 0x49e01a37 (Sat Apr 11 04:19:03 2009)<BR>machinetype.......: 0x14c (I386)<BR><BR>( 9 sections )<BR>name viradd virsiz rawdsiz ntrpy md5<BR>.text 0x1000 0x23af7 0x23c00 6.55 650de87dfdb2933e54e20f5a802db3a5<BR>.rdata 0x25000 0x1aad 0x1c00 5.55 7f6ccc9b1d7ad8b122fb636df9bdbee8<BR>.data 0x27000 0x3534 0x2000 3.75 725ee92f4c76e3a02773d53255d97dc4<BR>PAGE 0x2b000 0xfa5e 0xfc00 6.60 bea557dc0ffaac3a1e9755c5bd2d2964<BR>.edata 0x3b000 0x77 0x200 1.51 2a8c66c6d954c56804ce2bd4d6e4254b<BR>PAGE 0x3c000 0x4cc 0x600 3.51 79129a22e6468918be484deae17e1b2e<BR>INIT 0x3d000 0x17be 0x1800 5.97 2d22256336395421100d52b1fc4cd23e<BR>.rsrc 0x3f000 0x2160 0x2200 4.17 9c7b3e1fcef6716a3e86a910801dbfa0<BR>.reloc 0x42000 0x309a 0x3200 6.56 9984b4a477e2b300f0d7d4e53ff9680a<BR><BR>( 3 imports ) <BR>> ntoskrnl.exe: InterlockedCompareExchange, IoDeleteDevice, IoAttachDeviceToDeviceStack, IoCreateDevice, IoInvalidateDeviceRelations, IoRequestDeviceEject, KefReleaseSpinLockFromDpcLevel, KefAcquireSpinLockAtDpcLevel, strstr, IoGetAttachedDeviceReference, InterlockedPopEntrySList, InterlockedPushEntrySList, KeWaitForSingleObject, KeInitializeEvent, ExfInterlockedInsertTailList, EmClientRuleEvaluate, IofCompleteRequest, IoInvalidateDeviceState, RtlCompareMemory, ObReferenceObjectByPointer, ObfDereferenceObject, ObReferenceObjectByHandle, PoRequestPowerIrp, ExQueueWorkItem, ZwClose, PsCreateSystemThread, IoReleaseCancelSpinLock, InterlockedExchange, KeQuerySystemTime, _strtoui64, ZwSetValueKey, RtlInitUnicodeString, IoOpenDeviceRegistryKey, IofCallDriver, IoBuildSynchronousFsdRequest, IoSetDependency, IoDuplicateDependency, PoStartNextPowerIrp, PoSetPowerState, IoAcquireCancelSpinLock, KdEnableDebugger, KdDisableDebugger, PoCallDriver, PoSetSystemWake, ExDeleteNPagedLookasideList, IoDetachDevice, MmUnlockPagableImageSection, MmLockPagableDataSection, IoWriteErrorLogEntry, IoAllocateErrorLogEntry, KeCancelTimer, KeSetTimer, ExfInterlockedRemoveHeadList, RtlIntegerToUnicodeString, EmProviderRegister, RtlFreeUnicodeString, RtlAnsiStringToUnicodeString, RtlInitAnsiString, wcsstr, RtlxAnsiStringToUnicodeSize, NlsMbCodePageTag, EmClientQueryRuleState, KeInsertQueueDpc, ZwSetSystemInformation, IoSetDeviceInterfaceState, RtlAddRange, ExfInterlockedCompareExchange64, IoSetDevicePropertyData, IoGetDevicePropertyData, ExRegisterCallback, ExCreateCallback, _strupr, MmMapIoSpace, RtlEqualUnicodeString, MmGetPhysicalAddress, HeadlessDispatch, PoShutdownBugCheck, PsTerminateSystemThread, KeWaitForMultipleObjects, KeRevertToUserAffinityThread, KeTickCount, KeQueryTimeIncrement, KeSetSystemAffinityThread, READ_REGISTER_UCHAR, READ_REGISTER_USHORT, WRITE_REGISTER_UCHAR, WRITE_REGISTER_USHORT, RtlDeleteRange, RtlFindRange, KeStartDynamicProcessor, RtlIoEncodeMemIoResource, ZwCreateKey, ZwQueryValueKey, ZwOpenKey, RtlUnicodeStringToInteger, ZwEnumerateKey, RtlFreeAnsiString, RtlUnicodeStringToAnsiString, MmUnmapIoSpace, RtlFindLeastSignificantBit, IoWMIRegistrationControl, IoWMIWriteEvent, KeClearEvent, EtwRegister, EtwWrite, EtwEventEnabled, ObfReferenceObject, IoFreeWorkItem, IoQueueWorkItem, IoAllocateWorkItem, RtlInvertRangeList, RtlIsRangeAvailable, InterlockedDecrement, InterlockedIncrement, RtlCmDecodeMemIoResource, _aulldiv, RtlIoDecodeMemIoResource, memcpy, memmove, KeSetEvent, memset, RtlCopyUnicodeString, KeInitializeTimer, ExInitializeNPagedLookasideList, HalDispatchTable, ExAllocatePoolWithTag, RtlFreeRangeList, KeQueryActiveProcessors, RtlInitializeRangeList, ExUnregisterCallback, ExNotifyCallback, DbgBreakPoint, READ_REGISTER_ULONG, WRITE_REGISTER_ULONG, KeQueryInterruptTime, HalPrivateDispatchTable, InitSafeBootMode, RtlGetNextRange, RtlGetFirstRange, RtlInvertRangeListEx, RtlCopyRangeList, KeRegisterProcessorChangeCallback, RtlQueryRegistryValues, RtlDeleteOwnersRanges, KeLeaveCriticalRegion, KeEnterCriticalRegion, IoGetDeviceProperty, RtlAnsiCharToUnicodeChar, RtlUnicodeToMultiByteN, DbgPrint, ExFreePoolWithTag, ZwPowerInformation, KeBugCheckEx, KeInitializeDpc, IoRegisterDeviceInterface, IoConnectInterruptEx<BR>> HAL.dll: HalGetInterruptTargetInformation, HalConvertDeviceIdtToIrql, WRITE_PORT_ULONG, READ_PORT_ULONG, KeFlushWriteBuffer, HalGetProcessorIdByNtNumber, WRITE_PORT_USHORT, READ_PORT_USHORT, KeGetCurrentIrql, KfRaiseIrql, KfLowerIrql, HalSetBusDataByOffset, HalGetBusDataByOffset, KdComPortInUse, WRITE_PORT_UCHAR, KeStallExecutionProcessor, READ_PORT_UCHAR, KeQueryPerformanceCounter, KfAcquireSpinLock, KfReleaseSpinLock, HalGetMessageRoutingInfo<BR>> WMILIB.SYS: WmiCompleteRequest, WmiSystemControl<BR><BR>( 2 exports ) <BR>DeRegisterOpRegionHandler, RegisterOpRegionHandler<BR> RDS...: NSRL Reference Data Set<BR>- pdfid.: - trid..: Win64 Executable Generic (87.2%)<BR>Win32 Executable Generic (8.6%)<BR>Generic Win/DOS Executable (2.0%)<BR>DOS Executable Generic (2.0%)<BR>Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%) sigcheck:<BR>publisher....: Microsoft Corporation<BR>copyright....: © Microsoft Corporation. All rights reserved.<BR>product......: Microsoft_ Windows_ Operating System<BR>description..: ACPI Driver for NT<BR>original name: ACPI.sys<BR>internal name: ACPI.sys<BR>file version.: 6.0.6002.18005 (lh_sp2rtm.090410-1830)<BR>comments.....: n/a<BR>signers......: -<BR>signing date.: -<BR>verified.....: Unsigned<BR>
  14. Voici le rapport pour disk.sys Fichier disk.sys reçu le 2009.12.13 09:59:43 (UTC)Antivirus Version Dernière mise à jour Résultat a-squared 4.5.0.43 2009.12.13 - AhnLab-V3 5.0.0.2 2009.12.12 - AntiVir 7.9.1.108 2009.12.11 - Antiy-AVL 2.0.3.7 2009.12.11 - Authentium 5.2.0.5 2009.12.02 - Avast 4.8.1351.0 2009.12.12 - AVG 8.5.0.427 2009.12.12 - BitDefender 7.2 2009.12.13 - CAT-QuickHeal 10.00 2009.12.12 - ClamAV 0.94.1 2009.12.13 - Comodo 3226 2009.12.13 - DrWeb 5.0.0.12182 2009.12.13 - eSafe 7.0.17.0 2009.12.10 - eTrust-Vet 35.1.7171 2009.12.11 - F-Prot 4.5.1.85 2009.12.12 - F-Secure 9.0.15370.0 2009.12.13 - Fortinet 4.0.14.0 2009.12.13 - GData 19 2009.12.13 - Ikarus T3.1.1.74.0 2009.12.13 - Jiangmin 13.0.900 2009.12.13 - K7AntiVirus 7.10.918 2009.12.11 - Kaspersky 7.0.0.125 2009.12.13 - McAfee 5830 2009.12.12 - McAfee+Artemis 5830 2009.12.12 - McAfee-GW-Edition 6.8.5 2009.12.13 - Microsoft 1.5302 2009.12.13 - NOD32 4682 2009.12.12 - Norman 6.04.03 2009.12.12 - nProtect 2009.1.8.0 2009.12.13 - Panda 10.0.2.2 2009.12.12 - PCTools 7.0.3.5 2009.12.12 - Prevx 3.0 2009.12.13 - Rising 22.25.06.05 2009.12.13 - Sophos 4.48.0 2009.12.13 - Sunbelt 3.2.1858.2 2009.12.13 - Symantec 1.4.4.12 2009.12.13 - TheHacker 6.5.0.2.092 2009.12.12 - TrendMicro 9.100.0.1001 2009.12.13 - VBA32 3.12.12.0 2009.12.12 - ViRobot 2009.12.12.2085 2009.12.12 - VirusBuster 5.0.21.0 2009.12.12 - Information additionnelle File size: 53736 bytes MD5...: 5d4aefc3386920236a548271f8f1af6a SHA1..: 8d8d86438c4c6a76b4238ba09dd4d207c618643a SHA256: 11b74d6800ec6f7aaefb0b6a9f2e8376c7c3b8db677f03ac3743cb004ca96b08 ssdeep: 1536:JS/Lz3In749RZHnh3aQIGadqaL+Ebx1RUE2O:oL0749RmQtajbx1RsO<BR> PEiD..: - PEInfo: PE Structure information<BR><BR>( base data )<BR>entrypointaddress.: 0xdbbc<BR>timedatestamp.....: 0x49e01ef2 (Sat Apr 11 04:39:14 2009)<BR>machinetype.......: 0x14c (I386)<BR><BR>( 8 sections )<BR>name viradd virsiz rawdsiz ntrpy md5<BR>.text 0x1000 0x23da 0x2400 6.33 b88c4b94ccd59941c45c53d912164a7f<BR>.rdata 0x4000 0x5b5 0x600 4.22 36a926a33b7223ab632c6e9a468761ba<BR>.data 0x5000 0x148 0x200 2.41 439ca755095ec54f46e1a9a88452b3dd<BR>PAGE 0x6000 0x5798 0x5800 6.40 9e4fd9606bcd8f409c9f91e058c85e51<BR>PAGE 0xc000 0x150 0x200 1.89 a1db41b8f4f07e71cdf35efd57f32c72<BR>INIT 0xd000 0x173a 0x1800 6.11 09cc427c79be0b723c19e4a8a404cbaa<BR>.rsrc 0xf000 0x3e0 0x400 3.29 2a5fc9cfec830d81ca0d3386393a7f00<BR>.reloc 0x10000 0x97a 0xa00 6.23 c0fefbdcd2e3c3fd1c684ebbf205563a<BR><BR>( 3 imports ) <BR>> ntoskrnl.exe: IoDeleteDevice, IoAttachDeviceToDeviceStack, ZwClose, ZwMakeTemporaryObject, ZwCreateDirectoryObject, IoRegisterBootDriverReinitialization, IoFreeIrp, IoFreeMdl, ExfInterlockedPopEntryList, ExfInterlockedPushEntryList, MmBuildMdlForNonPagedPool, IoAllocateMdl, ZwQueryValueKey, RtlUnicodeStringToInteger, IoReadDiskSignature, IoBuildDeviceIoControlRequest, _vsnprintf, IoGetConfigurationInformation, RtlQueryRegistryValues, IoOpenDeviceRegistryKey, IoCreateSymbolicLink, IoDeleteSymbolicLink, RtlFreeUnicodeString, IoSetDeviceInterfaceState, KeInitializeMutex, InitSafeBootMode, IoRegisterDeviceInterface, HalExamineMBR, KeTickCount, KeBugCheckEx, IoAllocateWorkItem, IoReportTargetDeviceChangeAsynchronous, IoQueueWorkItem, KeInitializeEvent, IoGetAttachedDeviceReference, IoBuildSynchronousFsdRequest, ObfDereferenceObject, memmove, IoInvalidateDeviceRelations, IoAllocateErrorLogEntry, IoWriteErrorLogEntry, IoAllocateIrp, _allshr, IoFreeWorkItem, KeWaitForSingleObject, KeReleaseMutex, KeSetEvent, strncmp, IoSetHardErrorOrVerifyDevice, IoRegisterDriverReinitialization, IofCallDriver, IoWMIRegistrationControl, RtlCompareMemory, RtlInitUnicodeString, MmGetSystemRoutineAddress, memset, memcpy, ExAllocatePoolWithTag, IoWMIWriteEvent, ExFreePoolWithTag, ZwOpenKey, _vsnwprintf<BR>> HAL.dll: KeGetCurrentIrql<BR>> CLASSPNP.SYS: ClassScanForSpecial, ClassQueryTimeOutRegistryValue, ClassUpdateInformationInRegistry, ClassInitializeMediaChangeDetection, ClassDeleteSrbLookasideList, ClassGetDeviceParameter, ClassReadDriveCapacity, ClassSignalCompletion, ClassNotifyFailurePredicted, ClassSetFailurePredictionPoll, ClassWmiCompleteRequest, ClassReleaseQueue, ClassInterpretSenseInfo, ClassSpinDownPowerHandler, ClassInitialize, ClassInitializeEx, ClassDeviceControl, ClassClaimDevice, ClassCreateDeviceObject, ClassSendDeviceIoControlSynchronous, ClassSetDeviceParameter, ClassModeSense, ClassFindModePage, ClassAcquireRemoveLockEx, ClassAsynchronousCompletion, ClassSendSrbSynchronous, ClassIoComplete, ClassReleaseRemoveLock, ClassCompleteRequest, ClassInitializeSrbLookasideList<BR><BR>( 0 exports ) <BR> RDS...: NSRL Reference Data Set<BR>- pdfid.: - trid..: Generic Win/DOS Executable (49.9%)<BR>DOS Executable Generic (49.8%)<BR>Autodesk FLIC Image File (extensions: flc, fli, cel) (0.1%) sigcheck:<BR>publisher....: Microsoft Corporation<BR>copyright....: © Microsoft Corporation. All rights reserved.<BR>product......: Microsoft_ Windows_ Operating System<BR>description..: PnP Disk Driver<BR>original name: disk.sys<BR>internal name: disk.sys<BR>file version.: 6.0.6002.18005 (lh_sp2rtm.090410-1830)<BR>comments.....: n/a<BR>signers......: -<BR>signing date.: -<BR>verified.....: Unsigned<BR> Antivirus Version Dernière mise à jour Résultat a-squared 4.5.0.43 2009.12.13 - AhnLab-V3 5.0.0.2 2009.12.12 - AntiVir 7.9.1.108 2009.12.11 - Antiy-AVL 2.0.3.7 2009.12.11 - Authentium 5.2.0.5 2009.12.02 - Avast 4.8.1351.0 2009.12.12 - AVG 8.5.0.427 2009.12.12 - BitDefender 7.2 2009.12.13 - CAT-QuickHeal 10.00 2009.12.12 - ClamAV 0.94.1 2009.12.13 - Comodo 3226 2009.12.13 - DrWeb 5.0.0.12182 2009.12.13 - eSafe 7.0.17.0 2009.12.10 - eTrust-Vet 35.1.7171 2009.12.11 - F-Prot 4.5.1.85 2009.12.12 - F-Secure 9.0.15370.0 2009.12.13 - Fortinet 4.0.14.0 2009.12.13 - GData 19 2009.12.13 - Ikarus T3.1.1.74.0 2009.12.13 - Jiangmin 13.0.900 2009.12.13 - K7AntiVirus 7.10.918 2009.12.11 - Kaspersky 7.0.0.125 2009.12.13 - McAfee 5830 2009.12.12 - McAfee+Artemis 5830 2009.12.12 - McAfee-GW-Edition 6.8.5 2009.12.13 - Microsoft 1.5302 2009.12.13 - NOD32 4682 2009.12.12 - Norman 6.04.03 2009.12.12 - nProtect 2009.1.8.0 2009.12.13 - Panda 10.0.2.2 2009.12.12 - PCTools 7.0.3.5 2009.12.12 - Prevx 3.0 2009.12.13 - Rising 22.25.06.05 2009.12.13 - Sophos 4.48.0 2009.12.13 - Sunbelt 3.2.1858.2 2009.12.13 - Symantec 1.4.4.12 2009.12.13 - TheHacker 6.5.0.2.092 2009.12.12 - TrendMicro 9.100.0.1001 2009.12.13 - VBA32 3.12.12.0 2009.12.12 - ViRobot 2009.12.12.2085 2009.12.12 - VirusBuster 5.0.21.0 2009.12.12 - Information additionnelle File size: 53736 bytes MD5...: 5d4aefc3386920236a548271f8f1af6a SHA1..: 8d8d86438c4c6a76b4238ba09dd4d207c618643a SHA256: 11b74d6800ec6f7aaefb0b6a9f2e8376c7c3b8db677f03ac3743cb004ca96b08 ssdeep: 1536:JS/Lz3In749RZHnh3aQIGadqaL+Ebx1RUE2O:oL0749RmQtajbx1RsO<BR> PEiD..: - PEInfo: PE Structure information<BR><BR>( base data )<BR>entrypointaddress.: 0xdbbc<BR>timedatestamp.....: 0x49e01ef2 (Sat Apr 11 04:39:14 2009)<BR>machinetype.......: 0x14c (I386)<BR><BR>( 8 sections )<BR>name viradd virsiz rawdsiz ntrpy md5<BR>.text 0x1000 0x23da 0x2400 6.33 b88c4b94ccd59941c45c53d912164a7f<BR>.rdata 0x4000 0x5b5 0x600 4.22 36a926a33b7223ab632c6e9a468761ba<BR>.data 0x5000 0x148 0x200 2.41 439ca755095ec54f46e1a9a88452b3dd<BR>PAGE 0x6000 0x5798 0x5800 6.40 9e4fd9606bcd8f409c9f91e058c85e51<BR>PAGE 0xc000 0x150 0x200 1.89 a1db41b8f4f07e71cdf35efd57f32c72<BR>INIT 0xd000 0x173a 0x1800 6.11 09cc427c79be0b723c19e4a8a404cbaa<BR>.rsrc 0xf000 0x3e0 0x400 3.29 2a5fc9cfec830d81ca0d3386393a7f00<BR>.reloc 0x10000 0x97a 0xa00 6.23 c0fefbdcd2e3c3fd1c684ebbf205563a<BR><BR>( 3 imports ) <BR>> ntoskrnl.exe: IoDeleteDevice, IoAttachDeviceToDeviceStack, ZwClose, ZwMakeTemporaryObject, ZwCreateDirectoryObject, IoRegisterBootDriverReinitialization, IoFreeIrp, IoFreeMdl, ExfInterlockedPopEntryList, ExfInterlockedPushEntryList, MmBuildMdlForNonPagedPool, IoAllocateMdl, ZwQueryValueKey, RtlUnicodeStringToInteger, IoReadDiskSignature, IoBuildDeviceIoControlRequest, _vsnprintf, IoGetConfigurationInformation, RtlQueryRegistryValues, IoOpenDeviceRegistryKey, IoCreateSymbolicLink, IoDeleteSymbolicLink, RtlFreeUnicodeString, IoSetDeviceInterfaceState, KeInitializeMutex, InitSafeBootMode, IoRegisterDeviceInterface, HalExamineMBR, KeTickCount, KeBugCheckEx, IoAllocateWorkItem, IoReportTargetDeviceChangeAsynchronous, IoQueueWorkItem, KeInitializeEvent, IoGetAttachedDeviceReference, IoBuildSynchronousFsdRequest, ObfDereferenceObject, memmove, IoInvalidateDeviceRelations, IoAllocateErrorLogEntry, IoWriteErrorLogEntry, IoAllocateIrp, _allshr, IoFreeWorkItem, KeWaitForSingleObject, KeReleaseMutex, KeSetEvent, strncmp, IoSetHardErrorOrVerifyDevice, IoRegisterDriverReinitialization, IofCallDriver, IoWMIRegistrationControl, RtlCompareMemory, RtlInitUnicodeString, MmGetSystemRoutineAddress, memset, memcpy, ExAllocatePoolWithTag, IoWMIWriteEvent, ExFreePoolWithTag, ZwOpenKey, _vsnwprintf<BR>> HAL.dll: KeGetCurrentIrql<BR>> CLASSPNP.SYS: ClassScanForSpecial, ClassQueryTimeOutRegistryValue, ClassUpdateInformationInRegistry, ClassInitializeMediaChangeDetection, ClassDeleteSrbLookasideList, ClassGetDeviceParameter, ClassReadDriveCapacity, ClassSignalCompletion, ClassNotifyFailurePredicted, ClassSetFailurePredictionPoll, ClassWmiCompleteRequest, ClassReleaseQueue, ClassInterpretSenseInfo, ClassSpinDownPowerHandler, ClassInitialize, ClassInitializeEx, ClassDeviceControl, ClassClaimDevice, ClassCreateDeviceObject, ClassSendDeviceIoControlSynchronous, ClassSetDeviceParameter, ClassModeSense, ClassFindModePage, ClassAcquireRemoveLockEx, ClassAsynchronousCompletion, ClassSendSrbSynchronous, ClassIoComplete, ClassReleaseRemoveLock, ClassCompleteRequest, ClassInitializeSrbLookasideList<BR><BR>( 0 exports ) <BR> RDS...: NSRL Reference Data Set<BR>- pdfid.: - trid..: Generic Win/DOS Executable (49.9%)<BR>DOS Executable Generic (49.8%)<BR>Autodesk FLIC Image File (extensions: flc, fli, cel) (0.1%) sigcheck:<BR>publisher....: Microsoft Corporation<BR>copyright....: © Microsoft Corporation. All rights reserved.<BR>product......: Microsoft_ Windows_ Operating System<BR>description..: PnP Disk Driver<BR>original name: disk.sys<BR>internal name: disk.sys<BR>file version.: 6.0.6002.18005 (lh_sp2rtm.090410-1830)<BR>comments.....: n/a<BR>signers......: -<BR>signing date.: -<BR>verified.....: Unsigned<BR>
  15. C'est ça a marché. Fichier Classpnp.sys reçu le 2009.12.12 20:08:35 (UTC)Antivirus Version Dernière mise à jour Résultat a-squared 4.5.0.43 2009.12.12 - AhnLab-V3 5.0.0.2 2009.12.12 - AntiVir 7.9.1.108 2009.12.11 - Antiy-AVL 2.0.3.7 2009.12.11 - Authentium 5.2.0.5 2009.12.02 - Avast 4.8.1351.0 2009.12.12 - AVG 8.5.0.427 2009.12.12 - BitDefender 7.2 2009.12.12 - CAT-QuickHeal 10.00 2009.12.12 - ClamAV 0.94.1 2009.12.12 - Comodo 3218 2009.12.12 - DrWeb 5.0.0.12182 2009.12.12 - eSafe 7.0.17.0 2009.12.10 - eTrust-Vet 35.1.7171 2009.12.11 - F-Prot 4.5.1.85 2009.12.12 - F-Secure 9.0.15370.0 2009.12.12 - Fortinet 4.0.14.0 2009.12.12 - GData 19 2009.12.12 - Ikarus T3.1.1.74.0 2009.12.12 - Jiangmin 13.0.900 2009.12.12 - K7AntiVirus 7.10.918 2009.12.11 - Kaspersky 7.0.0.125 2009.12.12 - McAfee 5830 2009.12.12 - McAfee+Artemis 5830 2009.12.12 - McAfee-GW-Edition 6.8.5 2009.12.12 - Microsoft 1.5302 2009.12.12 - NOD32 4682 2009.12.12 - Norman 6.04.03 2009.12.12 - nProtect 2009.1.8.0 2009.12.12 - Panda 10.0.2.2 2009.12.12 - PCTools 7.0.3.5 2009.12.12 - Prevx 3.0 2009.12.12 - Rising 22.25.05.04 2009.12.12 - Sophos 4.48.0 2009.12.12 - Sunbelt 3.2.1858.2 2009.12.12 - Symantec 1.4.4.12 2009.12.12 - TheHacker 6.5.0.2.092 2009.12.12 - TrendMicro 9.100.0.1001 2009.12.12 - VBA32 3.12.12.0 2009.12.12 - ViRobot 2009.12.12.2085 2009.12.12 - VirusBuster 5.0.21.0 2009.12.12 - Information additionnelle File size: 125928 bytes MD5...: 0767b09c74d935a590b4879d14463b64 SHA1..: 92fcf40776856b758d63427bba118e67d71433a6 SHA256: b6547ce44f1c00f50c801efce52ee58c944cd50fe5a70cf005e9a745688036a2 ssdeep: 3072:SPMrFipScl1FzRM4QZO7QIs2g6PXCwlNObw6:MMrFipScl1LM4Q7B6vCEYs<BR>6<BR> PEiD..: - PEInfo: PE Structure information<BR><BR>( base data )<BR>entrypointaddress.: 0x1d00f<BR>timedatestamp.....: 0x49e01ee9 (Sat Apr 11 04:39:05 2009)<BR>machinetype.......: 0x14c (I386)<BR><BR>( 9 sections )<BR>name viradd virsiz rawdsiz ntrpy md5<BR>.text 0x1000 0xfcb5 0xfe00 6.54 a543b98d69bcb97347b8a78f49b2e601<BR>.rdata 0x11000 0x111c 0x1200 5.14 9bb2cf7c0ea464cf5d3754ab95545eb0<BR>.data 0x13000 0xc68 0xe00 7.15 a69c3c6ed14277842f863fc1c6bd447c<BR>PAGE 0x14000 0x683f 0x6a00 6.37 a2e1e1cd0501ab0c7043c49af07e26a5<BR>.edata 0x1b000 0x80c 0xa00 4.73 21b0e497e76a15159ab0eab333f3eca3<BR>PAGE 0x1c000 0x910 0xa00 2.69 c06a2602de1950facce2773e85d165aa<BR>INIT 0x1d000 0xc30 0xe00 5.24 89ec5d5c7feaeefd3d4e9aa6cc8fdc82<BR>.rsrc 0x1e000 0x400 0x400 3.37 c055dfcb62486fbf90e33cbd4a396740<BR>.reloc 0x1f000 0x1610 0x1800 6.53 7d79ee0a4cd8641bca8559bccc2091a9<BR><BR>( 2 imports ) <BR>> ntoskrnl.exe: KeWaitForSingleObject, IoFreeWorkItem, ZwClose, RtlQueryRegistryValues, ZwCreateKey, RtlInitUnicodeString, IoOpenDeviceRegistryKey, ZwOpenKey, IoFreeIrp, IoFreeMdl, RtlCompareMemory, IoStopTimer, EtwWrite, IoGetDriverObjectExtension, IoWriteErrorLogEntry, IoAllocateErrorLogEntry, KeQueryTimeIncrement, KeQuerySystemTime, _allmul, IoQueueWorkItem, IoAllocateWorkItem, IoReuseIrp, IofCallDriver, KeInitializeEvent, MmBuildMdlForNonPagedPool, IoAllocateMdl, RtlFreeUnicodeString, RtlAnsiStringToUnicodeString, ObfDereferenceObject, IoBuildDeviceIoControlRequest, IoGetAttachedDeviceReference, KeInitializeMutex, IoAllocateIrp, IoStartTimer, IoInitializeTimer, KeLeaveCriticalRegion, KeSetEvent, KeEnterCriticalRegion, KeGetCurrentThread, _vsnprintf, IoGetIoPriorityHint, IoWMIWriteEvent, MmGetSystemRoutineAddress, IoWMIRegistrationControl, IofCompleteRequest, DbgPrintEx, EtwUnregister, _allshl, _alldiv, IoGetPagingIoPriority, IoStartNextPacket, MmUnlockPages, IoSetDeviceInterfaceState, IoRegisterDeviceInterface, KeReleaseMutex, KeSetTimerEx, KeTickCount, IoGetDeviceProperty, EtwRegister, RtlCopyUnicodeString, IoAllocateDriverObjectExtension, IoStartPacket, IoSetHardErrorOrVerifyDevice, memmove, IoDeleteDevice, IoCreateDevice, RtlInitString, ObReferenceObjectByPointer, IoInvalidateDeviceRelations, MmProbeAndLockPages, KefReleaseSpinLockFromDpcLevel, KeBugCheckEx, KefAcquireSpinLockAtDpcLevel, _alldvrm, IoDetachDevice, ZwSetValueKey, KeInitializeDpc, KeInitializeTimer, ObfReferenceObject, KeBugCheck, KeDelayExecutionThread, RtlDeleteRegistryValue, _vsnwprintf, RtlTimeToTimeFields, InterlockedPopEntrySList, PoStartNextPowerIrp, PoCallDriver, PoSetPowerState, InterlockedPushEntrySList, MmUnmapLockedPages, ExVerifySuite, IoBuildPartialMdl, KeCancelTimer, _aulldiv, KeSetTimer, strncmp, RtlWriteRegistryValue, IoReadPartitionTableEx, ExDeleteNPagedLookasideList, ExInitializeNPagedLookasideList, IoGetDeviceObjectPointer, IoBuildSynchronousFsdRequest, RtlCompareUnicodeString, RtlAppendUnicodeStringToString, RtlInitAnsiString, IoGetConfigurationInformation, IoAttachDeviceToDeviceStack, RtlUnwind, memset, memcpy, ExAllocatePoolWithTag, IoReportTargetDeviceChangeAsynchronous, IoInitializeIrp, ExFreePoolWithTag<BR>> HAL.dll: KfRaiseIrql, KfLowerIrql, KfAcquireSpinLock, KfReleaseSpinLock, KeGetCurrentIrql<BR><BR>( 60 exports ) <BR>ClassAcquireChildLock, ClassAcquireRemoveLockEx, ClassAsynchronousCompletion, ClassBuildRequest, ClassCheckMediaState, ClassClaimDevice, ClassCleanupMediaChangeDetection, ClassCompleteRequest, ClassCreateDeviceObject, ClassDebugPrint, ClassDeleteSrbLookasideList, ClassDeviceControl, ClassDisableMediaChangeDetection, ClassEnableMediaChangeDetection, ClassFindModePage, ClassForwardIrpSynchronous, ClassGetDescriptor, ClassGetDeviceParameter, ClassGetDriverExtension, ClassGetFsContext, ClassGetVpb, ClassInitialize, ClassInitializeEx, ClassInitializeMediaChangeDetection, ClassInitializeSrbLookasideList, ClassInitializeTestUnitPolling, ClassInternalIoControl, ClassInterpretSenseInfo, ClassInvalidateBusRelations, ClassIoComplete, ClassIoCompleteAssociated, ClassMarkChildMissing, ClassMarkChildrenMissing, ClassModeSense, ClassNotifyFailurePredicted, ClassQueryTimeOutRegistryValue, ClassReadDriveCapacity, ClassReleaseChildLock, ClassReleaseQueue, ClassReleaseRemoveLock, ClassRemoveDevice, ClassResetMediaChangeTimer, ClassScanForSpecial, ClassSendDeviceIoControlSynchronous, ClassSendIrpSynchronous, ClassSendNotification, ClassSendSrbAsynchronous, ClassSendSrbSynchronous, ClassSendStartUnit, ClassSetDeviceParameter, ClassSetFailurePredictionPoll, ClassSetMediaChangeState, ClassSignalCompletion, ClassSpinDownPowerHandler, ClassSplitRequest, ClassStopUnitPowerHandler, ClassUpdateInformationInRegistry, ClassWmiCompleteRequest, ClassWmiFireEvent, DllUnload<BR> RDS...: NSRL Reference Data Set<BR>- pdfid.: - trid..: Generic Win/DOS Executable (49.9%)<BR>DOS Executable Generic (49.8%)<BR>Autodesk FLIC Image File (extensions: flc, fli, cel) (0.1%) sigcheck:<BR>publisher....: Microsoft Corporation<BR>copyright....: © Microsoft Corporation. All rights reserved.<BR>product......: Microsoft_ Windows_ Operating System<BR>description..: SCSI Class System Dll<BR>original name: Classpnp.sys<BR>internal name: Classpnp.sys<BR>file version.: 6.0.6002.18005 (lh_sp2rtm.090410-1830)<BR>comments.....: n/a<BR>signers......: -<BR>signing date.: -<BR>verified.....: Unsigned<BR> Antivirus Version Dernière mise à jour Résultat a-squared 4.5.0.43 2009.12.12 - AhnLab-V3 5.0.0.2 2009.12.12 - AntiVir 7.9.1.108 2009.12.11 - Antiy-AVL 2.0.3.7 2009.12.11 - Authentium 5.2.0.5 2009.12.02 - Avast 4.8.1351.0 2009.12.12 - AVG 8.5.0.427 2009.12.12 - BitDefender 7.2 2009.12.12 - CAT-QuickHeal 10.00 2009.12.12 - ClamAV 0.94.1 2009.12.12 - Comodo 3218 2009.12.12 - DrWeb 5.0.0.12182 2009.12.12 - eSafe 7.0.17.0 2009.12.10 - eTrust-Vet 35.1.7171 2009.12.11 - F-Prot 4.5.1.85 2009.12.12 - F-Secure 9.0.15370.0 2009.12.12 - Fortinet 4.0.14.0 2009.12.12 - GData 19 2009.12.12 - Ikarus T3.1.1.74.0 2009.12.12 - Jiangmin 13.0.900 2009.12.12 - K7AntiVirus 7.10.918 2009.12.11 - Kaspersky 7.0.0.125 2009.12.12 - McAfee 5830 2009.12.12 - McAfee+Artemis 5830 2009.12.12 - McAfee-GW-Edition 6.8.5 2009.12.12 - Microsoft 1.5302 2009.12.12 - NOD32 4682 2009.12.12 - Norman 6.04.03 2009.12.12 - nProtect 2009.1.8.0 2009.12.12 - Panda 10.0.2.2 2009.12.12 - PCTools 7.0.3.5 2009.12.12 - Prevx 3.0 2009.12.12 - Rising 22.25.05.04 2009.12.12 - Sophos 4.48.0 2009.12.12 - Sunbelt 3.2.1858.2 2009.12.12 - Symantec 1.4.4.12 2009.12.12 - TheHacker 6.5.0.2.092 2009.12.12 - TrendMicro 9.100.0.1001 2009.12.12 - VBA32 3.12.12.0 2009.12.12 - ViRobot 2009.12.12.2085 2009.12.12 - VirusBuster 5.0.21.0 2009.12.12 - Information additionnelle File size: 125928 bytes MD5...: 0767b09c74d935a590b4879d14463b64 SHA1..: 92fcf40776856b758d63427bba118e67d71433a6 SHA256: b6547ce44f1c00f50c801efce52ee58c944cd50fe5a70cf005e9a745688036a2 ssdeep: 3072:SPMrFipScl1FzRM4QZO7QIs2g6PXCwlNObw6:MMrFipScl1LM4Q7B6vCEYs<BR>6<BR> PEiD..: - PEInfo: PE Structure information<BR><BR>( base data )<BR>entrypointaddress.: 0x1d00f<BR>timedatestamp.....: 0x49e01ee9 (Sat Apr 11 04:39:05 2009)<BR>machinetype.......: 0x14c (I386)<BR><BR>( 9 sections )<BR>name viradd virsiz rawdsiz ntrpy md5<BR>.text 0x1000 0xfcb5 0xfe00 6.54 a543b98d69bcb97347b8a78f49b2e601<BR>.rdata 0x11000 0x111c 0x1200 5.14 9bb2cf7c0ea464cf5d3754ab95545eb0<BR>.data 0x13000 0xc68 0xe00 7.15 a69c3c6ed14277842f863fc1c6bd447c<BR>PAGE 0x14000 0x683f 0x6a00 6.37 a2e1e1cd0501ab0c7043c49af07e26a5<BR>.edata 0x1b000 0x80c 0xa00 4.73 21b0e497e76a15159ab0eab333f3eca3<BR>PAGE 0x1c000 0x910 0xa00 2.69 c06a2602de1950facce2773e85d165aa<BR>INIT 0x1d000 0xc30 0xe00 5.24 89ec5d5c7feaeefd3d4e9aa6cc8fdc82<BR>.rsrc 0x1e000 0x400 0x400 3.37 c055dfcb62486fbf90e33cbd4a396740<BR>.reloc 0x1f000 0x1610 0x1800 6.53 7d79ee0a4cd8641bca8559bccc2091a9<BR><BR>( 2 imports ) <BR>> ntoskrnl.exe: KeWaitForSingleObject, IoFreeWorkItem, ZwClose, RtlQueryRegistryValues, ZwCreateKey, RtlInitUnicodeString, IoOpenDeviceRegistryKey, ZwOpenKey, IoFreeIrp, IoFreeMdl, RtlCompareMemory, IoStopTimer, EtwWrite, IoGetDriverObjectExtension, IoWriteErrorLogEntry, IoAllocateErrorLogEntry, KeQueryTimeIncrement, KeQuerySystemTime, _allmul, IoQueueWorkItem, IoAllocateWorkItem, IoReuseIrp, IofCallDriver, KeInitializeEvent, MmBuildMdlForNonPagedPool, IoAllocateMdl, RtlFreeUnicodeString, RtlAnsiStringToUnicodeString, ObfDereferenceObject, IoBuildDeviceIoControlRequest, IoGetAttachedDeviceReference, KeInitializeMutex, IoAllocateIrp, IoStartTimer, IoInitializeTimer, KeLeaveCriticalRegion, KeSetEvent, KeEnterCriticalRegion, KeGetCurrentThread, _vsnprintf, IoGetIoPriorityHint, IoWMIWriteEvent, MmGetSystemRoutineAddress, IoWMIRegistrationControl, IofCompleteRequest, DbgPrintEx, EtwUnregister, _allshl, _alldiv, IoGetPagingIoPriority, IoStartNextPacket, MmUnlockPages, IoSetDeviceInterfaceState, IoRegisterDeviceInterface, KeReleaseMutex, KeSetTimerEx, KeTickCount, IoGetDeviceProperty, EtwRegister, RtlCopyUnicodeString, IoAllocateDriverObjectExtension, IoStartPacket, IoSetHardErrorOrVerifyDevice, memmove, IoDeleteDevice, IoCreateDevice, RtlInitString, ObReferenceObjectByPointer, IoInvalidateDeviceRelations, MmProbeAndLockPages, KefReleaseSpinLockFromDpcLevel, KeBugCheckEx, KefAcquireSpinLockAtDpcLevel, _alldvrm, IoDetachDevice, ZwSetValueKey, KeInitializeDpc, KeInitializeTimer, ObfReferenceObject, KeBugCheck, KeDelayExecutionThread, RtlDeleteRegistryValue, _vsnwprintf, RtlTimeToTimeFields, InterlockedPopEntrySList, PoStartNextPowerIrp, PoCallDriver, PoSetPowerState, InterlockedPushEntrySList, MmUnmapLockedPages, ExVerifySuite, IoBuildPartialMdl, KeCancelTimer, _aulldiv, KeSetTimer, strncmp, RtlWriteRegistryValue, IoReadPartitionTableEx, ExDeleteNPagedLookasideList, ExInitializeNPagedLookasideList, IoGetDeviceObjectPointer, IoBuildSynchronousFsdRequest, RtlCompareUnicodeString, RtlAppendUnicodeStringToString, RtlInitAnsiString, IoGetConfigurationInformation, IoAttachDeviceToDeviceStack, RtlUnwind, memset, memcpy, ExAllocatePoolWithTag, IoReportTargetDeviceChangeAsynchronous, IoInitializeIrp, ExFreePoolWithTag<BR>> HAL.dll: KfRaiseIrql, KfLowerIrql, KfAcquireSpinLock, KfReleaseSpinLock, KeGetCurrentIrql<BR><BR>( 60 exports ) <BR>ClassAcquireChildLock, ClassAcquireRemoveLockEx, ClassAsynchronousCompletion, ClassBuildRequest, ClassCheckMediaState, ClassClaimDevice, ClassCleanupMediaChangeDetection, ClassCompleteRequest, ClassCreateDeviceObject, ClassDebugPrint, ClassDeleteSrbLookasideList, ClassDeviceControl, ClassDisableMediaChangeDetection, ClassEnableMediaChangeDetection, ClassFindModePage, ClassForwardIrpSynchronous, ClassGetDescriptor, ClassGetDeviceParameter, ClassGetDriverExtension, ClassGetFsContext, ClassGetVpb, ClassInitialize, ClassInitializeEx, ClassInitializeMediaChangeDetection, ClassInitializeSrbLookasideList, ClassInitializeTestUnitPolling, ClassInternalIoControl, ClassInterpretSenseInfo, ClassInvalidateBusRelations, ClassIoComplete, ClassIoCompleteAssociated, ClassMarkChildMissing, ClassMarkChildrenMissing, ClassModeSense, ClassNotifyFailurePredicted, ClassQueryTimeOutRegistryValue, ClassReadDriveCapacity, ClassReleaseChildLock, ClassReleaseQueue, ClassReleaseRemoveLock, ClassRemoveDevice, ClassResetMediaChangeTimer, ClassScanForSpecial, ClassSendDeviceIoControlSynchronous, ClassSendIrpSynchronous, ClassSendNotification, ClassSendSrbAsynchronous, ClassSendSrbSynchronous, ClassSendStartUnit, ClassSetDeviceParameter, ClassSetFailurePredictionPoll, ClassSetMediaChangeState, ClassSignalCompletion, ClassSpinDownPowerHandler, ClassSplitRequest, ClassStopUnitPowerHandler, ClassUpdateInformationInRegistry, ClassWmiCompleteRequest, ClassWmiFireEvent, DllUnload<BR> RDS...: NSRL Reference Data Set<BR>- pdfid.: - trid..: Generic Win/DOS Executable (49.9%)<BR>DOS Executable Generic (49.8%)<BR>Autodesk FLIC Image File (extensions: flc, fli, cel) (0.1%) sigcheck:<BR>publisher....: Microsoft Corporation<BR>copyright....: © Microsoft Corporation. All rights reserved.<BR>product......: Microsoft_ Windows_ Operating System<BR>description..: SCSI Class System Dll<BR>original name: Classpnp.sys<BR>internal name: Classpnp.sys<BR>file version.: 6.0.6002.18005 (lh_sp2rtm.090410-1830)<BR>comments.....: n/a<BR>signers......: -<BR>signing date.: -<BR>verified.....: Unsigned<BR>
×
×
  • Créer...