ERR [3456] 2011/10/09 23:16:27

advertisement
ERR [3456] 2011/10/09 23:16:27: SDKController::CheckEngineState -> Engine not loaded
ERR [0476] 2011/10/09 23:16:29: SDKController::GetLatestSuccessfulScanReportHeader ->
Not in idle state
ERR [0476] 2011/10/09 23:16:29: SDKController::GetLatestSuccessfulScanReportHeader ->
Not in idle state
ERR [0476] 2011/10/09 23:16:29: SDKController::GetLatestSuccessfulScanReportHeader ->
Not in idle state
ERR [0476] 2011/10/09 23:16:29: SDKController::GetLatestSuccessfulScanReportHeader ->
Not in idle state
ERR [0476] 2011/10/09 23:16:29: SDKController::GetLatestSuccessfulScanReportHeader ->
Not in idle state
ERR [0476] 2011/10/09 23:16:29: SDKController::GetLatestSuccessfulScanReportHeader ->
Not in idle state
ERR [0476] 2011/10/09 23:16:29: SDKController::GetLatestSuccessfulScanReportHeader ->
Not in idle state
ERR [0476] 2011/10/09 23:16:29: SDKController::GetLatestSuccessfulScanReportHeader ->
Not in idle state
ERR [0476] 2011/10/09 23:16:29: SDKController::GetLatestSuccessfulScanReportHeader ->
Not in idle state
MSG [0476] 2011/10/09 23:21:30: Configure new scan with profile: smart
MSG [0476] 2011/10/09 23:21:30: -> scanning critical objects
MSG [0476] 2011/10/09 23:21:30: -> scanning running processes
MSG [0476] 2011/10/09 23:21:30: -> scanning registry
MSG [0476] 2011/10/09 23:21:30: -> scanning lsp
MSG [0476] 2011/10/09 23:21:30: -> scanning browser hijacks
MSG [0476] 2011/10/09 23:21:30: -> scanning cookies
MSG [0476] 2011/10/09 23:21:30: -> neutralizing rootkits
MSG [0476] 2011/10/09 23:21:30: -> use mild rootkit detection
MSG [0476] 2011/10/09 23:21:30: -> use spyware heuristics
MSG [0476] 2011/10/09 23:21:30: -> use medium heuristics
MSG [0476] 2011/10/09 23:21:30: -> scan only executables
MSG [0476] 2011/10/09 23:21:30: -> file size limit = 20480 kB (0 = unlimited)
MSG [0476] 2011/10/09 23:21:30: -> validating system critical files
ERR [0476] 2011/10/09 23:21:30: SDKController::GetDefinitonsFileVersion -> Not in idle
state
ERR [0476] 2011/10/09 23:21:30: SDKController::GetLatestSuccessfulScanReportHeader ->
Not in idle state
ERR [0476] 2011/10/09 23:21:30: SDKController::GetLatestSuccessfulScanReportHeader ->
Not in idle state
ERR [0476] 2011/10/09 23:21:30: SDKController::GetLatestSuccessfulScanReportHeader ->
Not in idle state
ERR [0476] 2011/10/09 23:21:31: SDKController::GetInfectionList -> Not in found
infections state
MSG [6020] 2011/10/09 23:32:09: Scan was completed in 639 seconds
MSG [6020] 2011/10/09 23:32:09: Objects processed: 37473, infections detected: 0
MSG [0476] 2011/10/09 23:32:14: Dumping scan report:
>>> Logfile created: 09/10/2011 23:21:30
>>> Ad-Aware version: 9.5.1
>>> Extended engine: 3
>>> Extended engine version: 3.1.2770
>>> User performing scan: amer
>>>
>>> *********************** Definitions database information
***********************
>>> Lavasoft definition file: 150.590
>>> Genotype definition file version: 2011/09/21 13:56:01
>>> Extended engine definition file: 10715.0
>>>
>>> ******************************** Scan results:
*********************************
>>> Scan profile name: Analyse intelligente (ID: smart)
>>> Objects scanned: 37473
>>> Objects detected: 0
>>>
>>>
>>> Type
Detected
>>> ==========================
>>> Processes.......:
0
>>> Registry entries:
0
>>> Hostfile entries:
0
>>> Files...........:
0
>>> Folders.........:
0
>>> LSPs............:
0
>>> Cookies.........:
0
>>> Browser hijacks.:
0
>>> MRU objects.....:
0
>>>
>>>
>>>
>>> Scan and cleaning complete: Finished correctly after 639 seconds
>>>
>>> *********************************** Settings
***********************************
>>>
>>> Scan profile:
>>> ID: smart, enabled:1, value: Analyse intelligente
>>> ID: folderstoscan, enabled:1, value:
>>> ID: useantivirus, enabled:1, value: true
>>> ID: sections, enabled:1
>>> ID: scancriticalareas, enabled:1, value: true
>>> ID: scanrunningapps, enabled:1, value: true
>>> ID: scanregistry, enabled:1, value: true
>>> ID: scanlsp, enabled:1, value: true
>>> ID: scanads, enabled:1, value: false
>>> ID: scanhostsfile, enabled:1, value: false
>>> ID: scanmru, enabled:1, value: false
>>> ID: scanbrowserhijacks, enabled:1, value: true
>>> ID: scantrackingcookies, enabled:1, value: true
>>>
ID: closebrowsers, enabled:1, value: false
>>> ID: filescanningoptions, enabled:1
>>> ID: archives, enabled:1, value: false
>>> ID: onlyexecutables, enabled:1, value: true
>>> ID: skiplargerthan, enabled:1, value: 20480
>>> ID: scanrootkits, enabled:1, value: true
>>>
ID: rootkitlevel, enabled:1, value: mild, domain: medium,mild,strict
>>> ID: usespywareheuristics, enabled:1, value: true
>>>
>>> Scan global:
>>> ID: global, enabled:1
>>> ID: addtocontextmenu, enabled:1, value: true
>>> ID: playsoundoninfection, enabled:1, value: false
>>> ID: soundfile, enabled:0, value: N/A
>>>
>>> Scheduled scan settings:
>>> <Empty>
>>>
>>> Update settings:
>>> ID: updates, enabled:1
>>> ID: launchthreatworksafterscan, enabled:1, value: silently, domain: normal,off,silently
>>> ID: deffiles, enabled:1, value: downloadandinstall, domain:
dontcheck,downloadandinstall
>>> ID: licenseandinfo, enabled:1, value: downloadandinstall, domain:
dontcheck,downloadandinstall
>>> ID: schedules, enabled:1, value: true
>>> ID: updatedaily1, enabled:1, value: Daily 1
>>>
ID: time, enabled:1, value: Wed Aug 31 13:07:00 2011
>>>
ID: frequency, enabled:1, value: daily, domain:
daily,monthly,once,systemstart,weekly
>>>
ID: weekdays, enabled:1
>>>
ID: monday, enabled:1, value: false
>>>
ID: tuesday, enabled:1, value: false
>>>
ID: wednesday, enabled:1, value: false
>>>
ID: thursday, enabled:1, value: false
>>>
ID: friday, enabled:1, value: false
>>>
ID: saturday, enabled:1, value: false
>>>
ID: sunday, enabled:1, value: false
>>>
ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31
>>>
ID: scanprofile, enabled:1, value:
>>>
ID: auto_deal_with_infections, enabled:1, value: false
>>> ID: updatedaily2, enabled:1, value: Daily 2
>>>
ID: time, enabled:1, value: Wed Aug 31 19:07:00 2011
>>>
ID: frequency, enabled:1, value: daily, domain:
daily,monthly,once,systemstart,weekly
>>>
ID: weekdays, enabled:1
>>>
ID: monday, enabled:1, value: false
>>>
ID: tuesday, enabled:1, value: false
>>>
ID: wednesday, enabled:1, value: false
>>>
ID: thursday, enabled:1, value: false
>>>
ID: friday, enabled:1, value: false
>>>
ID: saturday, enabled:1, value: false
>>>
ID: sunday, enabled:1, value: false
>>>
ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31
>>>
ID: scanprofile, enabled:1, value:
>>>
ID: auto_deal_with_infections, enabled:1, value: false
>>> ID: updatedaily3, enabled:1, value: Daily 3
>>>
ID: time, enabled:1, value: Wed Aug 31 01:07:00 2011
>>>
ID: frequency, enabled:1, value: daily, domain:
daily,monthly,once,systemstart,weekly
>>>
ID: weekdays, enabled:1
>>>
ID: monday, enabled:1, value: false
>>>
ID: tuesday, enabled:1, value: false
>>>
ID: wednesday, enabled:1, value: false
>>>
ID: thursday, enabled:1, value: false
>>>
ID: friday, enabled:1, value: false
>>>
ID: saturday, enabled:1, value: false
>>>
ID: sunday, enabled:1, value: false
>>>
ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31
>>>
ID: scanprofile, enabled:1, value:
>>>
ID: auto_deal_with_infections, enabled:1, value: false
>>> ID: updatedaily4, enabled:1, value: Daily 4
>>>
ID: time, enabled:1, value: Wed Aug 31 07:07:00 2011
>>>
ID: frequency, enabled:1, value: daily, domain:
daily,monthly,once,systemstart,weekly
>>>
ID: weekdays, enabled:1
>>>
ID: monday, enabled:1, value: false
>>>
ID: tuesday, enabled:1, value: false
>>>
ID: wednesday, enabled:1, value: false
>>>
ID: thursday, enabled:1, value: false
>>>
ID: friday, enabled:1, value: false
>>>
ID: saturday, enabled:1, value: false
>>>
ID: sunday, enabled:1, value: false
>>>
ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31
>>>
ID: scanprofile, enabled:1, value:
>>>
ID: auto_deal_with_infections, enabled:1, value: false
>>> ID: updateweekly1, enabled:1, value: Weekly
>>>
ID: time, enabled:1, value: Wed Aug 31 13:07:00 2011
>>>
ID: frequency, enabled:1, value: weekly, domain:
daily,monthly,once,systemstart,weekly
>>>
ID: weekdays, enabled:1
>>>
ID: monday, enabled:1, value: false
>>>
ID: tuesday, enabled:1, value: false
>>>
ID: wednesday, enabled:1, value: true
>>>
ID: thursday, enabled:1, value: false
>>>
ID: friday, enabled:1, value: false
>>>
ID: saturday, enabled:1, value: true
>>>
ID: sunday, enabled:1, value: false
>>>
ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31
>>>
ID: scanprofile, enabled:1, value:
>>>
ID: auto_deal_with_infections, enabled:1, value: false
>>>
>>> Appearance settings:
>>> ID: appearance, enabled:1
>>> ID: skin, enabled:1, value: default.egl, reglocation:
HKEY_LOCAL_MACHINE\SOFTWARE\Lavasoft\Ad-Aware\Resource
>>> ID: showtrayicon, enabled:1, value: true
>>> ID: autoentertainmentmode, enabled:1, value: true
>>> ID: guimode, enabled:1, value: mode_simple, domain: mode_advanced,mode_simple
>>> ID: language, enabled:1, value: fr, reglocation:
HKEY_LOCAL_MACHINE\SOFTWARE\Lavasoft\Ad-Aware\Language
>>>
>>> Realtime protection settings:
>>> ID: realtime, enabled:1
>>> ID: infomessages, enabled:1, value: onlyimportant, domain:
display,dontnotify,onlyimportant
>>> ID: layers, enabled:1
>>> ID: useantivirus, enabled:1, value: true
>>> ID: usespywareheuristics, enabled:1, value: true
>>> ID: maintainbackup, enabled:1, value: true
>>> ID: modules, enabled:1
>>> ID: processprotection, enabled:1, value: true
>>> ID: onaccessprotection, enabled:1, value: true
>>> ID: registryprotection, enabled:1, value: true
>>> ID: networkprotection, enabled:1, value: true
>>>
>>>
>>> ****************************** System information
******************************
>>> Computer name: 00010101010100
>>> Processor name: Intel(R) Core(TM)2 Duo CPU T7250 @ 2.00GHz
>>> Processor identifier: x86 Family 6 Model 15 Stepping 13
>>> Processor speed: ~1995MHZ
>>> Raw info: processorarchitecture 0, processortype 586, processorlevel 6, processor
revision 3853, number of processors 2, processor features: [MMX,SSE,SSE2]
>>> Physical memory available: 392368128 bytes
>>> Physical memory total: 2145759232 bytes
>>> Virtual memory available: 1883738112 bytes
>>> Virtual memory total: 2147352576 bytes
>>> Memory load: 81%
>>> Microsoft Windows XP Professional Service Pack 3 (build 2600)
>>> Windows startup mode:
>>>
>>> Running processes:
>>> PID: 616 name: \SystemRoot\System32\smss.exe owner: SYSTEM domain: AUTORITE
NT
>>> PID: 1092 name: C:\WINDOWS\system32\csrss.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1132 name: C:\WINDOWS\system32\winlogon.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1188 name: C:\WINDOWS\system32\services.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1200 name: C:\WINDOWS\system32\lsass.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1396 name: C:\WINDOWS\system32\Ati2evxx.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1416 name: C:\WINDOWS\system32\svchost.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1516 name: C:\WINDOWS\system32\svchost.exe owner: SERVICE RÉSEAU
domain: AUTORITE NT
>>> PID: 716 name: C:\WINDOWS\System32\svchost.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 656 name: C:\Program Files\Intel\WiFi\bin\S24EvMon.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 776 name: C:\WINDOWS\system32\svchost.exe owner: SERVICE RÉSEAU
domain: AUTORITE NT
>>> PID: 1756 name: C:\WINDOWS\system32\ZoneLabs\vsmon.exe owner: <UNKNOWN>
domain: <UNKNOWN>
>>> PID: 1972 name: C:\WINDOWS\system32\Ati2evxx.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 448 name: C:\Program Files\CheckPoint\ZAForceField\IswSvc.exe owner:
<UNKNOWN> domain: <UNKNOWN>
>>> PID: 564 name: C:\WINDOWS\system32\spoolsv.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1100 name: C:\WINDOWS\system32\wbem\unsecapp.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 1708 name: C:\WINDOWS\system32\wbem\wmiprvse.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 2524 name: C:\Program Files\CheckPoint\ZAForceField\ForceField.exe owner:
<UNKNOWN> domain: <UNKNOWN>
>>> PID: 3768 name: C:\Program Files\Fichiers communs\Apple\Mobile Device
Support\AppleMobileDeviceService.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 3816 name: C:\Program Files\AVG\AVG10\avgwdsvc.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 2140 name: C:\Program Files\Bonjour\mDNSResponder.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 3388 name: C:\Program Files\PC Tools Security\BDT\BDTUpdateService.exe
owner: SYSTEM domain: AUTORITE NT
>>> PID: 3028 name: C:\Program Files\Motorola\SMSERIAL\sm56hlpr.exe owner: amer
domain: 00010101010100
>>> PID: 3040 name: C:\WINDOWS\System32\svchost.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 3048 name: C:\Program Files\Intel\Intel(R) Rapid Storage
Technology\IAStorIcon.exe owner: amer domain: 00010101010100
>>> PID: 3140 name: C:\Program Files\Intel\WiFi\bin\ZCfgSvc.exe owner: amer domain:
00010101010100
>>> PID: 2616 name: C:\Program Files\Fichiers
communs\Intel\WirelessCommon\iFrmewrk.exe owner: amer domain: 00010101010100
>>> PID: 3288 name: C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe owner:
<UNKNOWN> domain: <UNKNOWN>
>>> PID: 3300 name: C:\Program Files\Intel\WiFi\bin\EvtEng.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 4040 name: C:\Program Files\AVG\AVG10\avgtray.exe owner: amer domain:
00010101010100
>>> PID: 688 name: C:\WINDOWS\system32\hasplms.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1080 name: C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe owner:
amer domain: 00010101010100
>>> PID: 1832 name: C:\Program Files\AVG\AVG10\avgnsx.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1932 name: C:\Program Files\PC Tools Security\BDT\FGuard.exe owner: amer
domain: 00010101010100
>>> PID: 2068 name: C:\WINDOWS\system32\ctfmon.exe owner: amer domain:
00010101010100
>>> PID: 1692 name: C:\Program Files\Spybot - Search & Destroy2\TeaTimer.exe owner:
amer domain: 00010101010100
>>> PID: 4080 name: C:\Program Files\Intel\Intel(R) Rapid Storage
Technology\IAStorDataMgrSvc.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 2564 name: C:\WINDOWS\system32\wbem\unsecapp.exe owner: amer domain:
00010101010100
>>> PID: 3540 name: C:\Program Files\Ralink\Common\RaUI.exe owner: amer domain:
00010101010100
>>> PID: 3576 name: C:\Program Files\Fichiers communs\InstallShield
Shared\Service\InstallShield Licensing Service.exe owner: SYSTEM domain: AUTORITE
NT
>>> PID: 2372 name: C:\Program Files\Java\jre6\bin\jqs.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1292 name: C:\Program Files\AVG\AVG10\Identity
Protection\agent\bin\avgidsmonitor.exe owner: amer domain: 00010101010100
>>> PID: 2504 name: C:\Program Files\adobs\msats.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 2312 name: C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
owner: SYSTEM domain: AUTORITE NT
>>> PID: 340 name: C:\Program Files\Ralink\Common\RaRegistry.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 2684 name: C:\Program Files\Fichiers
communs\Intel\WirelessCommon\RegSrvc.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 3788 name: C:\WINDOWS\system32\svchost.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 2088 name: C:\Documents and Settings\All Users\Application
Data\UltraVNC\winvnc.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 832 name: C:\Program Files\VMware\VMware Workstation\vmware-authd.exe
owner: SYSTEM domain: AUTORITE NT
>>> PID: 2980 name: C:\Program Files\Common Files\VMware\USB\vmwareusbarbitrator.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 4856 name: C:\WINDOWS\system32\vmnat.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 5460 name: C:\WINDOWS\system32\vmnetdhcp.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 4320 name: C:\Program Files\AVG\AVG10\Identity
Protection\Agent\Bin\AVGIDSAgent.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 4568 name: C:\Documents and Settings\All Users\Application
Data\UltraVNC\winvnc.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 5400 name: C:\WINDOWS\system32\svchost.exe owner: SERVICE LOCAL
domain: AUTORITE NT
>>> PID: 5576 name: C:\WINDOWS\System32\alg.exe owner: SERVICE LOCAL domain:
AUTORITE NT
>>> PID: 4264 name: C:\Program Files\AVG\AVG10\avgrsx.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 5868 name: C:\Program Files\AVG\AVG10\avgcsrvx.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 2584 name: C:\Program Files\AVG\AVG10\avgchsvx.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 2928 name: C:\Program Files\Mozilla Firefox\firefox.exe owner: <UNKNOWN>
domain: <UNKNOWN>
>>> PID: 4964 name: C:\Program Files\Mozilla Firefox\plugin-container.exe owner: amer
domain: 00010101010100
>>> PID: 1584 name: C:\Program Files\Mozilla Firefox\plugin-container.exe owner: amer
domain: 00010101010100
>>> PID: 5924 name: C:\WINDOWS\explorer.exe owner: amer domain: 00010101010100
>>> PID: 352 name: C:\Program Files\Mozilla Firefox\plugin-container.exe owner: amer
domain: 00010101010100
>>> PID: 5952 name: C:\Program Files\Mozilla Firefox\plugin-container.exe owner: amer
domain: 00010101010100
>>> PID: 3872 name: C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe owner:
SYSTEM domain: AUTORITE NT
>>> PID: 3952 name: C:\Program Files\Lavasoft\Ad-Aware\Ad-Aware.exe owner: amer
domain: 00010101010100
>>> PID: 4384 name: C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe owner: amer
domain: 00010101010100
>>>
>>> Startup items:
>>> Name: Config
>>>
imagepath: %systemroot%\system32\run.cmd
>>> Name: nlsf
>>>
imagepath: cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll"
"%SystemRoot%\System32\syssetup.dll"
>>> Name: tscuninstall
>>>
imagepath: %systemroot%\system32\tscupgrd.exe
>>> Name: SMSERIAL
>>>
imagepath: C:\Program Files\Motorola\SMSERIAL\sm56hlpr.exe
>>> Name: IAStorIcon
>>>
imagepath: C:\Program Files\Intel\Intel(R) Rapid Storage
Technology\IAStorIcon.exe
>>> Name: AppleSyncNotifier
>>>
imagepath: C:\Program Files\Fichiers communs\Apple\Mobile Device
Support\AppleSyncNotifier.exe
>>> Name: IntelZeroConfig
>>>
imagepath: "C:\Program Files\Intel\WiFi\bin\ZCfgSvc.exe"
>>> Name: IntelWireless
>>>
imagepath: "C:\Program Files\Fichiers
communs\Intel\WirelessCommon\iFrmewrk.exe" /tf Intel Wireless Tray
>>> Name: ZoneAlarm Client
>>>
imagepath: "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
>>> Name: ISW
>>>
imagepath: "C:\Program Files\CheckPoint\ZAForceField\ForceField.exe"
/icon="hidden"
>>> Name: BrMfcWnd
>>>
imagepath: C:\Program Files\Brother\Brmfcmon\BrMfcWnd.exe /AUTORUN
>>> Name: ControlCenter3
>>>
imagepath: C:\Program Files\Brother\ControlCenter3\brctrcen.exe /autorun
>>> Name: Adobe Reader Speed Launcher
>>>
imagepath: "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
>>> Name: Adobe ARM
>>>
imagepath: "C:\Program Files\Fichiers
communs\Adobe\ARM\1.0\AdobeARM.exe"
>>> Name: DivXUpdate
>>>
imagepath: "C:\Program Files\DivX\DivX Update\DivXUpdate.exe"
/CHECKNOW
>>> Name: LifeCam
>>>
imagepath: "C:\Program Files\Microsoft LifeCam\LifeExp.exe"
>>> Name: QuickTime Task
>>>
imagepath: "C:\Program Files\QuickTime\QTTask.exe" -atboottime
>>> Name: AVG_TRAY
>>>
imagepath: C:\Program Files\AVG\AVG10\avgtray.exe
>>> Name: PostBootReminder
>>>
imagepath: {7849596a-48ea-486e-8937-a2a3009f31a9}
>>> Name: CDBurn
>>>
imagepath: {fbeb8a05-beee-4442-804e-409d6c4515e9}
>>> Name: WebCheck
>>>
imagepath: {E6FB5E20-DE35-11CF-9C87-00AA005127ED}
>>> Name: SysTray
>>>
imagepath: {35CEC8A3-2BE6-11D2-8773-92E220524153}
>>> Name: WPDShServiceObj
>>>
imagepath: {AAA288BA-9A4C-45B0-95D7-94D524869DB5}
>>> Name: {438755C2-A8BA-11D1-B96B-00A0C90312E1}
>>>
imagepath: Pré-chargeur Browseui
>>> Name: {8C7461EF-2B13-11d2-BE35-3078302C2030}
>>>
imagepath: Démon de cache des catégories de composant
>>> Name:
>>>
imagepath: C:\Documents and Settings\All Users\Menu
Démarrer\Programmes\Démarrage\desktop.ini
>>> Name:
>>>
location: C:\Documents and Settings\All Users\Menu
Démarrer\Programmes\Démarrage\Microsoft Office.lnk
>>>
imagepath: C:\Program Files\Microsoft Office\Office10\OSA.EXE
>>> Name:
>>>
location: C:\Documents and Settings\All Users\Menu
Démarrer\Programmes\Démarrage\PalTalk.lnk
>>>
imagepath: C:\Program Files\Paltalk Messenger\paltalk.exe
>>> Name:
>>>
location: C:\Documents and Settings\All Users\Menu
Démarrer\Programmes\Démarrage\Ralink Wireless Utility.lnk
>>>
imagepath: C:\Program Files\Ralink\Common\RaUI.exe
>>> Name:
>>>
imagepath: C:\Documents and Settings\amer\Menu
Démarrer\Programmes\Démarrage\desktop.ini
>>> Name:
>>>
location: C:\Documents and Settings\amer\Menu
Démarrer\Programmes\Démarrage\MagicDisc.lnk
>>>
imagepath: C:\Program Files\MagicDisc\MagicDisc.exe
>>>
>>> Bootexecute items:
>>> Name:
>>>
imagepath: autocheck autochk *
>>> Name:
>>>
imagepath: C:\PROGRA~1\AVG\AVG10\avgchsvx.exe /sync
>>> Name:
>>>
imagepath: C:\PROGRA~1\AVG\AVG10\avgrsx.exe /sync /restart
>>> Name:
>>>
imagepath: lsdelete
>>>
>>> Running services:
>>> Name: ALG
>>>
displayname: Service de la passerelle de la couche Application
>>> Name: Apple Mobile Device
>>>
displayname: Apple Mobile Device
>>> Name: Ati HotKey Poller
>>>
displayname: Ati HotKey Poller
>>> Name: AudioSrv
>>>
displayname: Audio Windows
>>> Name: AVGIDSAgent
>>>
displayname: AVGIDSAgent
>>> Name: avgwd
>>>
displayname: AVG WatchDog
>>> Name: BITS
>>>
displayname: Service de transfert intelligent en arrière-plan
>>> Name: Bonjour Service
>>>
displayname: Service Bonjour
>>> Name: Browser
>>>
displayname: Explorateur d'ordinateur
>>> Name: Browser Defender Update Service
>>>
displayname: Browser Defender Update Service
>>> Name: CryptSvc
>>>
displayname: CryptSvc
>>> Name: DcomLaunch
>>>
displayname: Lanceur de processus serveur DCOM
>>> Name: Dhcp
>>>
displayname: Client DHCP
>>> Name: Dnscache
>>>
displayname: Client DNS
>>> Name: EapHost
>>>
displayname: Service Protocole EAP (Extensible Authentication Protocol)
>>> Name: ERSvc
>>>
displayname: Service de rapport d'erreurs
>>> Name: Eventlog
>>>
displayname: Journal des événements
>>> Name: EventSystem
>>>
displayname: Système d'événements de COM+
>>> Name: EvtEng
>>>
displayname: Intel(R) PROSet/Wireless Event Log
>>> Name: FastUserSwitchingCompatibility
>>>
displayname: Compatibilité avec le Changement rapide d'utilisateur
>>> Name: hasplms
>>>
displayname: HASP License Manager
>>> Name: helpsvc
>>>
displayname: Aide et support
>>> Name: IAStorDataMgrSvc
>>>
displayname: Intel(R) Rapid Storage Technology
>>> Name: InstallShield Licensing Service
>>>
displayname: InstallShield Licensing Service
>>> Name: IswSvc
>>>
displayname: ZoneAlarm Toolbar IswSvc
>>> Name: JavaQuickStarterService
>>>
displayname: Java Quick Starter
>>> Name: lanmanserver
>>>
displayname: Serveur
>>> Name: lanmanworkstation
>>>
displayname: Station de travail
>>> Name: Lavasoft Ad-Aware Service
>>>
displayname: Lavasoft Ad-Aware Service
>>> Name: Log Events
>>>
displayname: Log Events
>>> Name: MBAMService
>>>
displayname: MBAMService
>>> Name: Netman
>>>
displayname: Connexions réseau
>>> Name: Nla
>>>
displayname: NLA (Network Location Awareness)
>>> Name: NWCWorkstation
>>>
displayname: Service client pour NetWare
>>> Name: PlugPlay
>>>
displayname: Plug-and-Play
>>> Name: ProtectedStorage
>>>
displayname: Emplacement protégé
>>> Name: RalinkRegistryWriter
>>>
displayname: Ralink Registry Writer
>>> Name: RasMan
>>>
displayname: Gestionnaire de connexions d'accès distant
>>> Name: RegSrvc
>>>
displayname: Intel(R) PROSet/Wireless Registry Service
>>> Name: RpcSs
>>>
displayname: Appel de procédure distante (RPC)
>>> Name: S24EventMonitor
>>>
displayname: Intel(R) PROSet/Wireless WiFi Service
>>> Name: SamSs
>>>
displayname: Gestionnaire de comptes de sécurité
>>> Name: Schedule
>>>
displayname: Planificateur de tâches
>>> Name: seclogon
>>>
displayname: Secondary Logon
>>> Name: SENS
>>>
displayname: Notification d'événement système
>>> Name: SharedAccess
>>>
displayname: Pare-feu Windows / Partage de connexion Internet
>>> Name: ShellHWDetection
>>>
displayname: Détection matériel noyau
>>> Name: Spooler
>>>
displayname: Spouleur d'impression
>>> Name: srservice
>>>
displayname: Service de restauration système
>>> Name: SSDPSRV
>>>
displayname: Service de découvertes SSDP
>>> Name: stisvc
>>>
displayname: Acquisition d'image Windows (WIA)
>>> Name: TapiSrv
>>>
displayname: Téléphonie
>>> Name: TermService
>>>
displayname: Services Terminal Server
>>> Name: Themes
>>>
displayname: Thèmes
>>> Name: uvnc_service
>>>
displayname: UltraVNC Server
>>> Name: VMAuthdService
>>>
displayname: VMware Authorization Service
>>> Name: VMnetDHCP
>>>
displayname: VMware DHCP Service
>>> Name: VMUSBArbService
>>>
displayname: VMware USB Arbitration Service
>>> Name: VMware NAT Service
>>>
displayname: VMware NAT Service
>>> Name: vsmon
>>>
displayname: TrueVector Internet Monitor
>>> Name: W32Time
>>>
displayname: Horloge Windows
>>> Name: winmgmt
>>>
displayname: Infrastructure de gestion Windows
>>> Name: wscsvc
>>>
displayname: Centre de sécurité
>>> Name: wuauserv
>>>
displayname: Mises à jour automatiques
>>>
>>>
ERR [0476] 2011/10/09 23:32:15: SDKController::GetInfectionList -> Not in found
infections state
MSG [0476] 2011/10/09 23:57:23: Configure new scan with profile: full
MSG [0476] 2011/10/09 23:57:23: -> scanning critical objects
MSG [0476] 2011/10/09 23:57:23: -> scanning running processes
MSG [0476] 2011/10/09 23:57:23: -> scanning registry
MSG [0476] 2011/10/09 23:57:23: -> scanning lsp
MSG [0476] 2011/10/09 23:57:23: -> scanning ads
MSG [0476] 2011/10/09 23:57:23: -> scanning hosts file
MSG [0476] 2011/10/09 23:57:23: -> scanning mru objects
MSG [0476] 2011/10/09 23:57:23: -> scanning browser hijacks
MSG [0476] 2011/10/09 23:57:23: -> scanning cookies
MSG [0476] 2011/10/09 23:57:23: -> neutralizing rootkits
MSG [0476] 2011/10/09 23:57:23: -> use mild rootkit detection
MSG [0476] 2011/10/09 23:57:23: -> use spyware heuristics
MSG [0476] 2011/10/09 23:57:23: -> use medium heuristics
MSG [0476] 2011/10/09 23:57:23: -> scan archives
MSG [0476] 2011/10/09 23:57:23: -> file size limit = 20480 kB (0 = unlimited)
MSG [0476] 2011/10/09 23:57:23: -> validating system critical files
MSG [0476] 2011/10/09 23:57:23: -> scan file/path = C:\
MSG [0476] 2011/10/09 23:57:23: -> scan file/path = E:\
ERR [0476] 2011/10/09 23:57:23: SDKController::GetDefinitonsFileVersion -> Not in idle
state
ERR [0476] 2011/10/09 23:57:23: SDKController::GetLatestSuccessfulScanReportHeader ->
Not in idle state
ERR [0476] 2011/10/09 23:57:23: SDKController::GetLatestSuccessfulScanReportHeader ->
Not in idle state
ERR [0476] 2011/10/09 23:57:23: SDKController::GetLatestSuccessfulScanReportHeader ->
Not in idle state
ERR [0476] 2011/10/09 23:57:23: SDKController::GetInfectionList -> Not in found
infections state
MSG [3760] 2011/10/10 04:08:12: Scan was completed in 15049 seconds
MSG [3760] 2011/10/10 04:08:12: Objects processed: 257076, infections detected: 33
MSG [2716] 2011/10/10 04:08:15: Remediating 33 infections
MSG [2716] 2011/10/10 04:08:21: Infections quarantined: 0, removed: 0, repaired: 0
MSG [2716] 2011/10/10 04:08:21: Infections ignored by remediation: 33 (0 whitelisted, 33
skipped).
MSG [0476] 2011/10/10 04:08:25: Dumping scan report:
>>> Logfile created: 09/10/2011 23:57:23
>>> Ad-Aware version: 9.5.1
>>> Extended engine: 3
>>> Extended engine version: 3.1.2770
>>> User performing scan: amer
>>>
>>> *********************** Definitions database information
***********************
>>> Lavasoft definition file: 150.590
>>> Genotype definition file version: 2011/09/21 13:56:01
>>> Extended engine definition file: 10715.0
>>>
>>> ******************************** Scan results:
*********************************
>>> Scan profile name: Analyse complète (ID: full)
>>> Objects scanned: 257076
>>> Objects detected: 33
>>>
>>>
>>> Type
Detected
>>> ==========================
>>> Processes.......:
0
>>> Registry entries:
17
>>> Hostfile entries:
0
>>> Files...........:
16
>>> Folders.........:
0
>>> LSPs............:
0
>>> Cookies.........:
0
>>> Browser hijacks.:
0
>>> MRU objects.....:
0
>>>
>>>
>>>
>>> Skipped items:
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp386\a0278917.exe Family Name: Hotbar Engine: 3 Clean status: Success
Item ID: 1 Family ID: 0 MD5: 65a4251686267873188a197264df64a0
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284613.dll Family Name: Win32.PUP.Bandoo[800] Engine: 1 Clean
status: Success Item ID: 0 Family ID: 0 MD5: d33ebb9ad2ef0e99fb1aef40dc9a281a
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284614.dll Family Name: Win32.PUP.Bandoo[800] Engine: 1 Clean
status: Success Item ID: 0 Family ID: 0 MD5: 535ecda75f845d3d7607b6631dd07df7
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284612.exe Family Name: Win32.PUP.Bandoo[800] Engine: 1
Clean status: Success Item ID: 0 Family ID: 0 MD5: c5e3d9d13f7d68f3d93890a2aeb97e1b
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284615.dll Family Name: Win32.PUP.Bandoo[800] Engine: 1 Clean
status: Success Item ID: 0 Family ID: 0 MD5: 17f7547a6808b758cb4a455ede24deba
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284620.exe Family Name: Win32.PUP.Bandoo[800] Engine: 1
Clean status: Success Item ID: 0 Family ID: 0 MD5: 59a137f44f95d95c1e2092ac58333860
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284622.dll Family Name: Win32.PUP.Bandoo[800] Engine: 1 Clean
status: Success Item ID: 0 Family ID: 0 MD5: 747430885dd10c8f69bc4bdd34853bc0
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284623.exe Family Name: Win32.PUP.Bandoo[800] Engine: 1
Clean status: Success Item ID: 0 Family ID: 0 MD5: fbd76ee2c589307b78742e5e3be18a47
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284625.dll Family Name: Win32.PUP.Bandoo[800] Engine: 1 Clean
status: Success Item ID: 0 Family ID: 0 MD5: 56484bc3c1221de645a12d90ae337428
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284624.exe Family Name: Win32.PUP.Bandoo[800] Engine: 1
Clean status: Success Item ID: 0 Family ID: 0 MD5: a47c4d76470d3ad9b14c69469d3de793
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284626.dll Family Name: Win32.PUP.Bandoo[800] Engine: 1 Clean
status: Success Item ID: 0 Family ID: 0 MD5: a7c8e3a8f60e85feeb679832755b60f7
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284627.exe Family Name: Win32.PUP.Bandoo[800] Engine: 1
Clean status: Success Item ID: 0 Family ID: 0 MD5: b56a3cba0c05ac6c4907a2e937162494
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284632.dll Family Name: Win32.PUP.Bandoo[800] Engine: 1 Clean
status: Success Item ID: 0 Family ID: 0 MD5: 7687e3c97c7493c7d9c9fa14ad59a255
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284633.dll Family Name: Win32.PUP.Bandoo[800] Engine: 1 Clean
status: Success Item ID: 0 Family ID: 0 MD5: b3fc6760c794b8da9da0f2abcc9c4425
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284634.dll Family Name: Win32.PUP.Bandoo[800] Engine: 1 Clean
status: Success Item ID: 0 Family ID: 0 MD5: 2af17b9821cea4ad0f93948e538aa47a
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp392\a0285102.exe Family Name: Win32.PUP.Bandoo[800] Engine: 1
Clean status: Success Item ID: 0 Family ID: 0 MD5: 7179a8b649d1f9af243b65ce0899fe91
>>> Description: HKLM:SOFTWARE\Classes\AppID\BandooCore.EXE: Family Name:
Win32.PUP.Bandoo Engine: 1 Clean status: Success Item ID: 5367023 Family ID: 5366997
>>> Description: HKCR:AppID\{1301A8A5-3DFB-4731-A162-B357D00C9644}: Family
Name: Win32.PUP.Bandoo Engine: 1 Clean status: Success Item ID: 5367024 Family ID:
5366997
>>> Description: HKCR:AppID\BandooCore.EXE: Family Name: Win32.PUP.Bandoo
Engine: 1 Clean status: Success Item ID: 5367030 Family ID: 5366997
>>> Description: HKCR:BandooCore.BandooCore: Family Name: Win32.PUP.Bandoo
Engine: 1 Clean status: Success Item ID: 5367041 Family ID: 5366997
>>> Description: HKCR:BandooCore.BandooCore.1: Family Name: Win32.PUP.Bandoo
Engine: 1 Clean status: Success Item ID: 5367042 Family ID: 5366997
>>> Description: HKCR:BandooCore.ResourcesMngr: Family Name: Win32.PUP.Bandoo
Engine: 1 Clean status: Success Item ID: 5367043 Family ID: 5366997
>>> Description: HKCR:BandooCore.ResourcesMngr.1: Family Name: Win32.PUP.Bandoo
Engine: 1 Clean status: Success Item ID: 5367044 Family ID: 5366997
>>> Description: HKCR:BandooCore.SettingsMngr: Family Name: Win32.PUP.Bandoo
Engine: 1 Clean status: Success Item ID: 5367045 Family ID: 5366997
>>> Description: HKCR:BandooCore.SettingsMngr.1: Family Name: Win32.PUP.Bandoo
Engine: 1 Clean status: Success Item ID: 5367046 Family ID: 5366997
>>> Description: HKCR:BandooCore.StatisticMngr: Family Name: Win32.PUP.Bandoo
Engine: 1 Clean status: Success Item ID: 5367047 Family ID: 5366997
>>> Description: HKCR:BandooCore.StatisticMngr.1: Family Name: Win32.PUP.Bandoo
Engine: 1 Clean status: Success Item ID: 5367048 Family ID: 5366997
>>> Description: HKCR:CLSID\{27F69C85-64E1-43CE-98B5-3C9F22FB408E}: Family
Name: Win32.PUP.Bandoo Engine: 1 Clean status: Success Item ID: 5367054 Family ID:
5366997
>>> Description: HKCR:CLSID\{B543EF05-9758-464E-9F37-4C28525B4A4C}: Family
Name: Win32.PUP.Bandoo Engine: 1 Clean status: Success Item ID: 5367059 Family ID:
5366997
>>> Description: HKCR:CLSID\{BB76A90B-2B4C-4378-8506-9A2B6E16943C}: Family
Name: Win32.PUP.Bandoo Engine: 1 Clean status: Success Item ID: 5367060 Family ID:
5366997
>>> Description: HKCR:CLSID\{C3AB94A4-BFD0-4BBA-A331-DE504F07D2DB}:
Family Name: Win32.PUP.Bandoo Engine: 1 Clean status: Success Item ID: 5367061 Family
ID: 5366997
>>> Description: HKCR:Interface\{477F210A-2A86-4666-9C4B-1189634D2C84}: Family
Name: Win32.PUP.Bandoo Engine: 1 Clean status: Success Item ID: 5367069 Family ID:
5366997
>>> Description: HKCR:TypeLib\{8F5F1CB6-EA9E-40AF-A5CA-C7FD63CC1971}:
Family Name: Win32.PUP.Bandoo Engine: 1 Clean status: Success Item ID: 5367073 Family
ID: 5366997
>>>
>>> Scan and cleaning complete: Finished correctly after 15049 seconds
>>>
>>> *********************************** Settings
***********************************
>>>
>>> Scan profile:
>>> ID: full, enabled:1, value: Analyse complète
>>> ID: folderstoscan, enabled:1, value: C:\,E:\
>>> ID: useantivirus, enabled:1, value: true
>>> ID: sections, enabled:1
>>> ID: scancriticalareas, enabled:1, value: true
>>> ID: scanrunningapps, enabled:1, value: true
>>> ID: scanregistry, enabled:1, value: true
>>> ID: scanlsp, enabled:1, value: true
>>> ID: scanads, enabled:1, value: true
>>> ID: scanhostsfile, enabled:1, value: true
>>> ID: scanmru, enabled:1, value: true
>>> ID: scanbrowserhijacks, enabled:1, value: true
>>> ID: scantrackingcookies, enabled:1, value: true
>>>
ID: closebrowsers, enabled:1, value: false
>>> ID: filescanningoptions, enabled:1
>>> ID: archives, enabled:1, value: true
>>> ID: onlyexecutables, enabled:1, value: false
>>> ID: skiplargerthan, enabled:1, value: 20480
>>> ID: scanrootkits, enabled:1, value: true
>>>
ID: rootkitlevel, enabled:1, value: mild, domain: medium,mild,strict
>>> ID: usespywareheuristics, enabled:1, value: true
>>>
>>> Scan global:
>>> ID: global, enabled:1
>>> ID: addtocontextmenu, enabled:1, value: true
>>> ID: playsoundoninfection, enabled:1, value: false
>>> ID: soundfile, enabled:0, value: N/A
>>>
>>> Scheduled scan settings:
>>> <Empty>
>>>
>>> Update settings:
>>> ID: updates, enabled:1
>>> ID: launchthreatworksafterscan, enabled:1, value: silently, domain: normal,off,silently
>>> ID: deffiles, enabled:1, value: downloadandinstall, domain:
dontcheck,downloadandinstall
>>> ID: licenseandinfo, enabled:1, value: downloadandinstall, domain:
dontcheck,downloadandinstall
>>> ID: schedules, enabled:1, value: true
>>> ID: updatedaily1, enabled:1, value: Daily 1
>>>
ID: time, enabled:1, value: Wed Aug 31 13:07:00 2011
>>>
ID: frequency, enabled:1, value: daily, domain:
daily,monthly,once,systemstart,weekly
>>>
ID: weekdays, enabled:1
>>>
ID: monday, enabled:1, value: false
>>>
ID: tuesday, enabled:1, value: false
>>>
ID: wednesday, enabled:1, value: false
>>>
ID: thursday, enabled:1, value: false
>>>
ID: friday, enabled:1, value: false
>>>
ID: saturday, enabled:1, value: false
>>>
ID: sunday, enabled:1, value: false
>>>
ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31
>>>
ID: scanprofile, enabled:1, value:
>>>
ID: auto_deal_with_infections, enabled:1, value: false
>>> ID: updatedaily2, enabled:1, value: Daily 2
>>>
ID: time, enabled:1, value: Wed Aug 31 19:07:00 2011
>>>
ID: frequency, enabled:1, value: daily, domain:
daily,monthly,once,systemstart,weekly
>>>
ID: weekdays, enabled:1
>>>
ID: monday, enabled:1, value: false
>>>
ID: tuesday, enabled:1, value: false
>>>
ID: wednesday, enabled:1, value: false
>>>
ID: thursday, enabled:1, value: false
>>>
ID: friday, enabled:1, value: false
>>>
ID: saturday, enabled:1, value: false
>>>
ID: sunday, enabled:1, value: false
>>>
ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31
>>>
ID: scanprofile, enabled:1, value:
>>>
ID: auto_deal_with_infections, enabled:1, value: false
>>> ID: updatedaily3, enabled:1, value: Daily 3
>>>
ID: time, enabled:1, value: Wed Aug 31 01:07:00 2011
>>>
ID: frequency, enabled:1, value: daily, domain:
daily,monthly,once,systemstart,weekly
>>>
ID: weekdays, enabled:1
>>>
ID: monday, enabled:1, value: false
>>>
ID: tuesday, enabled:1, value: false
>>>
ID: wednesday, enabled:1, value: false
>>>
ID: thursday, enabled:1, value: false
>>>
ID: friday, enabled:1, value: false
>>>
ID: saturday, enabled:1, value: false
>>>
ID: sunday, enabled:1, value: false
>>>
ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31
>>>
ID: scanprofile, enabled:1, value:
>>>
ID: auto_deal_with_infections, enabled:1, value: false
>>> ID: updatedaily4, enabled:1, value: Daily 4
>>>
ID: time, enabled:1, value: Wed Aug 31 07:07:00 2011
>>>
ID: frequency, enabled:1, value: daily, domain:
daily,monthly,once,systemstart,weekly
>>>
ID: weekdays, enabled:1
>>>
ID: monday, enabled:1, value: false
>>>
ID: tuesday, enabled:1, value: false
>>>
ID: wednesday, enabled:1, value: false
>>>
ID: thursday, enabled:1, value: false
>>>
ID: friday, enabled:1, value: false
>>>
ID: saturday, enabled:1, value: false
>>>
ID: sunday, enabled:1, value: false
>>>
ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31
>>>
ID: scanprofile, enabled:1, value:
>>>
ID: auto_deal_with_infections, enabled:1, value: false
>>> ID: updateweekly1, enabled:1, value: Weekly
>>>
ID: time, enabled:1, value: Wed Aug 31 13:07:00 2011
>>>
ID: frequency, enabled:1, value: weekly, domain:
daily,monthly,once,systemstart,weekly
>>>
ID: weekdays, enabled:1
>>>
ID: monday, enabled:1, value: false
>>>
ID: tuesday, enabled:1, value: false
>>>
ID: wednesday, enabled:1, value: true
>>>
ID: thursday, enabled:1, value: false
>>>
ID: friday, enabled:1, value: false
>>>
ID: saturday, enabled:1, value: true
>>>
ID: sunday, enabled:1, value: false
>>>
ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31
>>>
ID: scanprofile, enabled:1, value:
>>>
ID: auto_deal_with_infections, enabled:1, value: false
>>>
>>> Appearance settings:
>>> ID: appearance, enabled:1
>>> ID: skin, enabled:1, value: default.egl, reglocation:
HKEY_LOCAL_MACHINE\SOFTWARE\Lavasoft\Ad-Aware\Resource
>>> ID: showtrayicon, enabled:1, value: true
>>> ID: autoentertainmentmode, enabled:1, value: true
>>> ID: guimode, enabled:1, value: mode_simple, domain: mode_advanced,mode_simple
>>> ID: language, enabled:1, value: fr, reglocation:
HKEY_LOCAL_MACHINE\SOFTWARE\Lavasoft\Ad-Aware\Language
>>>
>>> Realtime protection settings:
>>> ID: realtime, enabled:1
>>> ID: infomessages, enabled:1, value: onlyimportant, domain:
display,dontnotify,onlyimportant
>>> ID: layers, enabled:1
>>> ID: useantivirus, enabled:1, value: true
>>> ID: usespywareheuristics, enabled:1, value: true
>>> ID: maintainbackup, enabled:1, value: true
>>> ID: modules, enabled:1
>>> ID: processprotection, enabled:1, value: true
>>> ID: onaccessprotection, enabled:1, value: true
>>> ID: registryprotection, enabled:1, value: true
>>> ID: networkprotection, enabled:1, value: true
>>>
>>>
>>> ****************************** System information
******************************
>>> Computer name: 00010101010100
>>> Processor name: Intel(R) Core(TM)2 Duo CPU T7250 @ 2.00GHz
>>> Processor identifier: x86 Family 6 Model 15 Stepping 13
>>> Processor speed: ~1995MHZ
>>> Raw info: processorarchitecture 0, processortype 586, processorlevel 6, processor
revision 3853, number of processors 2, processor features: [MMX,SSE,SSE2]
>>> Physical memory available: 508137472 bytes
>>> Physical memory total: 2145759232 bytes
>>> Virtual memory available: 1834749952 bytes
>>> Virtual memory total: 2147352576 bytes
>>> Memory load: 76%
>>> Microsoft Windows XP Professional Service Pack 3 (build 2600)
>>> Windows startup mode:
>>>
>>> Running processes:
>>> PID: 616 name: \SystemRoot\System32\smss.exe owner: SYSTEM domain: AUTORITE
NT
>>> PID: 1092 name: C:\WINDOWS\system32\csrss.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1132 name: C:\WINDOWS\system32\winlogon.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1188 name: C:\WINDOWS\system32\services.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1200 name: C:\WINDOWS\system32\lsass.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1396 name: C:\WINDOWS\system32\Ati2evxx.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1416 name: C:\WINDOWS\system32\svchost.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1516 name: C:\WINDOWS\system32\svchost.exe owner: SERVICE RÉSEAU
domain: AUTORITE NT
>>> PID: 716 name: C:\WINDOWS\System32\svchost.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 656 name: C:\Program Files\Intel\WiFi\bin\S24EvMon.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 776 name: C:\WINDOWS\system32\svchost.exe owner: SERVICE RÉSEAU
domain: AUTORITE NT
>>> PID: 1756 name: C:\WINDOWS\system32\ZoneLabs\vsmon.exe owner: <UNKNOWN>
domain: <UNKNOWN>
>>> PID: 1972 name: C:\WINDOWS\system32\Ati2evxx.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 448 name: C:\Program Files\CheckPoint\ZAForceField\IswSvc.exe owner:
<UNKNOWN> domain: <UNKNOWN>
>>> PID: 564 name: C:\WINDOWS\system32\spoolsv.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1100 name: C:\WINDOWS\system32\wbem\unsecapp.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 1708 name: C:\WINDOWS\system32\wbem\wmiprvse.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 2524 name: C:\Program Files\CheckPoint\ZAForceField\ForceField.exe owner:
<UNKNOWN> domain: <UNKNOWN>
>>> PID: 3768 name: C:\Program Files\Fichiers communs\Apple\Mobile Device
Support\AppleMobileDeviceService.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 3816 name: C:\Program Files\AVG\AVG10\avgwdsvc.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 2140 name: C:\Program Files\Bonjour\mDNSResponder.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 3388 name: C:\Program Files\PC Tools Security\BDT\BDTUpdateService.exe
owner: SYSTEM domain: AUTORITE NT
>>> PID: 3028 name: C:\Program Files\Motorola\SMSERIAL\sm56hlpr.exe owner: amer
domain: 00010101010100
>>> PID: 3040 name: C:\WINDOWS\System32\svchost.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 3048 name: C:\Program Files\Intel\Intel(R) Rapid Storage
Technology\IAStorIcon.exe owner: amer domain: 00010101010100
>>> PID: 3140 name: C:\Program Files\Intel\WiFi\bin\ZCfgSvc.exe owner: amer domain:
00010101010100
>>> PID: 2616 name: C:\Program Files\Fichiers
communs\Intel\WirelessCommon\iFrmewrk.exe owner: amer domain: 00010101010100
>>> PID: 3288 name: C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe owner:
<UNKNOWN> domain: <UNKNOWN>
>>> PID: 3300 name: C:\Program Files\Intel\WiFi\bin\EvtEng.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 4040 name: C:\Program Files\AVG\AVG10\avgtray.exe owner: amer domain:
00010101010100
>>> PID: 688 name: C:\WINDOWS\system32\hasplms.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1080 name: C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe owner:
amer domain: 00010101010100
>>> PID: 1832 name: C:\Program Files\AVG\AVG10\avgnsx.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1932 name: C:\Program Files\PC Tools Security\BDT\FGuard.exe owner: amer
domain: 00010101010100
>>> PID: 2068 name: C:\WINDOWS\system32\ctfmon.exe owner: amer domain:
00010101010100
>>> PID: 1692 name: C:\Program Files\Spybot - Search & Destroy2\TeaTimer.exe owner:
amer domain: 00010101010100
>>> PID: 4080 name: C:\Program Files\Intel\Intel(R) Rapid Storage
Technology\IAStorDataMgrSvc.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 2564 name: C:\WINDOWS\system32\wbem\unsecapp.exe owner: amer domain:
00010101010100
>>> PID: 3540 name: C:\Program Files\Ralink\Common\RaUI.exe owner: amer domain:
00010101010100
>>> PID: 3576 name: C:\Program Files\Fichiers communs\InstallShield
Shared\Service\InstallShield Licensing Service.exe owner: SYSTEM domain: AUTORITE
NT
>>> PID: 2372 name: C:\Program Files\Java\jre6\bin\jqs.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1292 name: C:\Program Files\AVG\AVG10\Identity
Protection\agent\bin\avgidsmonitor.exe owner: amer domain: 00010101010100
>>> PID: 2504 name: C:\Program Files\adobs\msats.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 2312 name: C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
owner: SYSTEM domain: AUTORITE NT
>>> PID: 340 name: C:\Program Files\Ralink\Common\RaRegistry.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 2684 name: C:\Program Files\Fichiers
communs\Intel\WirelessCommon\RegSrvc.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 3788 name: C:\WINDOWS\system32\svchost.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 2088 name: C:\Documents and Settings\All Users\Application
Data\UltraVNC\winvnc.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 832 name: C:\Program Files\VMware\VMware Workstation\vmware-authd.exe
owner: SYSTEM domain: AUTORITE NT
>>> PID: 2980 name: C:\Program Files\Common Files\VMware\USB\vmwareusbarbitrator.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 4856 name: C:\WINDOWS\system32\vmnat.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 5460 name: C:\WINDOWS\system32\vmnetdhcp.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 4320 name: C:\Program Files\AVG\AVG10\Identity
Protection\Agent\Bin\AVGIDSAgent.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 4568 name: C:\Documents and Settings\All Users\Application
Data\UltraVNC\winvnc.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 5400 name: C:\WINDOWS\system32\svchost.exe owner: SERVICE LOCAL
domain: AUTORITE NT
>>> PID: 5576 name: C:\WINDOWS\System32\alg.exe owner: SERVICE LOCAL domain:
AUTORITE NT
>>> PID: 4264 name: C:\Program Files\AVG\AVG10\avgrsx.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 5868 name: C:\Program Files\AVG\AVG10\avgcsrvx.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 2584 name: C:\Program Files\AVG\AVG10\avgchsvx.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 5924 name: C:\WINDOWS\explorer.exe owner: amer domain: 00010101010100
>>> PID: 3872 name: C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe owner:
SYSTEM domain: AUTORITE NT
>>> PID: 3952 name: C:\Program Files\Lavasoft\Ad-Aware\Ad-Aware.exe owner: amer
domain: 00010101010100
>>> PID: 4384 name: C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe owner: amer
domain: 00010101010100
>>> PID: 5628 name: C:\Program Files\Mozilla Firefox\firefox.exe owner: amer domain:
00010101010100
>>> PID: 2160 name: C:\Program Files\Mozilla Firefox\plugin-container.exe owner: amer
domain: 00010101010100
>>> PID: 4408 name: C:\Program Files\Mozilla Firefox\plugin-container.exe owner: amer
domain: 00010101010100
>>>
>>> Startup items:
>>> Name: {438755C2-A8BA-11D1-B96B-00A0C90312E1}
>>>
imagepath: Pré-chargeur Browseui
>>> Name: {8C7461EF-2B13-11d2-BE35-3078302C2030}
>>>
imagepath: Démon de cache des catégories de composant
>>> Name: PostBootReminder
>>>
imagepath: {7849596a-48ea-486e-8937-a2a3009f31a9}
>>> Name: CDBurn
>>>
imagepath: {fbeb8a05-beee-4442-804e-409d6c4515e9}
>>> Name: WebCheck
>>>
imagepath: {E6FB5E20-DE35-11CF-9C87-00AA005127ED}
>>> Name: SysTray
>>>
imagepath: {35CEC8A3-2BE6-11D2-8773-92E220524153}
>>> Name: WPDShServiceObj
>>>
imagepath: {AAA288BA-9A4C-45B0-95D7-94D524869DB5}
>>> Name: SMSERIAL
>>>
imagepath: C:\Program Files\Motorola\SMSERIAL\sm56hlpr.exe
>>> Name: IAStorIcon
>>>
imagepath: C:\Program Files\Intel\Intel(R) Rapid Storage
Technology\IAStorIcon.exe
>>> Name: AppleSyncNotifier
>>>
imagepath: C:\Program Files\Fichiers communs\Apple\Mobile Device
Support\AppleSyncNotifier.exe
>>> Name: IntelZeroConfig
>>>
imagepath: "C:\Program Files\Intel\WiFi\bin\ZCfgSvc.exe"
>>> Name: IntelWireless
>>>
imagepath: "C:\Program Files\Fichiers
communs\Intel\WirelessCommon\iFrmewrk.exe" /tf Intel Wireless Tray
>>> Name: ZoneAlarm Client
>>>
imagepath: "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
>>> Name: ISW
>>>
imagepath: "C:\Program Files\CheckPoint\ZAForceField\ForceField.exe"
/icon="hidden"
>>> Name: BrMfcWnd
>>>
imagepath: C:\Program Files\Brother\Brmfcmon\BrMfcWnd.exe /AUTORUN
>>> Name: ControlCenter3
>>>
imagepath: C:\Program Files\Brother\ControlCenter3\brctrcen.exe /autorun
>>> Name: Adobe Reader Speed Launcher
>>>
imagepath: "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
>>> Name: Adobe ARM
>>>
imagepath: "C:\Program Files\Fichiers
communs\Adobe\ARM\1.0\AdobeARM.exe"
>>> Name: DivXUpdate
>>>
imagepath: "C:\Program Files\DivX\DivX Update\DivXUpdate.exe"
/CHECKNOW
>>> Name: LifeCam
>>>
imagepath: "C:\Program Files\Microsoft LifeCam\LifeExp.exe"
>>> Name: QuickTime Task
>>>
imagepath: "C:\Program Files\QuickTime\QTTask.exe" -atboottime
>>> Name: AVG_TRAY
>>>
imagepath: C:\Program Files\AVG\AVG10\avgtray.exe
>>> Name: Config
>>>
imagepath: %systemroot%\system32\run.cmd
>>> Name: nlsf
>>>
imagepath: cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll"
"%SystemRoot%\System32\syssetup.dll"
>>> Name: tscuninstall
>>>
imagepath: %systemroot%\system32\tscupgrd.exe
>>> Name:
>>>
imagepath: C:\Documents and Settings\All Users\Menu
Démarrer\Programmes\Démarrage\desktop.ini
>>> Name:
>>>
location: C:\Documents and Settings\All Users\Menu
Démarrer\Programmes\Démarrage\Microsoft Office.lnk
>>>
imagepath: C:\Program Files\Microsoft Office\Office10\OSA.EXE
>>> Name:
>>>
location: C:\Documents and Settings\All Users\Menu
Démarrer\Programmes\Démarrage\PalTalk.lnk
>>>
imagepath: C:\Program Files\Paltalk Messenger\paltalk.exe
>>> Name:
>>>
location: C:\Documents and Settings\All Users\Menu
Démarrer\Programmes\Démarrage\Ralink Wireless Utility.lnk
>>>
imagepath: C:\Program Files\Ralink\Common\RaUI.exe
>>> Name:
>>>
imagepath: C:\Documents and Settings\amer\Menu
Démarrer\Programmes\Démarrage\desktop.ini
>>> Name:
>>>
location: C:\Documents and Settings\amer\Menu
Démarrer\Programmes\Démarrage\MagicDisc.lnk
>>>
imagepath: C:\Program Files\MagicDisc\MagicDisc.exe
>>>
>>> Bootexecute items:
>>> Name:
>>>
imagepath: autocheck autochk *
>>> Name:
>>>
imagepath: C:\PROGRA~1\AVG\AVG10\avgchsvx.exe /sync
>>> Name:
>>>
imagepath: C:\PROGRA~1\AVG\AVG10\avgrsx.exe /sync /restart
>>> Name:
>>>
imagepath: lsdelete
>>>
>>> Running services:
>>> Name: ALG
>>>
displayname: Service de la passerelle de la couche Application
>>> Name: Apple Mobile Device
>>>
displayname: Apple Mobile Device
>>> Name: Ati HotKey Poller
>>>
displayname: Ati HotKey Poller
>>> Name: AudioSrv
>>>
displayname: Audio Windows
>>> Name: AVGIDSAgent
>>>
displayname: AVGIDSAgent
>>> Name: avgwd
>>>
displayname: AVG WatchDog
>>> Name: BITS
>>>
displayname: Service de transfert intelligent en arrière-plan
>>> Name: Bonjour Service
>>>
displayname: Service Bonjour
>>> Name: Browser
>>>
displayname: Explorateur d'ordinateur
>>> Name: Browser Defender Update Service
>>>
displayname: Browser Defender Update Service
>>> Name: CryptSvc
>>>
displayname: CryptSvc
>>> Name: DcomLaunch
>>>
displayname: Lanceur de processus serveur DCOM
>>> Name: Dhcp
>>>
displayname: Client DHCP
>>> Name: Dnscache
>>>
displayname: Client DNS
>>> Name: EapHost
>>>
displayname: Service Protocole EAP (Extensible Authentication Protocol)
>>> Name: ERSvc
>>>
displayname: Service de rapport d'erreurs
>>> Name: Eventlog
>>>
displayname: Journal des événements
>>> Name: EventSystem
>>>
displayname: Système d'événements de COM+
>>> Name: EvtEng
>>>
displayname: Intel(R) PROSet/Wireless Event Log
>>> Name: FastUserSwitchingCompatibility
>>>
displayname: Compatibilité avec le Changement rapide d'utilisateur
>>> Name: hasplms
>>>
displayname: HASP License Manager
>>> Name: helpsvc
>>>
displayname: Aide et support
>>> Name: IAStorDataMgrSvc
>>>
displayname: Intel(R) Rapid Storage Technology
>>> Name: InstallShield Licensing Service
>>>
displayname: InstallShield Licensing Service
>>> Name: IswSvc
>>>
displayname: ZoneAlarm Toolbar IswSvc
>>> Name: JavaQuickStarterService
>>>
displayname: Java Quick Starter
>>> Name: lanmanserver
>>>
displayname: Serveur
>>> Name: lanmanworkstation
>>>
displayname: Station de travail
>>> Name: Lavasoft Ad-Aware Service
>>>
displayname: Lavasoft Ad-Aware Service
>>> Name: Log Events
>>>
displayname: Log Events
>>> Name: MBAMService
>>>
displayname: MBAMService
>>> Name: Netman
>>>
displayname: Connexions réseau
>>> Name: Nla
>>>
displayname: NLA (Network Location Awareness)
>>> Name: NWCWorkstation
>>>
displayname: Service client pour NetWare
>>> Name: PlugPlay
>>>
displayname: Plug-and-Play
>>> Name: ProtectedStorage
>>>
displayname: Emplacement protégé
>>> Name: RalinkRegistryWriter
>>>
displayname: Ralink Registry Writer
>>> Name: RasMan
>>>
displayname: Gestionnaire de connexions d'accès distant
>>> Name: RegSrvc
>>>
displayname: Intel(R) PROSet/Wireless Registry Service
>>> Name: RpcSs
>>>
displayname: Appel de procédure distante (RPC)
>>> Name: S24EventMonitor
>>>
displayname: Intel(R) PROSet/Wireless WiFi Service
>>> Name: SamSs
>>>
displayname: Gestionnaire de comptes de sécurité
>>> Name: Schedule
>>>
displayname: Planificateur de tâches
>>> Name: seclogon
>>>
displayname: Secondary Logon
>>> Name: SENS
>>>
displayname: Notification d'événement système
>>> Name: SharedAccess
>>>
displayname: Pare-feu Windows / Partage de connexion Internet
>>> Name: ShellHWDetection
>>>
displayname: Détection matériel noyau
>>> Name: Spooler
>>>
displayname: Spouleur d'impression
>>> Name: srservice
>>>
displayname: Service de restauration système
>>> Name: SSDPSRV
>>>
displayname: Service de découvertes SSDP
>>> Name: stisvc
>>>
displayname: Acquisition d'image Windows (WIA)
>>> Name: TapiSrv
>>>
displayname: Téléphonie
>>> Name: TermService
>>>
displayname: Services Terminal Server
>>> Name: Themes
>>>
displayname: Thèmes
>>> Name: uvnc_service
>>>
displayname: UltraVNC Server
>>> Name: VMAuthdService
>>>
displayname: VMware Authorization Service
>>> Name: VMnetDHCP
>>>
displayname: VMware DHCP Service
>>> Name: VMUSBArbService
>>>
displayname: VMware USB Arbitration Service
>>> Name: VMware NAT Service
>>>
displayname: VMware NAT Service
>>> Name: vsmon
>>>
displayname: TrueVector Internet Monitor
>>> Name: W32Time
>>>
displayname: Horloge Windows
>>> Name: winmgmt
>>>
displayname: Infrastructure de gestion Windows
>>> Name: wscsvc
>>>
displayname: Centre de sécurité
>>> Name: wuauserv
>>>
displayname: Mises à jour automatiques
>>>
>>>
MSG [0476] 2011/10/10 06:04:56: Configure new scan with profile: full
MSG [0476] 2011/10/10 06:04:56: -> scanning critical objects
MSG [0476] 2011/10/10 06:04:56: -> scanning running processes
MSG [0476] 2011/10/10 06:04:56: -> scanning registry
MSG [0476] 2011/10/10 06:04:56: -> scanning lsp
MSG [0476] 2011/10/10 06:04:56: -> scanning ads
MSG [0476] 2011/10/10 06:04:56: -> scanning hosts file
MSG [0476] 2011/10/10 06:04:56: -> scanning mru objects
MSG [0476] 2011/10/10 06:04:56: -> scanning browser hijacks
MSG [0476] 2011/10/10 06:04:56: -> scanning cookies
MSG [0476] 2011/10/10 06:04:56: -> neutralizing rootkits
MSG [0476] 2011/10/10 06:04:56: -> use mild rootkit detection
MSG [0476] 2011/10/10 06:04:56: -> use spyware heuristics
MSG [0476] 2011/10/10 06:04:56: -> use medium heuristics
MSG [0476] 2011/10/10 06:04:56: -> scan archives
MSG [0476] 2011/10/10 06:04:56: -> file size limit = 20480 kB (0 = unlimited)
MSG [0476] 2011/10/10 06:04:56: -> validating system critical files
MSG [0476] 2011/10/10 06:04:56: -> scan file/path = C:\
MSG [0476] 2011/10/10 06:04:56: -> scan file/path = E:\
ERR [0476] 2011/10/10 06:04:56: SDKController::GetDefinitonsFileVersion -> Not in idle
state
ERR [0476] 2011/10/10 06:04:56: SDKController::GetLatestSuccessfulScanReportHeader ->
Not in idle state
ERR [0476] 2011/10/10 06:04:56: SDKController::GetLatestSuccessfulScanReportHeader ->
Not in idle state
ERR [0476] 2011/10/10 06:04:56: SDKController::GetLatestSuccessfulScanReportHeader ->
Not in idle state
ERR [0476] 2011/10/10 06:04:56: SDKController::GetInfectionList -> Not in found
infections state
MSG [3372] 2011/10/10 11:27:05: Scan was completed in 19328 seconds
MSG [3372] 2011/10/10 11:27:05: Objects processed: 256812, infections detected: 33
MSG [1780] 2011/10/10 11:27:11: Remediating 33 infections
MSG [1780] 2011/10/10 11:27:19: Infections quarantined: 0, removed: 0, repaired: 0
MSG [1780] 2011/10/10 11:27:19: Infections ignored by remediation: 33 (0 whitelisted, 33
skipped).
MSG [0476] 2011/10/10 11:27:23: Dumping scan report:
>>> Logfile created: 10/10/2011 06:04:56
>>> Ad-Aware version: 9.5.1
>>> Extended engine: 3
>>> Extended engine version: 3.1.2770
>>> User performing scan: amer
>>>
>>> *********************** Definitions database information
***********************
>>> Lavasoft definition file: 150.590
>>> Genotype definition file version: 2011/09/21 13:56:01
>>> Extended engine definition file: 10715.0
>>>
>>> ******************************** Scan results:
*********************************
>>> Scan profile name: Analyse complète (ID: full)
>>> Objects scanned: 256812
>>> Objects detected: 33
>>>
>>>
>>> Type
Detected
>>> ==========================
>>> Processes.......:
0
>>> Registry entries:
17
>>> Hostfile entries:
0
>>> Files...........:
16
>>> Folders.........:
0
>>> LSPs............:
0
>>> Cookies.........:
0
>>> Browser hijacks.:
0
>>> MRU objects.....:
0
>>>
>>>
>>>
>>> Skipped items:
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp386\a0278917.exe Family Name: Hotbar Engine: 3 Clean status: Success
Item ID: 1 Family ID: 0 MD5: 65a4251686267873188a197264df64a0
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284613.dll Family Name: Win32.PUP.Bandoo[800] Engine: 1 Clean
status: Success Item ID: 0 Family ID: 0 MD5: d33ebb9ad2ef0e99fb1aef40dc9a281a
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284614.dll Family Name: Win32.PUP.Bandoo[800] Engine: 1 Clean
status: Success Item ID: 0 Family ID: 0 MD5: 535ecda75f845d3d7607b6631dd07df7
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284612.exe Family Name: Win32.PUP.Bandoo[800] Engine: 1
Clean status: Success Item ID: 0 Family ID: 0 MD5: c5e3d9d13f7d68f3d93890a2aeb97e1b
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284615.dll Family Name: Win32.PUP.Bandoo[800] Engine: 1 Clean
status: Success Item ID: 0 Family ID: 0 MD5: 17f7547a6808b758cb4a455ede24deba
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284620.exe Family Name: Win32.PUP.Bandoo[800] Engine: 1
Clean status: Success Item ID: 0 Family ID: 0 MD5: 59a137f44f95d95c1e2092ac58333860
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284622.dll Family Name: Win32.PUP.Bandoo[800] Engine: 1 Clean
status: Success Item ID: 0 Family ID: 0 MD5: 747430885dd10c8f69bc4bdd34853bc0
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284623.exe Family Name: Win32.PUP.Bandoo[800] Engine: 1
Clean status: Success Item ID: 0 Family ID: 0 MD5: fbd76ee2c589307b78742e5e3be18a47
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284625.dll Family Name: Win32.PUP.Bandoo[800] Engine: 1 Clean
status: Success Item ID: 0 Family ID: 0 MD5: 56484bc3c1221de645a12d90ae337428
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284624.exe Family Name: Win32.PUP.Bandoo[800] Engine: 1
Clean status: Success Item ID: 0 Family ID: 0 MD5: a47c4d76470d3ad9b14c69469d3de793
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284626.dll Family Name: Win32.PUP.Bandoo[800] Engine: 1 Clean
status: Success Item ID: 0 Family ID: 0 MD5: a7c8e3a8f60e85feeb679832755b60f7
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284627.exe Family Name: Win32.PUP.Bandoo[800] Engine: 1
Clean status: Success Item ID: 0 Family ID: 0 MD5: b56a3cba0c05ac6c4907a2e937162494
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284632.dll Family Name: Win32.PUP.Bandoo[800] Engine: 1 Clean
status: Success Item ID: 0 Family ID: 0 MD5: 7687e3c97c7493c7d9c9fa14ad59a255
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284633.dll Family Name: Win32.PUP.Bandoo[800] Engine: 1 Clean
status: Success Item ID: 0 Family ID: 0 MD5: b3fc6760c794b8da9da0f2abcc9c4425
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp391\a0284634.dll Family Name: Win32.PUP.Bandoo[800] Engine: 1 Clean
status: Success Item ID: 0 Family ID: 0 MD5: 2af17b9821cea4ad0f93948e538aa47a
>>> Description: c:\system volume information\_restore{b1ad646f-1f5b-4128-80e0e12d3742d49c}\rp392\a0285102.exe Family Name: Win32.PUP.Bandoo[800] Engine: 1
Clean status: Success Item ID: 0 Family ID: 0 MD5: 7179a8b649d1f9af243b65ce0899fe91
>>> Description: HKLM:SOFTWARE\Classes\AppID\BandooCore.EXE: Family Name:
Win32.PUP.Bandoo Engine: 1 Clean status: Success Item ID: 5367023 Family ID: 5366997
>>> Description: HKCR:AppID\{1301A8A5-3DFB-4731-A162-B357D00C9644}: Family
Name: Win32.PUP.Bandoo Engine: 1 Clean status: Success Item ID: 5367024 Family ID:
5366997
>>> Description: HKCR:AppID\BandooCore.EXE: Family Name: Win32.PUP.Bandoo
Engine: 1 Clean status: Success Item ID: 5367030 Family ID: 5366997
>>> Description: HKCR:BandooCore.BandooCore: Family Name: Win32.PUP.Bandoo
Engine: 1 Clean status: Success Item ID: 5367041 Family ID: 5366997
>>> Description: HKCR:BandooCore.BandooCore.1: Family Name: Win32.PUP.Bandoo
Engine: 1 Clean status: Success Item ID: 5367042 Family ID: 5366997
>>> Description: HKCR:BandooCore.ResourcesMngr: Family Name: Win32.PUP.Bandoo
Engine: 1 Clean status: Success Item ID: 5367043 Family ID: 5366997
>>> Description: HKCR:BandooCore.ResourcesMngr.1: Family Name: Win32.PUP.Bandoo
Engine: 1 Clean status: Success Item ID: 5367044 Family ID: 5366997
>>> Description: HKCR:BandooCore.SettingsMngr: Family Name: Win32.PUP.Bandoo
Engine: 1 Clean status: Success Item ID: 5367045 Family ID: 5366997
>>> Description: HKCR:BandooCore.SettingsMngr.1: Family Name: Win32.PUP.Bandoo
Engine: 1 Clean status: Success Item ID: 5367046 Family ID: 5366997
>>> Description: HKCR:BandooCore.StatisticMngr: Family Name: Win32.PUP.Bandoo
Engine: 1 Clean status: Success Item ID: 5367047 Family ID: 5366997
>>> Description: HKCR:BandooCore.StatisticMngr.1: Family Name: Win32.PUP.Bandoo
Engine: 1 Clean status: Success Item ID: 5367048 Family ID: 5366997
>>> Description: HKCR:CLSID\{27F69C85-64E1-43CE-98B5-3C9F22FB408E}: Family
Name: Win32.PUP.Bandoo Engine: 1 Clean status: Success Item ID: 5367054 Family ID:
5366997
>>> Description: HKCR:CLSID\{B543EF05-9758-464E-9F37-4C28525B4A4C}: Family
Name: Win32.PUP.Bandoo Engine: 1 Clean status: Success Item ID: 5367059 Family ID:
5366997
>>> Description: HKCR:CLSID\{BB76A90B-2B4C-4378-8506-9A2B6E16943C}: Family
Name: Win32.PUP.Bandoo Engine: 1 Clean status: Success Item ID: 5367060 Family ID:
5366997
>>> Description: HKCR:CLSID\{C3AB94A4-BFD0-4BBA-A331-DE504F07D2DB}:
Family Name: Win32.PUP.Bandoo Engine: 1 Clean status: Success Item ID: 5367061 Family
ID: 5366997
>>> Description: HKCR:Interface\{477F210A-2A86-4666-9C4B-1189634D2C84}: Family
Name: Win32.PUP.Bandoo Engine: 1 Clean status: Success Item ID: 5367069 Family ID:
5366997
>>> Description: HKCR:TypeLib\{8F5F1CB6-EA9E-40AF-A5CA-C7FD63CC1971}:
Family Name: Win32.PUP.Bandoo Engine: 1 Clean status: Success Item ID: 5367073 Family
ID: 5366997
>>>
>>> Scan and cleaning complete: Finished correctly after 19328 seconds
>>>
>>> *********************************** Settings
***********************************
>>>
>>> Scan profile:
>>> ID: full, enabled:1, value: Analyse complète
>>> ID: folderstoscan, enabled:1, value: C:\,E:\
>>> ID: useantivirus, enabled:1, value: true
>>> ID: sections, enabled:1
>>> ID: scancriticalareas, enabled:1, value: true
>>> ID: scanrunningapps, enabled:1, value: true
>>> ID: scanregistry, enabled:1, value: true
>>> ID: scanlsp, enabled:1, value: true
>>> ID: scanads, enabled:1, value: true
>>> ID: scanhostsfile, enabled:1, value: true
>>> ID: scanmru, enabled:1, value: true
>>> ID: scanbrowserhijacks, enabled:1, value: true
>>> ID: scantrackingcookies, enabled:1, value: true
>>>
ID: closebrowsers, enabled:1, value: false
>>> ID: filescanningoptions, enabled:1
>>> ID: archives, enabled:1, value: true
>>> ID: onlyexecutables, enabled:1, value: false
>>> ID: skiplargerthan, enabled:1, value: 20480
>>> ID: scanrootkits, enabled:1, value: true
>>>
ID: rootkitlevel, enabled:1, value: mild, domain: medium,mild,strict
>>> ID: usespywareheuristics, enabled:1, value: true
>>>
>>> Scan global:
>>> ID: global, enabled:1
>>> ID: addtocontextmenu, enabled:1, value: true
>>> ID: playsoundoninfection, enabled:1, value: false
>>> ID: soundfile, enabled:0, value: N/A
>>>
>>> Scheduled scan settings:
>>> <Empty>
>>>
>>> Update settings:
>>> ID: updates, enabled:1
>>> ID: launchthreatworksafterscan, enabled:1, value: silently, domain: normal,off,silently
>>> ID: deffiles, enabled:1, value: downloadandinstall, domain:
dontcheck,downloadandinstall
>>> ID: licenseandinfo, enabled:1, value: downloadandinstall, domain:
dontcheck,downloadandinstall
>>> ID: schedules, enabled:1, value: true
>>> ID: updatedaily1, enabled:1, value: Daily 1
>>>
ID: time, enabled:1, value: Wed Aug 31 13:07:00 2011
>>>
ID: frequency, enabled:1, value: daily, domain:
daily,monthly,once,systemstart,weekly
>>>
ID: weekdays, enabled:1
>>>
ID: monday, enabled:1, value: false
>>>
ID: tuesday, enabled:1, value: false
>>>
ID: wednesday, enabled:1, value: false
>>>
ID: thursday, enabled:1, value: false
>>>
ID: friday, enabled:1, value: false
>>>
ID: saturday, enabled:1, value: false
>>>
ID: sunday, enabled:1, value: false
>>>
ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31
>>>
ID: scanprofile, enabled:1, value:
>>>
ID: auto_deal_with_infections, enabled:1, value: false
>>> ID: updatedaily2, enabled:1, value: Daily 2
>>>
ID: time, enabled:1, value: Wed Aug 31 19:07:00 2011
>>>
ID: frequency, enabled:1, value: daily, domain:
daily,monthly,once,systemstart,weekly
>>>
ID: weekdays, enabled:1
>>>
ID: monday, enabled:1, value: false
>>>
ID: tuesday, enabled:1, value: false
>>>
ID: wednesday, enabled:1, value: false
>>>
ID: thursday, enabled:1, value: false
>>>
ID: friday, enabled:1, value: false
>>>
ID: saturday, enabled:1, value: false
>>>
ID: sunday, enabled:1, value: false
>>>
ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31
>>>
ID: scanprofile, enabled:1, value:
>>>
ID: auto_deal_with_infections, enabled:1, value: false
>>> ID: updatedaily3, enabled:1, value: Daily 3
>>>
ID: time, enabled:1, value: Wed Aug 31 01:07:00 2011
>>>
ID: frequency, enabled:1, value: daily, domain:
daily,monthly,once,systemstart,weekly
>>>
ID: weekdays, enabled:1
>>>
ID: monday, enabled:1, value: false
>>>
ID: tuesday, enabled:1, value: false
>>>
ID: wednesday, enabled:1, value: false
>>>
ID: thursday, enabled:1, value: false
>>>
ID: friday, enabled:1, value: false
>>>
ID: saturday, enabled:1, value: false
>>>
ID: sunday, enabled:1, value: false
>>>
ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31
>>>
ID: scanprofile, enabled:1, value:
>>>
ID: auto_deal_with_infections, enabled:1, value: false
>>> ID: updatedaily4, enabled:1, value: Daily 4
>>>
ID: time, enabled:1, value: Wed Aug 31 07:07:00 2011
>>>
ID: frequency, enabled:1, value: daily, domain:
daily,monthly,once,systemstart,weekly
>>>
ID: weekdays, enabled:1
>>>
ID: monday, enabled:1, value: false
>>>
ID: tuesday, enabled:1, value: false
>>>
ID: wednesday, enabled:1, value: false
>>>
ID: thursday, enabled:1, value: false
>>>
ID: friday, enabled:1, value: false
>>>
ID: saturday, enabled:1, value: false
>>>
ID: sunday, enabled:1, value: false
>>>
ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31
>>>
ID: scanprofile, enabled:1, value:
>>>
ID: auto_deal_with_infections, enabled:1, value: false
>>> ID: updateweekly1, enabled:1, value: Weekly
>>>
ID: time, enabled:1, value: Wed Aug 31 13:07:00 2011
>>>
ID: frequency, enabled:1, value: weekly, domain:
daily,monthly,once,systemstart,weekly
>>>
ID: weekdays, enabled:1
>>>
ID: monday, enabled:1, value: false
>>>
ID: tuesday, enabled:1, value: false
>>>
ID: wednesday, enabled:1, value: true
>>>
ID: thursday, enabled:1, value: false
>>>
ID: friday, enabled:1, value: false
>>>
ID: saturday, enabled:1, value: true
>>>
ID: sunday, enabled:1, value: false
>>>
ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31
>>>
ID: scanprofile, enabled:1, value:
>>>
ID: auto_deal_with_infections, enabled:1, value: false
>>>
>>> Appearance settings:
>>> ID: appearance, enabled:1
>>> ID: skin, enabled:1, value: default.egl, reglocation:
HKEY_LOCAL_MACHINE\SOFTWARE\Lavasoft\Ad-Aware\Resource
>>> ID: showtrayicon, enabled:1, value: true
>>> ID: autoentertainmentmode, enabled:1, value: true
>>> ID: guimode, enabled:1, value: mode_simple, domain: mode_advanced,mode_simple
>>> ID: language, enabled:1, value: fr, reglocation:
HKEY_LOCAL_MACHINE\SOFTWARE\Lavasoft\Ad-Aware\Language
>>>
>>> Realtime protection settings:
>>> ID: realtime, enabled:1
>>> ID: infomessages, enabled:1, value: onlyimportant, domain:
display,dontnotify,onlyimportant
>>> ID: modules, enabled:1
>>> ID: processprotection, enabled:1, value: true
>>> ID: onaccessprotection, enabled:1, value: true
>>> ID: registryprotection, enabled:1, value: true
>>> ID: networkprotection, enabled:1, value: true
>>> ID: layers, enabled:1
>>> ID: useantivirus, enabled:1, value: true
>>> ID: usespywareheuristics, enabled:1, value: true
>>> ID: maintainbackup, enabled:1, value: true
>>>
>>>
>>> ****************************** System information
******************************
>>> Computer name: 00010101010100
>>> Processor name: Intel(R) Core(TM)2 Duo CPU T7250 @ 2.00GHz
>>> Processor identifier: x86 Family 6 Model 15 Stepping 13
>>> Processor speed: ~1995MHZ
>>> Raw info: processorarchitecture 0, processortype 586, processorlevel 6, processor
revision 3853, number of processors 2, processor features: [MMX,SSE,SSE2]
>>> Physical memory available: 886861824 bytes
>>> Physical memory total: 2145759232 bytes
>>> Virtual memory available: 1492623360 bytes
>>> Virtual memory total: 2147352576 bytes
>>> Memory load: 58%
>>> Microsoft Windows XP Professional Service Pack 3 (build 2600)
>>> Windows startup mode:
>>>
>>> Running processes:
>>> PID: 616 name: \SystemRoot\System32\smss.exe owner: SYSTEM domain: AUTORITE
NT
>>> PID: 1092 name: C:\WINDOWS\system32\csrss.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1132 name: C:\WINDOWS\system32\winlogon.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1188 name: C:\WINDOWS\system32\services.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1200 name: C:\WINDOWS\system32\lsass.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1396 name: C:\WINDOWS\system32\Ati2evxx.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1416 name: C:\WINDOWS\system32\svchost.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1516 name: C:\WINDOWS\system32\svchost.exe owner: SERVICE RÉSEAU
domain: AUTORITE NT
>>> PID: 716 name: C:\WINDOWS\System32\svchost.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 656 name: C:\Program Files\Intel\WiFi\bin\S24EvMon.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 776 name: C:\WINDOWS\system32\svchost.exe owner: SERVICE RÉSEAU
domain: AUTORITE NT
>>> PID: 1756 name: C:\WINDOWS\system32\ZoneLabs\vsmon.exe owner: <UNKNOWN>
domain: <UNKNOWN>
>>> PID: 1972 name: C:\WINDOWS\system32\Ati2evxx.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 448 name: C:\Program Files\CheckPoint\ZAForceField\IswSvc.exe owner:
<UNKNOWN> domain: <UNKNOWN>
>>> PID: 564 name: C:\WINDOWS\system32\spoolsv.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1100 name: C:\WINDOWS\system32\wbem\unsecapp.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 1708 name: C:\WINDOWS\system32\wbem\wmiprvse.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 2524 name: C:\Program Files\CheckPoint\ZAForceField\ForceField.exe owner:
<UNKNOWN> domain: <UNKNOWN>
>>> PID: 3768 name: C:\Program Files\Fichiers communs\Apple\Mobile Device
Support\AppleMobileDeviceService.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 3816 name: C:\Program Files\AVG\AVG10\avgwdsvc.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 2140 name: C:\Program Files\Bonjour\mDNSResponder.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 3388 name: C:\Program Files\PC Tools Security\BDT\BDTUpdateService.exe
owner: SYSTEM domain: AUTORITE NT
>>> PID: 3028 name: C:\Program Files\Motorola\SMSERIAL\sm56hlpr.exe owner: amer
domain: 00010101010100
>>> PID: 3040 name: C:\WINDOWS\System32\svchost.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 3048 name: C:\Program Files\Intel\Intel(R) Rapid Storage
Technology\IAStorIcon.exe owner: amer domain: 00010101010100
>>> PID: 3140 name: C:\Program Files\Intel\WiFi\bin\ZCfgSvc.exe owner: amer domain:
00010101010100
>>> PID: 2616 name: C:\Program Files\Fichiers
communs\Intel\WirelessCommon\iFrmewrk.exe owner: amer domain: 00010101010100
>>> PID: 3288 name: C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe owner:
<UNKNOWN> domain: <UNKNOWN>
>>> PID: 3300 name: C:\Program Files\Intel\WiFi\bin\EvtEng.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 4040 name: C:\Program Files\AVG\AVG10\avgtray.exe owner: amer domain:
00010101010100
>>> PID: 688 name: C:\WINDOWS\system32\hasplms.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1080 name: C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe owner:
amer domain: 00010101010100
>>> PID: 1832 name: C:\Program Files\AVG\AVG10\avgnsx.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1932 name: C:\Program Files\PC Tools Security\BDT\FGuard.exe owner: amer
domain: 00010101010100
>>> PID: 2068 name: C:\WINDOWS\system32\ctfmon.exe owner: amer domain:
00010101010100
>>> PID: 1692 name: C:\Program Files\Spybot - Search & Destroy2\TeaTimer.exe owner:
amer domain: 00010101010100
>>> PID: 4080 name: C:\Program Files\Intel\Intel(R) Rapid Storage
Technology\IAStorDataMgrSvc.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 2564 name: C:\WINDOWS\system32\wbem\unsecapp.exe owner: amer domain:
00010101010100
>>> PID: 3540 name: C:\Program Files\Ralink\Common\RaUI.exe owner: amer domain:
00010101010100
>>> PID: 3576 name: C:\Program Files\Fichiers communs\InstallShield
Shared\Service\InstallShield Licensing Service.exe owner: SYSTEM domain: AUTORITE
NT
>>> PID: 2372 name: C:\Program Files\Java\jre6\bin\jqs.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1292 name: C:\Program Files\AVG\AVG10\Identity
Protection\agent\bin\avgidsmonitor.exe owner: amer domain: 00010101010100
>>> PID: 2504 name: C:\Program Files\adobs\msats.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 2312 name: C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
owner: SYSTEM domain: AUTORITE NT
>>> PID: 340 name: C:\Program Files\Ralink\Common\RaRegistry.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 2684 name: C:\Program Files\Fichiers
communs\Intel\WirelessCommon\RegSrvc.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 3788 name: C:\WINDOWS\system32\svchost.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 2088 name: C:\Documents and Settings\All Users\Application
Data\UltraVNC\winvnc.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 832 name: C:\Program Files\VMware\VMware Workstation\vmware-authd.exe
owner: SYSTEM domain: AUTORITE NT
>>> PID: 2980 name: C:\Program Files\Common Files\VMware\USB\vmwareusbarbitrator.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 4856 name: C:\WINDOWS\system32\vmnat.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 5460 name: C:\WINDOWS\system32\vmnetdhcp.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 4320 name: C:\Program Files\AVG\AVG10\Identity
Protection\Agent\Bin\AVGIDSAgent.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 4568 name: C:\Documents and Settings\All Users\Application
Data\UltraVNC\winvnc.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 5400 name: C:\WINDOWS\system32\svchost.exe owner: SERVICE LOCAL
domain: AUTORITE NT
>>> PID: 5576 name: C:\WINDOWS\System32\alg.exe owner: SERVICE LOCAL domain:
AUTORITE NT
>>> PID: 4264 name: C:\Program Files\AVG\AVG10\avgrsx.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 5868 name: C:\Program Files\AVG\AVG10\avgcsrvx.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 2584 name: C:\Program Files\AVG\AVG10\avgchsvx.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 5924 name: C:\WINDOWS\explorer.exe owner: amer domain: 00010101010100
>>> PID: 3872 name: C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe owner:
SYSTEM domain: AUTORITE NT
>>> PID: 3952 name: C:\Program Files\Lavasoft\Ad-Aware\Ad-Aware.exe owner: amer
domain: 00010101010100
>>> PID: 4384 name: C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe owner: amer
domain: 00010101010100
>>>
>>> Startup items:
>>> Name: {438755C2-A8BA-11D1-B96B-00A0C90312E1}
>>>
imagepath: Pré-chargeur Browseui
>>> Name: {8C7461EF-2B13-11d2-BE35-3078302C2030}
>>>
imagepath: Démon de cache des catégories de composant
>>> Name: Config
>>>
imagepath: %systemroot%\system32\run.cmd
>>> Name: nlsf
>>>
imagepath: cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll"
"%SystemRoot%\System32\syssetup.dll"
>>> Name: tscuninstall
>>>
imagepath: %systemroot%\system32\tscupgrd.exe
>>> Name: PostBootReminder
>>>
imagepath: {7849596a-48ea-486e-8937-a2a3009f31a9}
>>> Name: CDBurn
>>>
imagepath: {fbeb8a05-beee-4442-804e-409d6c4515e9}
>>> Name: WebCheck
>>>
imagepath: {E6FB5E20-DE35-11CF-9C87-00AA005127ED}
>>> Name: SysTray
>>>
imagepath: {35CEC8A3-2BE6-11D2-8773-92E220524153}
>>> Name: WPDShServiceObj
>>>
imagepath: {AAA288BA-9A4C-45B0-95D7-94D524869DB5}
>>> Name: SMSERIAL
>>>
imagepath: C:\Program Files\Motorola\SMSERIAL\sm56hlpr.exe
>>> Name: IAStorIcon
>>>
imagepath: C:\Program Files\Intel\Intel(R) Rapid Storage
Technology\IAStorIcon.exe
>>> Name: AppleSyncNotifier
>>>
imagepath: C:\Program Files\Fichiers communs\Apple\Mobile Device
Support\AppleSyncNotifier.exe
>>> Name: IntelZeroConfig
>>>
imagepath: "C:\Program Files\Intel\WiFi\bin\ZCfgSvc.exe"
>>> Name: IntelWireless
>>>
imagepath: "C:\Program Files\Fichiers
communs\Intel\WirelessCommon\iFrmewrk.exe" /tf Intel Wireless Tray
>>> Name: ZoneAlarm Client
>>>
imagepath: "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
>>> Name: ISW
>>>
imagepath: "C:\Program Files\CheckPoint\ZAForceField\ForceField.exe"
/icon="hidden"
>>> Name: BrMfcWnd
>>>
imagepath: C:\Program Files\Brother\Brmfcmon\BrMfcWnd.exe /AUTORUN
>>> Name: ControlCenter3
>>>
imagepath: C:\Program Files\Brother\ControlCenter3\brctrcen.exe /autorun
>>> Name: Adobe Reader Speed Launcher
>>>
imagepath: "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
>>> Name: Adobe ARM
>>>
imagepath: "C:\Program Files\Fichiers
communs\Adobe\ARM\1.0\AdobeARM.exe"
>>> Name: DivXUpdate
>>>
imagepath: "C:\Program Files\DivX\DivX Update\DivXUpdate.exe"
/CHECKNOW
>>> Name: LifeCam
>>>
imagepath: "C:\Program Files\Microsoft LifeCam\LifeExp.exe"
>>> Name: QuickTime Task
>>>
imagepath: "C:\Program Files\QuickTime\QTTask.exe" -atboottime
>>> Name: AVG_TRAY
>>>
imagepath: C:\Program Files\AVG\AVG10\avgtray.exe
>>> Name:
>>>
imagepath: C:\Documents and Settings\All Users\Menu
Démarrer\Programmes\Démarrage\desktop.ini
>>> Name:
>>>
location: C:\Documents and Settings\All Users\Menu
Démarrer\Programmes\Démarrage\Microsoft Office.lnk
>>>
imagepath: C:\Program Files\Microsoft Office\Office10\OSA.EXE
>>> Name:
>>>
location: C:\Documents and Settings\All Users\Menu
Démarrer\Programmes\Démarrage\PalTalk.lnk
>>>
imagepath: C:\Program Files\Paltalk Messenger\paltalk.exe
>>> Name:
>>>
location: C:\Documents and Settings\All Users\Menu
Démarrer\Programmes\Démarrage\Ralink Wireless Utility.lnk
>>>
imagepath: C:\Program Files\Ralink\Common\RaUI.exe
>>> Name:
>>>
imagepath: C:\Documents and Settings\amer\Menu
Démarrer\Programmes\Démarrage\desktop.ini
>>> Name:
>>>
location: C:\Documents and Settings\amer\Menu
Démarrer\Programmes\Démarrage\MagicDisc.lnk
>>>
imagepath: C:\Program Files\MagicDisc\MagicDisc.exe
>>>
>>> Bootexecute items:
>>> Name:
>>>
imagepath: autocheck autochk *
>>> Name:
>>>
imagepath: C:\PROGRA~1\AVG\AVG10\avgchsvx.exe /sync
>>> Name:
>>>
imagepath: C:\PROGRA~1\AVG\AVG10\avgrsx.exe /sync /restart
>>> Name:
>>>
imagepath: lsdelete
>>>
>>> Running services:
>>> Name: ALG
>>>
displayname: Service de la passerelle de la couche Application
>>> Name: Apple Mobile Device
>>>
displayname: Apple Mobile Device
>>> Name: Ati HotKey Poller
>>>
displayname: Ati HotKey Poller
>>> Name: AudioSrv
>>>
displayname: Audio Windows
>>> Name: AVGIDSAgent
>>>
displayname: AVGIDSAgent
>>> Name: avgwd
>>>
displayname: AVG WatchDog
>>> Name: BITS
>>>
displayname: Service de transfert intelligent en arrière-plan
>>> Name: Bonjour Service
>>>
displayname: Service Bonjour
>>> Name: Browser
>>>
displayname: Explorateur d'ordinateur
>>> Name: Browser Defender Update Service
>>>
displayname: Browser Defender Update Service
>>> Name: CryptSvc
>>>
displayname: CryptSvc
>>> Name: DcomLaunch
>>>
displayname: Lanceur de processus serveur DCOM
>>> Name: Dhcp
>>>
displayname: Client DHCP
>>> Name: Dnscache
>>>
displayname: Client DNS
>>> Name: EapHost
>>>
displayname: Service Protocole EAP (Extensible Authentication Protocol)
>>> Name: ERSvc
>>>
displayname: Service de rapport d'erreurs
>>> Name: Eventlog
>>>
displayname: Journal des événements
>>> Name: EventSystem
>>>
displayname: Système d'événements de COM+
>>> Name: EvtEng
>>>
displayname: Intel(R) PROSet/Wireless Event Log
>>> Name: FastUserSwitchingCompatibility
>>>
displayname: Compatibilité avec le Changement rapide d'utilisateur
>>> Name: hasplms
>>>
displayname: HASP License Manager
>>> Name: helpsvc
>>>
displayname: Aide et support
>>> Name: IAStorDataMgrSvc
>>>
displayname: Intel(R) Rapid Storage Technology
>>> Name: InstallShield Licensing Service
>>>
displayname: InstallShield Licensing Service
>>> Name: IswSvc
>>>
displayname: ZoneAlarm Toolbar IswSvc
>>> Name: JavaQuickStarterService
>>>
displayname: Java Quick Starter
>>> Name: lanmanserver
>>>
displayname: Serveur
>>> Name: lanmanworkstation
>>>
displayname: Station de travail
>>> Name: Lavasoft Ad-Aware Service
>>>
displayname: Lavasoft Ad-Aware Service
>>> Name: Log Events
>>>
displayname: Log Events
>>> Name: MBAMService
>>>
displayname: MBAMService
>>> Name: Netman
>>>
displayname: Connexions réseau
>>> Name: Nla
>>>
displayname: NLA (Network Location Awareness)
>>> Name: NWCWorkstation
>>>
displayname: Service client pour NetWare
>>> Name: PlugPlay
>>>
displayname: Plug-and-Play
>>> Name: ProtectedStorage
>>>
displayname: Emplacement protégé
>>> Name: RalinkRegistryWriter
>>>
displayname: Ralink Registry Writer
>>> Name: RasMan
>>>
displayname: Gestionnaire de connexions d'accès distant
>>> Name: RegSrvc
>>>
displayname: Intel(R) PROSet/Wireless Registry Service
>>> Name: RpcSs
>>>
displayname: Appel de procédure distante (RPC)
>>> Name: S24EventMonitor
>>>
displayname: Intel(R) PROSet/Wireless WiFi Service
>>> Name: SamSs
>>>
displayname: Gestionnaire de comptes de sécurité
>>> Name: Schedule
>>>
displayname: Planificateur de tâches
>>> Name: seclogon
>>>
displayname: Secondary Logon
>>> Name: SENS
>>>
displayname: Notification d'événement système
>>> Name: SharedAccess
>>>
displayname: Pare-feu Windows / Partage de connexion Internet
>>> Name: ShellHWDetection
>>>
displayname: Détection matériel noyau
>>> Name: Spooler
>>>
displayname: Spouleur d'impression
>>> Name: srservice
>>>
displayname: Service de restauration système
>>> Name: SSDPSRV
>>>
displayname: Service de découvertes SSDP
>>> Name: stisvc
>>>
displayname: Acquisition d'image Windows (WIA)
>>> Name: TapiSrv
>>>
displayname: Téléphonie
>>> Name: TermService
>>>
displayname: Services Terminal Server
>>> Name: Themes
>>>
displayname: Thèmes
>>> Name: uvnc_service
>>>
displayname: UltraVNC Server
>>> Name: VMAuthdService
>>>
displayname: VMware Authorization Service
>>> Name: VMnetDHCP
>>>
displayname: VMware DHCP Service
>>> Name: VMUSBArbService
>>>
displayname: VMware USB Arbitration Service
>>> Name: VMware NAT Service
>>>
displayname: VMware NAT Service
>>> Name: vsmon
>>>
displayname: TrueVector Internet Monitor
>>> Name: W32Time
>>>
displayname: Horloge Windows
>>> Name: winmgmt
>>>
displayname: Infrastructure de gestion Windows
>>> Name: wscsvc
>>>
displayname: Centre de sécurité
>>> Name: wuauserv
>>>
displayname: Mises à jour automatiques
>>>
>>>
MSG [0476] 2011/10/10 12:15:22: Configure new scan with profile: smart
MSG [0476] 2011/10/10 12:15:22: -> scanning critical objects
MSG [0476] 2011/10/10 12:15:22: -> scanning running processes
MSG [0476] 2011/10/10 12:15:22: -> scanning registry
MSG [0476] 2011/10/10 12:15:22: -> scanning lsp
MSG [0476] 2011/10/10 12:15:22: -> scanning browser hijacks
MSG [0476] 2011/10/10 12:15:22: -> scanning cookies
MSG [0476] 2011/10/10 12:15:22: -> neutralizing rootkits
MSG [0476] 2011/10/10 12:15:22: -> use mild rootkit detection
MSG [0476] 2011/10/10 12:15:22: -> use spyware heuristics
MSG [0476] 2011/10/10 12:15:22: -> use medium heuristics
MSG [0476] 2011/10/10 12:15:22: -> scan only executables
MSG [0476] 2011/10/10 12:15:22: -> file size limit = 20480 kB (0 = unlimited)
MSG [0476] 2011/10/10 12:15:22: -> validating system critical files
ERR [0476] 2011/10/10 12:15:23: SDKController::GetInfectionList -> Not in found
infections state
ERR [0476] 2011/10/10 12:15:23: SDKController::GetDefinitonsFileVersion -> Not in idle
state
ERR [0476] 2011/10/10 12:15:23: SDKController::GetLatestSuccessfulScanReportHeader ->
Not in idle state
ERR [0476] 2011/10/10 12:15:23: SDKController::GetLatestSuccessfulScanReportHeader ->
Not in idle state
ERR [0476] 2011/10/10 12:15:23: SDKController::GetLatestSuccessfulScanReportHeader ->
Not in idle state
MSG [0476] 2011/10/10 12:15:25: Stopping scan...
MSG [0476] 2011/10/10 12:15:27: Stopping scan...
MSG [0476] 2011/10/10 12:15:27: Stopping scan...
MSG [0476] 2011/10/10 12:15:28: Stopping scan...
MSG [0476] 2011/10/10 12:15:28: Stopping scan...
MSG [0476] 2011/10/10 12:15:28: Stopping scan...
MSG [0476] 2011/10/10 12:15:28: Stopping scan...
MSG [0476] 2011/10/10 12:15:29: Stopping scan...
MSG [0476] 2011/10/10 12:15:29: Stopping scan...
MSG [0476] 2011/10/10 12:15:29: Stopping scan...
MSG [0476] 2011/10/10 12:15:29: Stopping scan...
MSG [0476] 2011/10/10 12:15:30: Stopping scan...
MSG [0476] 2011/10/10 12:15:30: Stopping scan...
MSG [0476] 2011/10/10 12:15:30: Stopping scan...
MSG [0476] 2011/10/10 12:15:30: Stopping scan...
MSG [0476] 2011/10/10 12:15:31: Stopping scan...
MSG [0476] 2011/10/10 12:15:31: Stopping scan...
MSG [0476] 2011/10/10 12:15:31: Stopping scan...
MSG [2716] 2011/10/10 12:15:34: Scan was requested to stop after 11 seconds
MSG [2716] 2011/10/10 12:15:34: Objects processed: 3, infections detected: 0
MSG [0476] 2011/10/10 12:15:34: Dumping scan report:
>>> Logfile created: 10/10/2011 12:15:23
>>> Ad-Aware version: 9.5.1
>>> Extended engine: 3
>>> Extended engine version: 3.1.2770
>>> User performing scan: amer
>>>
>>> *********************** Definitions database information
***********************
>>> Lavasoft definition file: 150.590
>>> Genotype definition file version: 2011/09/21 13:56:01
>>> Extended engine definition file: 10715.0
>>>
>>> ******************************** Scan results:
*********************************
>>> Scan profile name: Analyse intelligente (ID: smart)
>>> Objects scanned: 3
>>> Objects detected: 0
>>>
>>>
>>> Type
Detected
>>> ==========================
>>> Processes.......:
0
>>> Registry entries:
0
>>> Hostfile entries:
0
>>> Files...........:
0
>>> Folders.........:
0
>>> LSPs............:
0
>>> Cookies.........:
0
>>> Browser hijacks.:
0
>>> MRU objects.....:
0
>>>
>>>
>>>
>>> Scan and cleaning complete: Stopped by request after 11 seconds
>>>
>>> *********************************** Settings
***********************************
>>>
>>> Scan profile:
>>> ID: smart, enabled:1, value: Analyse intelligente
>>> ID: folderstoscan, enabled:1, value:
>>> ID: useantivirus, enabled:1, value: true
>>> ID: sections, enabled:1
>>> ID: scancriticalareas, enabled:1, value: true
>>> ID: scanrunningapps, enabled:1, value: true
>>> ID: scanregistry, enabled:1, value: true
>>> ID: scanlsp, enabled:1, value: true
>>> ID: scanads, enabled:1, value: false
>>> ID: scanhostsfile, enabled:1, value: false
>>> ID: scanmru, enabled:1, value: false
>>> ID: scanbrowserhijacks, enabled:1, value: true
>>> ID: scantrackingcookies, enabled:1, value: true
>>>
ID: closebrowsers, enabled:1, value: false
>>> ID: filescanningoptions, enabled:1
>>> ID: archives, enabled:1, value: false
>>> ID: onlyexecutables, enabled:1, value: true
>>> ID: skiplargerthan, enabled:1, value: 20480
>>> ID: scanrootkits, enabled:1, value: true
>>>
ID: rootkitlevel, enabled:1, value: mild, domain: medium,mild,strict
>>> ID: usespywareheuristics, enabled:1, value: true
>>>
>>> Scan global:
>>> ID: global, enabled:1
>>> ID: addtocontextmenu, enabled:1, value: true
>>> ID: playsoundoninfection, enabled:1, value: false
>>> ID: soundfile, enabled:0, value: N/A
>>>
>>> Scheduled scan settings:
>>> <Empty>
>>>
>>> Update settings:
>>> ID: updates, enabled:1
>>> ID: launchthreatworksafterscan, enabled:1, value: silently, domain: normal,off,silently
>>> ID: deffiles, enabled:1, value: downloadandinstall, domain:
dontcheck,downloadandinstall
>>> ID: licenseandinfo, enabled:1, value: downloadandinstall, domain:
dontcheck,downloadandinstall
>>> ID: schedules, enabled:1, value: true
>>> ID: updatedaily1, enabled:1, value: Daily 1
>>>
ID: time, enabled:1, value: Wed Aug 31 13:07:00 2011
>>>
ID: frequency, enabled:1, value: daily, domain:
daily,monthly,once,systemstart,weekly
>>>
ID: weekdays, enabled:1
>>>
ID: monday, enabled:1, value: false
>>>
ID: tuesday, enabled:1, value: false
>>>
ID: wednesday, enabled:1, value: false
>>>
ID: thursday, enabled:1, value: false
>>>
ID: friday, enabled:1, value: false
>>>
ID: saturday, enabled:1, value: false
>>>
ID: sunday, enabled:1, value: false
>>>
ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31
>>>
ID: scanprofile, enabled:1, value:
>>>
ID: auto_deal_with_infections, enabled:1, value: false
>>> ID: updatedaily2, enabled:1, value: Daily 2
>>>
ID: time, enabled:1, value: Wed Aug 31 19:07:00 2011
>>>
ID: frequency, enabled:1, value: daily, domain:
daily,monthly,once,systemstart,weekly
>>>
ID: weekdays, enabled:1
>>>
ID: monday, enabled:1, value: false
>>>
ID: tuesday, enabled:1, value: false
>>>
ID: wednesday, enabled:1, value: false
>>>
ID: thursday, enabled:1, value: false
>>>
ID: friday, enabled:1, value: false
>>>
ID: saturday, enabled:1, value: false
>>>
ID: sunday, enabled:1, value: false
>>>
ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31
>>>
ID: scanprofile, enabled:1, value:
>>>
ID: auto_deal_with_infections, enabled:1, value: false
>>> ID: updatedaily3, enabled:1, value: Daily 3
>>>
ID: time, enabled:1, value: Wed Aug 31 01:07:00 2011
>>>
ID: frequency, enabled:1, value: daily, domain:
daily,monthly,once,systemstart,weekly
>>>
ID: weekdays, enabled:1
>>>
ID: monday, enabled:1, value: false
>>>
ID: tuesday, enabled:1, value: false
>>>
ID: wednesday, enabled:1, value: false
>>>
ID: thursday, enabled:1, value: false
>>>
ID: friday, enabled:1, value: false
>>>
ID: saturday, enabled:1, value: false
>>>
ID: sunday, enabled:1, value: false
>>>
ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31
>>>
ID: scanprofile, enabled:1, value:
>>>
ID: auto_deal_with_infections, enabled:1, value: false
>>> ID: updatedaily4, enabled:1, value: Daily 4
>>>
ID: time, enabled:1, value: Wed Aug 31 07:07:00 2011
>>>
ID: frequency, enabled:1, value: daily, domain:
daily,monthly,once,systemstart,weekly
>>>
ID: weekdays, enabled:1
>>>
ID: monday, enabled:1, value: false
>>>
ID: tuesday, enabled:1, value: false
>>>
ID: wednesday, enabled:1, value: false
>>>
ID: thursday, enabled:1, value: false
>>>
ID: friday, enabled:1, value: false
>>>
ID: saturday, enabled:1, value: false
>>>
ID: sunday, enabled:1, value: false
>>>
ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31
>>>
ID: scanprofile, enabled:1, value:
>>>
ID: auto_deal_with_infections, enabled:1, value: false
>>> ID: updateweekly1, enabled:1, value: Weekly
>>>
ID: time, enabled:1, value: Wed Aug 31 13:07:00 2011
>>>
ID: frequency, enabled:1, value: weekly, domain:
daily,monthly,once,systemstart,weekly
>>>
ID: weekdays, enabled:1
>>>
ID: monday, enabled:1, value: false
>>>
ID: tuesday, enabled:1, value: false
>>>
ID: wednesday, enabled:1, value: true
>>>
ID: thursday, enabled:1, value: false
>>>
ID: friday, enabled:1, value: false
>>>
ID: saturday, enabled:1, value: true
>>>
ID: sunday, enabled:1, value: false
>>>
ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31
>>>
ID: scanprofile, enabled:1, value:
>>>
ID: auto_deal_with_infections, enabled:1, value: false
>>>
>>> Appearance settings:
>>> ID: appearance, enabled:1
>>> ID: skin, enabled:1, value: default.egl, reglocation:
HKEY_LOCAL_MACHINE\SOFTWARE\Lavasoft\Ad-Aware\Resource
>>> ID: showtrayicon, enabled:1, value: true
>>> ID: autoentertainmentmode, enabled:1, value: true
>>> ID: guimode, enabled:1, value: mode_simple, domain: mode_advanced,mode_simple
>>> ID: language, enabled:1, value: fr, reglocation:
HKEY_LOCAL_MACHINE\SOFTWARE\Lavasoft\Ad-Aware\Language
>>>
>>> Realtime protection settings:
>>> ID: realtime, enabled:1
>>> ID: infomessages, enabled:1, value: onlyimportant, domain:
display,dontnotify,onlyimportant
>>> ID: modules, enabled:1
>>> ID: processprotection, enabled:1, value: true
>>> ID: onaccessprotection, enabled:1, value: true
>>> ID: registryprotection, enabled:1, value: true
>>> ID: networkprotection, enabled:1, value: true
>>> ID: layers, enabled:1
>>> ID: useantivirus, enabled:1, value: true
>>> ID: usespywareheuristics, enabled:1, value: true
>>> ID: maintainbackup, enabled:1, value: true
>>>
>>>
>>> ****************************** System information
******************************
>>> Computer name: 00010101010100
>>> Processor name: Intel(R) Core(TM)2 Duo CPU T7250 @ 2.00GHz
>>> Processor identifier: x86 Family 6 Model 15 Stepping 13
>>> Processor speed: ~1995MHZ
>>> Raw info: processorarchitecture 0, processortype 586, processorlevel 6, processor
revision 3853, number of processors 2, processor features: [MMX,SSE,SSE2]
>>> Physical memory available: 1122627584 bytes
>>> Physical memory total: 2145759232 bytes
>>> Virtual memory available: 1115025408 bytes
>>> Virtual memory total: 2147352576 bytes
>>> Memory load: 47%
>>> Microsoft Windows XP Professional Service Pack 3 (build 2600)
>>> Windows startup mode:
>>>
>>> Running processes:
>>> PID: 616 name: \SystemRoot\System32\smss.exe owner: SYSTEM domain: AUTORITE
NT
>>> PID: 1092 name: C:\WINDOWS\system32\csrss.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1132 name: C:\WINDOWS\system32\winlogon.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1188 name: C:\WINDOWS\system32\services.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1200 name: C:\WINDOWS\system32\lsass.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1396 name: C:\WINDOWS\system32\Ati2evxx.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1416 name: C:\WINDOWS\system32\svchost.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1516 name: C:\WINDOWS\system32\svchost.exe owner: SERVICE RÉSEAU
domain: AUTORITE NT
>>> PID: 716 name: C:\WINDOWS\System32\svchost.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 656 name: C:\Program Files\Intel\WiFi\bin\S24EvMon.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 776 name: C:\WINDOWS\system32\svchost.exe owner: SERVICE RÉSEAU
domain: AUTORITE NT
>>> PID: 1756 name: C:\WINDOWS\system32\ZoneLabs\vsmon.exe owner: <UNKNOWN>
domain: <UNKNOWN>
>>> PID: 1972 name: C:\WINDOWS\system32\Ati2evxx.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 448 name: C:\Program Files\CheckPoint\ZAForceField\IswSvc.exe owner:
<UNKNOWN> domain: <UNKNOWN>
>>> PID: 564 name: C:\WINDOWS\system32\spoolsv.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1100 name: C:\WINDOWS\system32\wbem\unsecapp.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 1708 name: C:\WINDOWS\system32\wbem\wmiprvse.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 2524 name: C:\Program Files\CheckPoint\ZAForceField\ForceField.exe owner:
<UNKNOWN> domain: <UNKNOWN>
>>> PID: 3768 name: C:\Program Files\Fichiers communs\Apple\Mobile Device
Support\AppleMobileDeviceService.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 3816 name: C:\Program Files\AVG\AVG10\avgwdsvc.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 2140 name: C:\Program Files\Bonjour\mDNSResponder.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 3388 name: C:\Program Files\PC Tools Security\BDT\BDTUpdateService.exe
owner: SYSTEM domain: AUTORITE NT
>>> PID: 3028 name: C:\Program Files\Motorola\SMSERIAL\sm56hlpr.exe owner: amer
domain: 00010101010100
>>> PID: 3040 name: C:\WINDOWS\System32\svchost.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 3048 name: C:\Program Files\Intel\Intel(R) Rapid Storage
Technology\IAStorIcon.exe owner: amer domain: 00010101010100
>>> PID: 3140 name: C:\Program Files\Intel\WiFi\bin\ZCfgSvc.exe owner: amer domain:
00010101010100
>>> PID: 2616 name: C:\Program Files\Fichiers
communs\Intel\WirelessCommon\iFrmewrk.exe owner: amer domain: 00010101010100
>>> PID: 3288 name: C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe owner:
<UNKNOWN> domain: <UNKNOWN>
>>> PID: 3300 name: C:\Program Files\Intel\WiFi\bin\EvtEng.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 4040 name: C:\Program Files\AVG\AVG10\avgtray.exe owner: amer domain:
00010101010100
>>> PID: 688 name: C:\WINDOWS\system32\hasplms.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1080 name: C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe owner:
amer domain: 00010101010100
>>> PID: 1832 name: C:\Program Files\AVG\AVG10\avgnsx.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1932 name: C:\Program Files\PC Tools Security\BDT\FGuard.exe owner: amer
domain: 00010101010100
>>> PID: 2068 name: C:\WINDOWS\system32\ctfmon.exe owner: amer domain:
00010101010100
>>> PID: 1692 name: C:\Program Files\Spybot - Search & Destroy2\TeaTimer.exe owner:
amer domain: 00010101010100
>>> PID: 4080 name: C:\Program Files\Intel\Intel(R) Rapid Storage
Technology\IAStorDataMgrSvc.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 2564 name: C:\WINDOWS\system32\wbem\unsecapp.exe owner: amer domain:
00010101010100
>>> PID: 3540 name: C:\Program Files\Ralink\Common\RaUI.exe owner: amer domain:
00010101010100
>>> PID: 3576 name: C:\Program Files\Fichiers communs\InstallShield
Shared\Service\InstallShield Licensing Service.exe owner: SYSTEM domain: AUTORITE
NT
>>> PID: 2372 name: C:\Program Files\Java\jre6\bin\jqs.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 1292 name: C:\Program Files\AVG\AVG10\Identity
Protection\agent\bin\avgidsmonitor.exe owner: amer domain: 00010101010100
>>> PID: 2504 name: C:\Program Files\adobs\msats.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 2312 name: C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
owner: SYSTEM domain: AUTORITE NT
>>> PID: 340 name: C:\Program Files\Ralink\Common\RaRegistry.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 2684 name: C:\Program Files\Fichiers
communs\Intel\WirelessCommon\RegSrvc.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 3788 name: C:\WINDOWS\system32\svchost.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 2088 name: C:\Documents and Settings\All Users\Application
Data\UltraVNC\winvnc.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 832 name: C:\Program Files\VMware\VMware Workstation\vmware-authd.exe
owner: SYSTEM domain: AUTORITE NT
>>> PID: 2980 name: C:\Program Files\Common Files\VMware\USB\vmwareusbarbitrator.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 4856 name: C:\WINDOWS\system32\vmnat.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 5460 name: C:\WINDOWS\system32\vmnetdhcp.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 4320 name: C:\Program Files\AVG\AVG10\Identity
Protection\Agent\Bin\AVGIDSAgent.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 4568 name: C:\Documents and Settings\All Users\Application
Data\UltraVNC\winvnc.exe owner: SYSTEM domain: AUTORITE NT
>>> PID: 5400 name: C:\WINDOWS\system32\svchost.exe owner: SERVICE LOCAL
domain: AUTORITE NT
>>> PID: 5576 name: C:\WINDOWS\System32\alg.exe owner: SERVICE LOCAL domain:
AUTORITE NT
>>> PID: 4264 name: C:\Program Files\AVG\AVG10\avgrsx.exe owner: SYSTEM domain:
AUTORITE NT
>>> PID: 2584 name: C:\Program Files\AVG\AVG10\avgchsvx.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 5924 name: C:\WINDOWS\explorer.exe owner: amer domain: 00010101010100
>>> PID: 3872 name: C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe owner:
SYSTEM domain: AUTORITE NT
>>> PID: 3952 name: C:\Program Files\Lavasoft\Ad-Aware\Ad-Aware.exe owner: amer
domain: 00010101010100
>>> PID: 4384 name: C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe owner: amer
domain: 00010101010100
>>> PID: 3432 name: C:\Program Files\AVG\AVG10\avgcsrvx.exe owner: SYSTEM
domain: AUTORITE NT
>>> PID: 5404 name: C:\Program Files\Skype\Phone\Skype.exe owner: amer domain:
00010101010100
>>>
>>> Startup items:
>>> Name: PostBootReminder
>>>
imagepath: {7849596a-48ea-486e-8937-a2a3009f31a9}
>>> Name: CDBurn
>>>
imagepath: {fbeb8a05-beee-4442-804e-409d6c4515e9}
>>> Name: WebCheck
>>>
imagepath: {E6FB5E20-DE35-11CF-9C87-00AA005127ED}
>>> Name: SysTray
>>>
imagepath: {35CEC8A3-2BE6-11D2-8773-92E220524153}
>>> Name: WPDShServiceObj
>>>
imagepath: {AAA288BA-9A4C-45B0-95D7-94D524869DB5}
>>> Name: Config
>>>
imagepath: %systemroot%\system32\run.cmd
>>> Name: nlsf
>>>
imagepath: cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll"
"%SystemRoot%\System32\syssetup.dll"
>>> Name: tscuninstall
>>>
imagepath: %systemroot%\system32\tscupgrd.exe
>>> Name: {438755C2-A8BA-11D1-B96B-00A0C90312E1}
>>>
imagepath: Pré-chargeur Browseui
>>> Name: {8C7461EF-2B13-11d2-BE35-3078302C2030}
>>>
imagepath: Démon de cache des catégories de composant
>>> Name: SMSERIAL
>>>
imagepath: C:\Program Files\Motorola\SMSERIAL\sm56hlpr.exe
>>> Name: IAStorIcon
>>>
imagepath: C:\Program Files\Intel\Intel(R) Rapid Storage
Technology\IAStorIcon.exe
>>> Name: AppleSyncNotifier
>>>
imagepath: C:\Program Files\Fichiers communs\Apple\Mobile Device
Support\AppleSyncNotifier.exe
>>> Name: IntelZeroConfig
>>>
imagepath: "C:\Program Files\Intel\WiFi\bin\ZCfgSvc.exe"
>>> Name: IntelWireless
>>>
imagepath: "C:\Program Files\Fichiers
communs\Intel\WirelessCommon\iFrmewrk.exe" /tf Intel Wireless Tray
>>> Name: ZoneAlarm Client
>>>
imagepath: "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
>>> Name: ISW
>>>
imagepath: "C:\Program Files\CheckPoint\ZAForceField\ForceField.exe"
/icon="hidden"
>>> Name: BrMfcWnd
>>>
imagepath: C:\Program Files\Brother\Brmfcmon\BrMfcWnd.exe /AUTORUN
>>> Name: ControlCenter3
>>>
imagepath: C:\Program Files\Brother\ControlCenter3\brctrcen.exe /autorun
>>> Name: Adobe Reader Speed Launcher
>>>
imagepath: "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
>>> Name: Adobe ARM
>>>
imagepath: "C:\Program Files\Fichiers
communs\Adobe\ARM\1.0\AdobeARM.exe"
>>> Name: DivXUpdate
>>>
imagepath: "C:\Program Files\DivX\DivX Update\DivXUpdate.exe"
/CHECKNOW
>>> Name: LifeCam
>>>
imagepath: "C:\Program Files\Microsoft LifeCam\LifeExp.exe"
>>> Name: QuickTime Task
>>>
imagepath: "C:\Program Files\QuickTime\QTTask.exe" -atboottime
>>> Name: AVG_TRAY
>>>
imagepath: C:\Program Files\AVG\AVG10\avgtray.exe
>>> Name:
>>>
imagepath: C:\Documents and Settings\All Users\Menu
Démarrer\Programmes\Démarrage\desktop.ini
>>> Name:
>>>
location: C:\Documents and Settings\All Users\Menu
Démarrer\Programmes\Démarrage\Microsoft Office.lnk
>>>
imagepath: C:\Program Files\Microsoft Office\Office10\OSA.EXE
>>> Name:
>>>
location: C:\Documents and Settings\All Users\Menu
Démarrer\Programmes\Démarrage\PalTalk.lnk
>>>
imagepath: C:\Program Files\Paltalk Messenger\paltalk.exe
>>> Name:
>>>
location: C:\Documents and Settings\All Users\Menu
Démarrer\Programmes\Démarrage\Ralink Wireless Utility.lnk
>>>
imagepath: C:\Program Files\Ralink\Common\RaUI.exe
>>> Name:
>>>
imagepath: C:\Documents and Settings\amer\Menu
Démarrer\Programmes\Démarrage\desktop.ini
>>> Name:
>>>
location: C:\Documents and Settings\amer\Menu
Démarrer\Programmes\Démarrage\MagicDisc.lnk
>>>
imagepath: C:\Program Files\MagicDisc\MagicDisc.exe
>>>
>>> Bootexecute items:
>>> Name:
>>>
imagepath: autocheck autochk *
>>> Name:
>>>
imagepath: C:\PROGRA~1\AVG\AVG10\avgchsvx.exe /sync
>>> Name:
>>>
imagepath: C:\PROGRA~1\AVG\AVG10\avgrsx.exe /sync /restart
>>> Name:
>>>
imagepath: lsdelete
>>>
>>> Running services:
>>> Name: ALG
>>>
displayname: Service de la passerelle de la couche Application
>>> Name: Apple Mobile Device
>>>
displayname: Apple Mobile Device
>>> Name: Ati HotKey Poller
>>>
displayname: Ati HotKey Poller
>>> Name: AudioSrv
>>>
displayname: Audio Windows
>>> Name: AVGIDSAgent
>>>
displayname: AVGIDSAgent
>>> Name: avgwd
>>>
displayname: AVG WatchDog
>>> Name: BITS
>>>
displayname: Service de transfert intelligent en arrière-plan
>>> Name: Bonjour Service
>>>
displayname: Service Bonjour
>>> Name: Browser
>>>
displayname: Explorateur d'ordinateur
>>> Name: Browser Defender Update Service
>>>
displayname: Browser Defender Update Service
>>> Name: CryptSvc
>>>
displayname: CryptSvc
>>> Name: DcomLaunch
>>>
displayname: Lanceur de processus serveur DCOM
>>> Name: Dhcp
>>>
displayname: Client DHCP
>>> Name: Dnscache
>>>
displayname: Client DNS
>>> Name: EapHost
>>>
displayname: Service Protocole EAP (Extensible Authentication Protocol)
>>> Name: ERSvc
>>>
displayname: Service de rapport d'erreurs
>>> Name: Eventlog
>>>
displayname: Journal des événements
>>> Name: EventSystem
>>>
displayname: Système d'événements de COM+
>>> Name: EvtEng
>>>
displayname: Intel(R) PROSet/Wireless Event Log
>>> Name: FastUserSwitchingCompatibility
>>>
displayname: Compatibilité avec le Changement rapide d'utilisateur
>>> Name: hasplms
>>>
displayname: HASP License Manager
>>> Name: helpsvc
>>>
displayname: Aide et support
>>> Name: IAStorDataMgrSvc
>>>
displayname: Intel(R) Rapid Storage Technology
>>> Name: InstallShield Licensing Service
>>>
displayname: InstallShield Licensing Service
>>> Name: IswSvc
>>>
displayname: ZoneAlarm Toolbar IswSvc
>>> Name: JavaQuickStarterService
>>>
displayname: Java Quick Starter
>>> Name: lanmanserver
>>>
displayname: Serveur
>>> Name: lanmanworkstation
>>>
displayname: Station de travail
>>> Name: Lavasoft Ad-Aware Service
>>>
displayname: Lavasoft Ad-Aware Service
>>> Name: Log Events
>>>
displayname: Log Events
>>> Name: MBAMService
>>>
displayname: MBAMService
>>> Name: Netman
>>>
displayname: Connexions réseau
>>> Name: Nla
>>>
displayname: NLA (Network Location Awareness)
>>> Name: NWCWorkstation
>>>
displayname: Service client pour NetWare
>>> Name: PlugPlay
>>>
displayname: Plug-and-Play
>>> Name: ProtectedStorage
>>>
displayname: Emplacement protégé
>>> Name: RalinkRegistryWriter
>>>
displayname: Ralink Registry Writer
>>> Name: RasMan
>>>
displayname: Gestionnaire de connexions d'accès distant
>>> Name: RegSrvc
>>>
displayname: Intel(R) PROSet/Wireless Registry Service
>>> Name: RpcSs
>>>
displayname: Appel de procédure distante (RPC)
>>> Name: S24EventMonitor
>>>
displayname: Intel(R) PROSet/Wireless WiFi Service
>>> Name: SamSs
>>>
displayname: Gestionnaire de comptes de sécurité
>>> Name: Schedule
>>>
displayname: Planificateur de tâches
>>> Name: seclogon
>>>
displayname: Secondary Logon
>>> Name: SENS
>>>
displayname: Notification d'événement système
>>> Name: SharedAccess
>>>
displayname: Pare-feu Windows / Partage de connexion Internet
>>> Name: ShellHWDetection
>>>
displayname: Détection matériel noyau
>>> Name: Spooler
>>>
displayname: Spouleur d'impression
>>> Name: srservice
>>>
displayname: Service de restauration système
>>> Name: SSDPSRV
>>>
displayname: Service de découvertes SSDP
>>> Name: stisvc
>>>
displayname: Acquisition d'image Windows (WIA)
>>> Name: TapiSrv
>>>
displayname: Téléphonie
>>> Name: TermService
>>>
displayname: Services Terminal Server
>>> Name: Themes
>>>
displayname: Thèmes
>>> Name: uvnc_service
>>>
displayname: UltraVNC Server
>>> Name: VMAuthdService
>>>
displayname: VMware Authorization Service
>>> Name: VMnetDHCP
>>>
displayname: VMware DHCP Service
>>> Name: VMUSBArbService
>>>
displayname: VMware USB Arbitration Service
>>> Name: VMware NAT Service
>>>
displayname: VMware NAT Service
>>> Name: vsmon
>>>
displayname: TrueVector Internet Monitor
>>> Name: W32Time
>>>
displayname: Horloge Windows
>>> Name: winmgmt
>>>
displayname: Infrastructure de gestion Windows
>>> Name: wscsvc
>>>
displayname: Centre de sécurité
>>> Name: wuauserv
>>>
displayname: Mises à jour automatiques
>>>
>>>
ERR [0476] 2011/10/10 12:15:34: SDKController::GetInfectionList -> Not in found
infections state
MSG [0476] 2011/10/10 12:17:30: Configure new scan with profile: defaultprofile
MSG [0476] 2011/10/10 12:17:30: -> scanning critical objects
MSG [0476] 2011/10/10 12:17:30: -> scanning running processes
MSG [0476] 2011/10/10 12:17:30: -> scanning registry
MSG [0476] 2011/10/10 12:17:30: -> scanning lsp
MSG [0476] 2011/10/10 12:17:30: -> scanning ads
MSG [0476] 2011/10/10 12:17:30: -> scanning hosts file
MSG [0476] 2011/10/10 12:17:30: -> scanning mru objects
MSG [0476] 2011/10/10 12:17:30: -> scanning browser hijacks
MSG [0476] 2011/10/10 12:17:30: -> scanning cookies
MSG [0476] 2011/10/10 12:17:30: -> neutralizing rootkits
MSG [0476] 2011/10/10 12:17:30: -> use mild rootkit detection
MSG [0476] 2011/10/10 12:17:30: -> use spyware heuristics
MSG [0476] 2011/10/10 12:17:30: -> use medium heuristics
MSG [0476] 2011/10/10 12:17:30: -> scan archives
MSG [0476] 2011/10/10 12:17:30: -> file size limit = 20480 kB (0 = unlimited)
MSG [0476] 2011/10/10 12:17:30: -> validating system critical files
MSG [0476] 2011/10/10 12:17:30: -> scan file/path = C:\
MSG [0476] 2011/10/10 12:17:30: -> scan file/path = E:\
ERR [0476] 2011/10/10 12:17:30: SDKController::GetDefinitonsFileVersion -> Not in idle
state
ERR [0476] 2011/10/10 12:17:30: SDKController::GetLatestSuccessfulScanReportHeader ->
Not in idle state
ERR [0476] 2011/10/10 12:17:30: SDKController::GetLatestSuccessfulScanReportHeader ->
Not in idle state
ERR [0476] 2011/10/10 12:17:30: SDKController::GetLatestSuccessfulScanReportHeader ->
Not in idle state
ERR [0476] 2011/10/10 12:17:30: SDKController::GetInfectionList -> Not in found
infections state
Download