on dirait que tu as choppé ceci
http://www.canada-av.com/sensible/ [...] enDocument
en particulier :
"
PSEXEC.EXE contains embedded binary data that is saved to the folder "\\RemoteSystem\ADMIN$\System32" as PSEXESVC.EXE, which it executes. When run, it functions as the server of the PSEXEC.EXE, which is responsible for starting remote process and redirecting I/O to and from the client machine.
PSEXEC.EXE starts the PSEXESVC.EXE using login credentials passed as argument to command-line. If no login name and password are supplied, the process will have same privilege access from which a user may execute the tool.
If the login name and password are supplied, the process executes on the remote system with the access level same as the user with the specified logon credentials."
pour le virer :
Fixes Available
Network Associates:
Minimum DAT: DAT4252
Release Date: March 12, 2003
Minimum Engine: 4.1.60
Symantec:
Virus Definitions (Intelligent Updater): March 09, 2003
Virus Definitions (LiveUpdate): March 09, 2003
Trend:
Pattern File: 480
Minimum Scan Engine:5.200
Message édité par blazkowicz le 27-09-2003 à 16:47:41