تفضل
واعمله بعد فحص الافيرا
هذا تقرير الاداة التي لم تعمل ووضحت ذلك بالصورة حيث حملت الملف الاخر وعملت وهذا التقرير بعد الفحص
Avira AntiVir Personal
Report file date: 25 جمادى الثانية, 1430 21:48
Scanning for 1476013 virus strains and unwanted programs.
Licensee : Avira AntiVir Personal - FREE Antivirus
Serial number : 0000149996-ADJIE-0000001
Platform : Windows XP
Windows version : (Service Pack 2) [5.1.2600]
Boot mode : Normally booted
Username : Toshiba
Computer name : YOUR-4FSDILOOL1
Version information:
BUILD.DAT : 9.0.0.386 17962 Bytes 15/03/1430 15:55:00
AVSCAN.EXE : 9.0.3.3 464641 Bytes 29/02/1430 09:13:26
AVSCAN.DLL : 9.0.3.0 40705 Bytes 03/03/1430 07:58:24
LUKE.DLL : 9.0.3.2 209665 Bytes 25/02/1430 08:35:49
LUKERES.DLL : 9.0.2.0 12033 Bytes 03/03/1430 07:58:52
ANTIVIR0.VDF : 7.1.0.0 15603712 Bytes 27/10/1429 03:29:38
ANTIVIR1.VDF : 7.1.2.12 3336192 Bytes 16/02/1430 10:32:40
ANTIVIR2.VDF : 7.1.4.87 2982912 Bytes 19/06/1430 06:21:02
ANTIVIR3.VDF : 7.1.4.112 181760 Bytes 25/06/1430 06:32:22
Engineversion : 8.2.0.191
AEVDF.DLL : 8.1.1.1 106868 Bytes 06/05/1430 05:33:10
AESCRIPT.DLL : 8.1.2.9 409978 Bytes 24/06/1430 05:32:45
AESCN.DLL : 8.1.2.3 127347 Bytes 21/05/1430 06:20:35
AERDL.DLL : 8.1.1.3 438645 Bytes 06/11/1429 22:43:26
AEPACK.DLL : 8.1.3.18 401783 Bytes 03/06/1430 08:10:34
AEOFFICE.DLL : 8.1.0.38 196987 Bytes 24/06/1430 05:32:45
AEHEUR.DLL : 8.1.0.133 1798520 Bytes 24/06/1430 05:32:45
AEHELP.DLL : 8.1.3.6 205174 Bytes 18/06/1430 03:44:16
AEGEN.DLL : 8.1.1.45 348532 Bytes 16/06/1430 04:00:09
AEEMU.DLL : 8.1.0.9 393588 Bytes 15/10/1429 01:49:35
AECORE.DLL : 8.1.6.12 180599 Bytes 03/06/1430 08:10:33
AEBB.DLL : 8.1.0.3 53618 Bytes 15/10/1429 01:49:34
AVWINLL.DLL : 9.0.0.3 18177 Bytes 14/12/1429 05:47:59
AVPREF.DLL : 9.0.0.1 43777 Bytes 07/12/1429 07:32:15
AVREP.DLL : 8.0.0.3 155688 Bytes 25/06/1430 06:32:23
AVREG.DLL : 9.0.0.0 36609 Bytes 07/12/1429 07:32:09
AVARKT.DLL : 9.0.0.1 292609 Bytes 14/02/1430 04:52:24
AVEVTLOG.DLL : 9.0.0.7 167169 Bytes 04/02/1430 07:37:08
SQLITE3.DLL : 3.6.1.0 326401 Bytes 02/02/1430 12:03:49
SMTPLIB.DLL : 9.2.0.25 28417 Bytes 07/02/1430 05:21:33
NETNT.DLL : 9.0.0.0 11521 Bytes 07/12/1429 07:32:10
RCIMAGE.DLL : 9.0.0.21 2438401 Bytes 14/02/1430 08:45:45
RCTEXT.DLL : 9.0.35.0 87297 Bytes 15/03/1430 12:55:12
Configuration settings for the scan:
Jobname.............................: Complete system scan
Configuration file..................: C:\DOCUME~1\Toshiba\LOCALS~1\Temp\RarSFX0\sysscan.avp
Logging.............................: low
Primary action......................: interactive
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:, D:, E:,
Process scan........................: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: on
Scan all files......................: All files
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: medium
Start of the scan: 25 جمادى الثانية, 1430 21:48
Initiating scan of system files:
Signed -> 'C:\WINDOWS\system32\svchost.exe'
Signed -> 'C:\WINDOWS\system32\winlogon.exe'
Signed -> 'C:\WINDOWS\explorer.exe'
Signed -> 'C:\WINDOWS\system32\smss.exe'
Signed -> 'C:\WINDOWS\system32\wininet.DLL'
Signed -> 'C:\WINDOWS\system32\wsock32.DLL'
Signed -> 'C:\WINDOWS\system32\ws2_32.DLL'
Signed -> 'C:\WINDOWS\system32\services.exe'
Signed -> 'C:\WINDOWS\system32\lsass.exe'
Signed -> 'C:\WINDOWS\system32\csrss.exe'
Signed -> 'C:\WINDOWS\system32\drivers\kbdclass.sys'
Signed -> 'C:\WINDOWS\system32\spoolsv.exe'
Signed -> 'C:\WINDOWS\system32\alg.exe'
Signed -> 'C:\WINDOWS\system32\wuauclt.exe'
Signed -> 'C:\WINDOWS\system32\advapi32.DLL'
Signed -> 'C:\WINDOWS\system32\user32.DLL'
Signed -> 'C:\WINDOWS\system32\gdi32.DLL'
Signed -> 'C:\WINDOWS\system32\kernel32.DLL'
Signed -> 'C:\WINDOWS\system32\ntdll.DLL'
Signed -> 'C:\WINDOWS\system32\ntoskrnl.exe'
Signed -> 'C:\WINDOWS\system32\ctfmon.exe'
The system files were scanned ('21' files)
Starting search for hidden objects.
The driver could not be initialized.
The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'zyzoom_avira9.exe' - '1' Module(s) have been scanned
Scan process 'msiexec.exe' - '1' Module(s) have been scanned
Scan process 'HijackThis.exe' - '1' Module(s) have been scanned
Scan process 'IEXPLORE.EXE' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'alg.exe' - '1' Module(s) have been scanned
Scan process 'WUSB54GC.exe' - '1' Module(s) have been scanned
Scan process 'WLService.exe' - '1' Module(s) have been scanned
Scan process 'SMAgent.exe' - '1' Module(s) have been scanned
Scan process 'MDM.EXE' - '1' Module(s) have been scanned
Scan process 'CFSvcs.exe' - '1' Module(s) have been scanned
Scan process 'spoolsv.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
28 processes with 28 modules were scanned
Starting master boot sector scan:
Start scanning boot sectors:
Starting to scan executable files (registry).
The registry was scanned ( '53' files ).
Starting the file scan:
Begin scan in 'C:\'
C:\pagefile.sys
[WARNING] The file could not be opened!
[NOTE] This file is a Windows system file.
[NOTE] This file cannot be opened for scanning.
C:\tablnkq.exe
[DETECTION] Is the TR/Inject.acyf Trojan
C:\Documents and Settings\All Users\Application Data\Ashampoo\Ashampoo UnInstaller 3\Backup\Tempfiles\Tempfiles_2009-06-14_UIBak.zip
[0] Archive type: ZIP
--> C/DOCUME~1/Toshiba/LOCALS~1/Temp/031.exe
[DETECTION] Is the TR/Hijacker.Gen Trojan
--> C/DOCUME~1/Toshiba/LOCALS~1/Temp/239.exe
[DETECTION] Is the TR/Hijacker.Gen Trojan
--> C/DOCUME~1/Toshiba/LOCALS~1/Temp/369.exe
[DETECTION] Is the TR/Hijacker.Gen Trojan
--> C/DOCUME~1/Toshiba/LOCALS~1/Temp/764.exe
[DETECTION] Is the TR/Hijacker.Gen Trojan
--> C/DOCUME~1/Toshiba/LOCALS~1/Temp/7A.tmp
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
--> C/DOCUME~1/Toshiba/LOCALS~1/Temp/84.tmp
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
--> C/DOCUME~1/Toshiba/LOCALS~1/Temp/924.exe
[DETECTION] Is the TR/Crypt.ZPACK.Gen Trojan
--> C/DOCUME~1/Toshiba/LOCALS~1/Temp/xdfbxewhrrjdzdfbcvne5gwgaabaz44.exe
[DETECTION] Contains recognition pattern of the DR/Dldr.Delf.uic dropper
--> dncyool32.sys
[DETECTION] Is the TR/ATRAPS.Gen Trojan
--> sopidkc.exe
[DETECTION] Is the TR/Dldr.Delf.uic Trojan
--> tpsaxyd.exe
[DETECTION] Is the TR/Dldr.Delf.uib Trojan
--> C/DOCUME~1/Toshiba/LOCALS~1/Temp/xdfbxewhrrjdzdfbcvne5gwgaabaz46.exe
[DETECTION] Is the TR/VB.rep Trojan
--> C/DOCUME~1/Toshiba/LOCALS~1/Temp/~TM77.tmp
[DETECTION] Is the TR/Agent.cltv Trojan
--> C/DOCUME~1/Toshiba/LOCALS~1/Temp/~TM81.tmp
[DETECTION] Is the TR/Agent.cltv Trojan
--> C/WINDOWS/Temp/37.tmp
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
--> C/WINDOWS/Temp/xdfbxewhrrjdzdfbcvne5gwgaabaz44.exe
[DETECTION] Contains recognition pattern of the DR/Dldr.Delf.uic dropper
--> dncyool32.sys
[DETECTION] Is the TR/ATRAPS.Gen Trojan
--> sopidkc.exe
[DETECTION] Is the TR/Dldr.Delf.uic Trojan
--> tpsaxyd.exe
[DETECTION] Is the TR/Dldr.Delf.uib Trojan
--> C/WINDOWS/Temp/xdfbxewhrrjdzdfbcvne5gwgaabaz46.exe
[DETECTION] Is the TR/VB.rep Trojan
--> C/WINDOWS/Temp/~TM34.tmp
[DETECTION] Is the TR/Agent.cltv Trojan
--> C/WINDOWS/Temp/~TM54EA3A.TMP
[DETECTION] Is the TR/Agent.cltv Trojan
C:\Documents and Settings\All Users\Application Data\Ashampoo\Ashampoo UnInstaller 3\Backup\Tempfiles\Tempfiles_2009-06-14_UIBak\C\DOCUME~1\Toshiba\LOCALS~1\Temp\924.exe
[DETECTION] Is the TR/Crypt.ZPACK.Gen Trojan
C:\Documents and Settings\All Users\Application Data\Ashampoo\Ashampoo UnInstaller 3\Backup\Tempfiles\Tempfiles_2009-06-14_UIBak\C\DOCUME~1\Toshiba\LOCALS~1\Temp\xdfbxewhrrjdzdfbcvne5gwgaabaz44.exe
[DETECTION] Contains recognition pattern of the DR/Dldr.Delf.uic dropper
--> dncyool32.sys
[DETECTION] Is the TR/ATRAPS.Gen Trojan
--> sopidkc.exe
[DETECTION] Is the TR/Dldr.Delf.uic Trojan
--> tpsaxyd.exe
[DETECTION] Is the TR/Dldr.Delf.uib Trojan
C:\Documents and Settings\All Users\Application Data\Ashampoo\Ashampoo UnInstaller 3\Backup\Tempfiles\Tempfiles_2009-06-14_UIBak\C\DOCUME~1\Toshiba\LOCALS~1\Temp\xdfbxewhrrjdzdfbcvne5gwgaabaz46.exe
[DETECTION] Is the TR/VB.rep Trojan
C:\Documents and Settings\All Users\Application Data\Ashampoo\Ashampoo UnInstaller 3\Backup\Tempfiles\Tempfiles_2009-06-14_UIBak\C\DOCUME~1\Toshiba\LOCALS~1\Temp\~TM77.tmp
[DETECTION] Is the TR/Agent.cltv Trojan
C:\Documents and Settings\All Users\Application Data\Ashampoo\Ashampoo UnInstaller 3\Backup\Tempfiles\Tempfiles_2009-06-14_UIBak\C\DOCUME~1\Toshiba\LOCALS~1\Temp\~TM81.tmp
[DETECTION] Is the TR/Agent.cltv Trojan
C:\Documents and Settings\All Users\Application Data\Ashampoo\Ashampoo UnInstaller 3\Backup\Tempfiles\Tempfiles_2009-06-14_UIBak\C\WINDOWS\Temp\xdfbxewhrrjdzdfbcvne5gwgaabaz44.exe
[DETECTION] Contains recognition pattern of the DR/Dldr.Delf.uic dropper
--> dncyool32.sys
[DETECTION] Is the TR/ATRAPS.Gen Trojan
--> sopidkc.exe
[DETECTION] Is the TR/Dldr.Delf.uic Trojan
--> tpsaxyd.exe
[DETECTION] Is the TR/Dldr.Delf.uib Trojan
C:\Documents and Settings\All Users\Application Data\Ashampoo\Ashampoo UnInstaller 3\Backup\Tempfiles\Tempfiles_2009-06-14_UIBak\C\WINDOWS\Temp\xdfbxewhrrjdzdfbcvne5gwgaabaz46.exe
[DETECTION] Is the TR/VB.rep Trojan
C:\Documents and Settings\All Users\Application Data\Ashampoo\Ashampoo UnInstaller 3\Backup\Tempfiles\Tempfiles_2009-06-14_UIBak\C\WINDOWS\Temp\~TM34.tmp
[DETECTION] Is the TR/Agent.cltv Trojan
C:\Documents and Settings\All Users\Application Data\Ashampoo\Ashampoo UnInstaller 3\Backup\Tempfiles\Tempfiles_2009-06-14_UIBak\C\WINDOWS\Temp\~TM54EA3A.TMP
[DETECTION] Is the TR/Agent.cltv Trojan
C:\Documents and Settings\All Users\Application Data\{6226BA26-C017-4007-928C-DE9715C6FA67}\tbu657\tbhelper.dll
[DETECTION] Contains recognition pattern of the ADSPY/Agent.ecw.1 adware or spyware
C:\Qoobox\Quarantine\C\smxa.exe.vir
[DETECTION] Is the TR/Buzus.bgfl Trojan
C:\Qoobox\Quarantine\C\xeeqy.exe.vir
[DETECTION] Is the TR/Buzus.bgfl Trojan
C:\Qoobox\Quarantine\C\xwjfc.exe.vir
[DETECTION] Is the TR/Buzus.bgfl Trojan
C:\Qoobox\Quarantine\C\RECYCLER\S-1-5-21-1756721462-7422755793-040095631-9477\wnzip32.exe.vir
[DETECTION] Is the TR/Buzus.bgfl Trojan
C:\Qoobox\Quarantine\C\WINDOWS\freddy46.exe.vir
[DETECTION] Contains recognition pattern of the WORM/Koobface.XU worm
C:\Qoobox\Quarantine\C\WINDOWS\ld09.exe.vir
[DETECTION] Is the TR/Downloader.Gen Trojan
C:\Qoobox\Quarantine\C\WINDOWS\DLL\RUNDLL32.exe.vir
[DETECTION] Is the TR/ATRAPS.Gen Trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\6to4v32.dll.vir
[DETECTION] Is the TR/Obfuscated.aghs Trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\dncyool32.sys.vir
[DETECTION] Is the TR/ATRAPS.Gen Trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\tpsaxyd.exe.vir
[DETECTION] Is the TR/Dldr.Delf.uib Trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\tpszxyd.sys.vir
[DETECTION] Is the TR/Downloader.Gen2 Trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\wtukd32.exe.vir
[DETECTION] Is the TR/Downloader.Gen2 Trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\3361\SVCHOST.EXE.vir
[DETECTION] Is the TR/Agent.clwi Trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\drivers\57482add.sys.vir
[DETECTION] Is the TR/Rootkit.Gen Trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\drivers\glaide32.sys.vir
[DETECTION] Is the TR/Rootkit.Gen Trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\drivers\_57482add_.sys.zip
[0] Archive type: ZIP
--> 57482add.sys
[DETECTION] Is the TR/Rootkit.Gen Trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\drivers\_glaide32_.sys.zip
[0] Archive type: ZIP
--> glaide32.sys
[DETECTION] Is the TR/Rootkit.Gen Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP3\A0000119.dll
[DETECTION] Is the TR/Agent2.kom Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP3\A0000121.exe
[DETECTION] Is the TR/Hijacker.Gen Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP3\A0000123.sys
[DETECTION] Is the TR/Dldr.Delf.uib Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP3\A0000124.exe
[DETECTION] Is the TR/Dldr.Delf.uib Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP4\A0000125.exe
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP4\A0000126.exe
[DETECTION] Is the TR/Downloader.Gen Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP4\A0000127.exe
[DETECTION] Is the TR/Crypt.ZPACK.Gen Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP4\A0000128.exe
[DETECTION] Is the TR/Agent.cltv Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0006133.exe
[DETECTION] Is the TR/Downloader.Gen Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0006137.exe
[DETECTION] Is the TR/Spy.Gen Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0006138.exe
[DETECTION] Is the TR/Spy.Gen Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0009231.exe
[DETECTION] Is the TR/Hijacker.Gen Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0009232.exe
[DETECTION] Is the TR/Hijacker.Gen Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0009233.exe
[DETECTION] Is the TR/Hijacker.Gen Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0009234.exe
[DETECTION] Is the TR/Hijacker.Gen Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0009235.exe
[DETECTION] Is the TR/Dldr.Swizzor.Gen Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0009236.exe
[DETECTION] Is the TR/Dldr.Swizzor.Gen Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0009237.exe
[DETECTION] Is the TR/Hijacker.Gen Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0009239.EXE
[DETECTION] Is the TR/Dropper.Gen Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0009240.sys
[DETECTION] Contains a recognition pattern of the (harmful) BDS/IEbooot.axr back-door program
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0014265.sys
[DETECTION] Contains a recognition pattern of the (harmful) BDS/Refpron.153600C back-door program
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0014266.exe
[DETECTION] Contains a recognition pattern of the (harmful) BDS/Refpron.153600C back-door program
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0014267.old
[DETECTION] Is the TR/ATRAPS.Gen Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0014268.exe
[DETECTION] Is the TR/Dldr.Delf.uic Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0014277.exe
[DETECTION] Is the TR/Spy.Gen Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0014278.dll
[DETECTION] Is the TR/Obfuscated.aghs Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0014280.dll
[DETECTION] Is the TR/Agent2.kom Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0014281.exe
[DETECTION] Is the TR/Agent2.KOV.5 Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0014282.dll
[DETECTION] Is the TR/Dldr.Delf.uia Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0014283.sys
[DETECTION] Is the TR/Agent.clsj.B Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0014284.dll
[DETECTION] Is the TR/Agent.clsj Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0014285.exe
[DETECTION] Is the TR/Downloader.Gen2 Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0014393.dll
[DETECTION] Is the TR/Trash.Gen Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0014394.exe
[DETECTION] Is the TR/Trash.Gen Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0014396.exe
[DETECTION] Is the TR/Trash.Gen Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015306.exe
[DETECTION] Is the TR/Buzus.bgfl Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015307.exe
[DETECTION] Is the TR/ATRAPS.Gen Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015309.EXE
[DETECTION] Is the TR/Agent.clwi Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015310.dll
[DETECTION] Is the TR/Obfuscated.aghs Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015311.sys
[DETECTION] Is the TR/ATRAPS.Gen Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015313.exe
[DETECTION] Is the TR/Dldr.Delf.uib Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015314.sys
[DETECTION] Is the TR/Downloader.Gen2 Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015315.exe
[DETECTION] Is the TR/Downloader.Gen2 Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015319.exe
[DETECTION] Contains recognition pattern of the WORM/Koobface.XU worm
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015320.exe
[DETECTION] Is the TR/Downloader.Gen Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015326.exe
[DETECTION] Is the TR/Buzus.bgfl Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015328.exe
[DETECTION] Is the TR/Buzus.bgfl Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015329.exe
[DETECTION] Is the TR/Buzus.bgfl Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015335.sys
[DETECTION] Is the TR/Rootkit.Gen Trojan
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015336.sys
[DETECTION] Is the TR/Rootkit.Gen Trojan
C:\WINDOWS\system32\userinit.exe
[DETECTION] Is the TR/Mail.Agent.aba Trojan
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\H6HLIM80\gh[1].exe
[DETECTION] Is the TR/Crypt.ZPACK.Gen Trojan
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\H6HLIM80\ik[1].exe
[DETECTION] Is the TR/Crypt.ZPACK.Gen Trojan
C:\WINDOWS\system32\drivers\a4a4d2f5.sys
[WARNING] The file could not be opened!
Begin scan in 'D:\'
D:\Downloads\Compressed\IDM5.15Build6ByKhalesedArabSeeD.CoM.rar
[0] Archive type: RAR
--> IDM 5.15 Build 6 By Khalesed\crack\Patch 5.xx (2008-12-06).exe
[DETECTION] Contains recognition pattern of the WORM/Agent.143872 worm
Begin scan in 'E:\'
E:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0009242.exe
[DETECTION] Contains recognition pattern of the WORM/Agent.143872 worm
E:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0009243.exe
[DETECTION] Contains recognition pattern of the WORM/Agent.143872 worm
Beginning disinfection:
C:\tablnkq.exe
[DETECTION] Is the TR/Inject.acyf Trojan
[NOTE] The file was moved to '4a9c9474.qua'!
C:\Documents and Settings\All Users\Application Data\Ashampoo\Ashampoo UnInstaller 3\Backup\Tempfiles\Tempfiles_2009-06-14_UIBak.zip
[NOTE] The file was moved to '4aa79479.qua'!
C:\Documents and Settings\All Users\Application Data\Ashampoo\Ashampoo UnInstaller 3\Backup\Tempfiles\Tempfiles_2009-06-14_UIBak\C\DOCUME~1\Toshiba\LOCALS~1\Temp\924.exe
[DETECTION] Is the TR/Crypt.ZPACK.Gen Trojan
[NOTE] The file was moved to '4a6e945b.qua'!
C:\Documents and Settings\All Users\Application Data\Ashampoo\Ashampoo UnInstaller 3\Backup\Tempfiles\Tempfiles_2009-06-14_UIBak\C\DOCUME~1\Toshiba\LOCALS~1\Temp\xdfbxewhrrjdzdfbcvne5gwgaabaz44.exe
[DETECTION] Contains recognition pattern of the DR/Dldr.Delf.uic dropper
[NOTE] The file was moved to '4aa0948d.qua'!
C:\Documents and Settings\All Users\Application Data\Ashampoo\Ashampoo UnInstaller 3\Backup\Tempfiles\Tempfiles_2009-06-14_UIBak\C\DOCUME~1\Toshiba\LOCALS~1\Temp\xdfbxewhrrjdzdfbcvne5gwgaabaz46.exe
[DETECTION] Is the TR/VB.rep Trojan
[NOTE] The file was moved to '4aa0948e.qua'!
C:\Documents and Settings\All Users\Application Data\Ashampoo\Ashampoo UnInstaller 3\Backup\Tempfiles\Tempfiles_2009-06-14_UIBak\C\DOCUME~1\Toshiba\LOCALS~1\Temp\~TM77.tmp
[DETECTION] Is the TR/Agent.cltv Trojan
[NOTE] The file was moved to '4a87947e.qua'!
C:\Documents and Settings\All Users\Application Data\Ashampoo\Ashampoo UnInstaller 3\Backup\Tempfiles\Tempfiles_2009-06-14_UIBak\C\DOCUME~1\Toshiba\LOCALS~1\Temp\~TM81.tmp
[DETECTION] Is the TR/Agent.cltv Trojan
[NOTE] The file was moved to '463afb37.qua'!
C:\Documents and Settings\All Users\Application Data\Ashampoo\Ashampoo UnInstaller 3\Backup\Tempfiles\Tempfiles_2009-06-14_UIBak\C\WINDOWS\Temp\xdfbxewhrrjdzdfbcvne5gwgaabaz44.exe
[DETECTION] Contains recognition pattern of the DR/Dldr.Delf.uic dropper
[NOTE] The file was moved to '4aa0948f.qua'!
C:\Documents and Settings\All Users\Application Data\Ashampoo\Ashampoo UnInstaller 3\Backup\Tempfiles\Tempfiles_2009-06-14_UIBak\C\WINDOWS\Temp\xdfbxewhrrjdzdfbcvne5gwgaabaz46.exe
[DETECTION] Is the TR/VB.rep Trojan
[NOTE] The file was moved to '4618dcf0.qua'!
C:\Documents and Settings\All Users\Application Data\Ashampoo\Ashampoo UnInstaller 3\Backup\Tempfiles\Tempfiles_2009-06-14_UIBak\C\WINDOWS\Temp\~TM34.tmp
[DETECTION] Is the TR/Agent.cltv Trojan
[NOTE] The file was moved to '4a87947f.qua'!
C:\Documents and Settings\All Users\Application Data\Ashampoo\Ashampoo UnInstaller 3\Backup\Tempfiles\Tempfiles_2009-06-14_UIBak\C\WINDOWS\Temp\~TM54EA3A.TMP
[DETECTION] Is the TR/Agent.cltv Trojan
[NOTE] The file was moved to '4638ea58.qua'!
C:\Documents and Settings\All Users\Application Data\{6226BA26-C017-4007-928C-DE9715C6FA67}\tbu657\tbhelper.dll
[DETECTION] Contains recognition pattern of the ADSPY/Agent.ecw.1 adware or spyware
[NOTE] The file was moved to '4aa2948d.qua'!
C:\Qoobox\Quarantine\C\smxa.exe.vir
[DETECTION] Is the TR/Buzus.bgfl Trojan
[NOTE] The file was moved to '4ab29499.qua'!
C:\Qoobox\Quarantine\C\xeeqy.exe.vir
[DETECTION] Is the TR/Buzus.bgfl Trojan
[NOTE] The file was moved to '4a9f9491.qua'!
C:\Qoobox\Quarantine\C\xwjfc.exe.vir
[DETECTION] Is the TR/Buzus.bgfl Trojan
[NOTE] The file was moved to '4aa494a3.qua'!
C:\Qoobox\Quarantine\C\RECYCLER\S-1-5-21-1756721462-7422755793-040095631-9477\wnzip32.exe.vir
[DETECTION] Is the TR/Buzus.bgfl Trojan
[NOTE] The file was moved to '4ab4949a.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\freddy46.exe.vir
[DETECTION] Contains recognition pattern of the WORM/Koobface.XU worm
[NOTE] The file was moved to '4a9f949e.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\ld09.exe.vir
[DETECTION] Is the TR/Downloader.Gen Trojan
[NOTE] The file was moved to '4a6a9490.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\DLL\RUNDLL32.exe.vir
[DETECTION] Is the TR/ATRAPS.Gen Trojan
[NOTE] The file was moved to '4a889481.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\system32\6to4v32.dll.vir
[DETECTION] Is the TR/Obfuscated.aghs Trojan
[NOTE] The file was moved to '4aa994a0.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\system32\dncyool32.sys.vir
[DETECTION] Is the TR/ATRAPS.Gen Trojan
[NOTE] The file was moved to '4a9d949a.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\system32\tpsaxyd.exe.vir
[DETECTION] Is the TR/Dldr.Delf.uib Trojan
[NOTE] The file was moved to '4aad949c.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\system32\tpszxyd.sys.vir
[DETECTION] Is the TR/Downloader.Gen2 Trojan
[NOTE] The file was moved to '46683915.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\system32\wtukd32.exe.vir
[DETECTION] Is the TR/Downloader.Gen2 Trojan
[NOTE] The file was moved to '4aaf94a0.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\system32\3361\SVCHOST.EXE.vir
[DETECTION] Is the TR/Agent.clwi Trojan
[NOTE] The file was moved to '4a7d9482.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\system32\drivers\57482add.sys.vir
[DETECTION] Is the TR/Rootkit.Gen Trojan
[NOTE] The file was moved to '4a6e9463.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\system32\drivers\glaide32.sys.vir
[DETECTION] Is the TR/Rootkit.Gen Trojan
[NOTE] The file was moved to '4a9b9498.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\system32\drivers\_57482add_.sys.zip
[NOTE] The file was moved to '4a719461.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\system32\drivers\_glaide32_.sys.zip
[NOTE] The file was moved to '4aa69493.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP3\A0000119.dll
[DETECTION] Is the TR/Agent2.kom Trojan
[NOTE] The file was moved to '4a6a945d.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP3\A0000121.exe
[DETECTION] Is the TR/Hijacker.Gen Trojan
[NOTE] The file was moved to '46ad2946.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP3\A0000123.sys
[DETECTION] Is the TR/Dldr.Delf.uib Trojan
[NOTE] The file was moved to '4dd9945e.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP3\A0000124.exe
[DETECTION] Is the TR/Dldr.Delf.uib Trojan
[NOTE] The file was moved to '46a77f96.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP4\A0000125.exe
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '46a590be.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP4\A0000126.exe
[DETECTION] Is the TR/Downloader.Gen Trojan
[NOTE] The file was moved to '46ba98f6.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP4\A0000127.exe
[DETECTION] Is the TR/Crypt.ZPACK.Gen Trojan
[NOTE] The file was moved to '46bb802e.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP4\A0000128.exe
[DETECTION] Is the TR/Agent.cltv Trojan
[NOTE] The file was moved to '46b88866.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0006133.exe
[DETECTION] Is the TR/Downloader.Gen Trojan
[NOTE] The file was moved to '4a6a945e.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0006137.exe
[DETECTION] Is the TR/Spy.Gen Trojan
[NOTE] The file was moved to '46bebf97.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0006138.exe
[DETECTION] Is the TR/Spy.Gen Trojan
[NOTE] The file was moved to '46bfa7cf.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0009231.exe
[DETECTION] Is the TR/Hijacker.Gen Trojan
[NOTE] The file was moved to '46bcaf07.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0009232.exe
[DETECTION] Is the TR/Hijacker.Gen Trojan
[NOTE] The file was moved to '46b3c6ef.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0009233.exe
[DETECTION] Is the TR/Hijacker.Gen Trojan
[NOTE] The file was moved to '46bdd77f.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0009234.exe
[DETECTION] Is the TR/Hijacker.Gen Trojan
[NOTE] The file was moved to '46b2deb7.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0009235.exe
[DETECTION] Is the TR/Dldr.Swizzor.Gen Trojan
[NOTE] The file was moved to '46b0ce27.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0009236.exe
[DETECTION] Is the TR/Dldr.Swizzor.Gen Trojan
[NOTE] The file was moved to '46b1f6af.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0009237.exe
[DETECTION] Is the TR/Hijacker.Gen Trojan
[NOTE] The file was moved to '46b6ff37.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0009239.EXE
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '46b7e7bf.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0009240.sys
[DETECTION] Contains a recognition pattern of the (harmful) BDS/IEbooot.axr back-door program
[NOTE] The file was moved to '46b4e807.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0014265.sys
[DETECTION] Contains a recognition pattern of the (harmful) BDS/Refpron.153600C back-door program
[NOTE] The file was moved to '46b5108f.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0014266.exe
[DETECTION] Contains a recognition pattern of the (harmful) BDS/Refpron.153600C back-door program
[NOTE] The file was moved to '468a1917.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0014267.old
[DETECTION] Is the TR/ATRAPS.Gen Trojan
[NOTE] The file was moved to '468b019f.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0014268.exe
[DETECTION] Is the TR/Dldr.Delf.uic Trojan
[NOTE] The file was moved to '46880a67.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0014277.exe
[DETECTION] Is the TR/Spy.Gen Trojan
[NOTE] The file was moved to '468932ef.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0014278.dll
[DETECTION] Is the TR/Obfuscated.aghs Trojan
[NOTE] The file was moved to '468e3b77.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0014280.dll
[DETECTION] Is the TR/Agent2.kom Trojan
[NOTE] The file was moved to '468f23ff.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0014281.exe
[DETECTION] Is the TR/Agent2.KOV.5 Trojan
[NOTE] The file was moved to '468c5447.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0014282.dll
[DETECTION] Is the TR/Dldr.Delf.uia Trojan
[NOTE] The file was moved to '468d5ccf.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0014283.sys
[DETECTION] Is the TR/Agent.clsj.B Trojan
[NOTE] The file was moved to '46824557.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0014284.dll
[DETECTION] Is the TR/Agent.clsj Trojan
[NOTE] The file was moved to '46834ddf.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0014285.exe
[DETECTION] Is the TR/Downloader.Gen2 Trojan
[NOTE] The file was moved to '468075a7.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0014393.dll
[DETECTION] Is the TR/Trash.Gen Trojan
[NOTE] The file was moved to '46817e2f.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0014394.exe
[DETECTION] Is the TR/Trash.Gen Trojan
[NOTE] The file was moved to '468666b7.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0014396.exe
[DETECTION] Is the TR/Trash.Gen Trojan
[NOTE] The file was moved to '46876f3f.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015306.exe
[DETECTION] Is the TR/Buzus.bgfl Trojan
[NOTE] The file was moved to '46859787.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015307.exe
[DETECTION] Is the TR/ATRAPS.Gen Trojan
[NOTE] The file was moved to '469a9fff.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015309.EXE
[DETECTION] Is the TR/Agent.clwi Trojan
[NOTE] The file was moved to '469b8097.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015310.dll
[DETECTION] Is the TR/Obfuscated.aghs Trojan
[NOTE] The file was moved to '4698891f.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015311.sys
[DETECTION] Is the TR/ATRAPS.Gen Trojan
[NOTE] The file was moved to '4699b1e7.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015313.exe
[DETECTION] Is the TR/Dldr.Delf.uib Trojan
[NOTE] The file was moved to '47fca557.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015314.sys
[DETECTION] Is the TR/Downloader.Gen2 Trojan
[NOTE] The file was moved to '47fdaddf.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015315.exe
[DETECTION] Is the TR/Downloader.Gen2 Trojan
[NOTE] The file was moved to '47f2d5a7.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015319.exe
[DETECTION] Contains recognition pattern of the WORM/Koobface.XU worm
[NOTE] The file was moved to '47f3de2f.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015320.exe
[DETECTION] Is the TR/Downloader.Gen Trojan
[NOTE] The file was moved to '47f0c6b7.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015326.exe
[DETECTION] Is the TR/Buzus.bgfl Trojan
[NOTE] The file was moved to '47f1cf3f.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015328.exe
[DETECTION] Is the TR/Buzus.bgfl Trojan
[NOTE] The file was moved to '47f6f787.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015329.exe
[DETECTION] Is the TR/Buzus.bgfl Trojan
[NOTE] The file was moved to '47f7f80f.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015335.sys
[DETECTION] Is the TR/Rootkit.Gen Trojan
[NOTE] The file was moved to '4a6a945f.qua'!
C:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP6\A0015336.sys
[DETECTION] Is the TR/Rootkit.Gen Trojan
[NOTE] The file was moved to '47f5e920.qua'!
C:\WINDOWS\system32\userinit.exe
[DETECTION] Is the TR/Mail.Agent.aba Trojan
[NOTE] The file was moved to '4a9f94a2.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\H6HLIM80\gh[1].exe
[DETECTION] Is the TR/Crypt.ZPACK.Gen Trojan
[NOTE] The file was moved to '4a959497.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\H6HLIM80\ik[1].exe
[DETECTION] Is the TR/Crypt.ZPACK.Gen Trojan
[NOTE] The file was moved to '4a95949a.qua'!
D:\Downloads\Compressed\IDM5.15Build6ByKhalesedArabSeeD.CoM.rar
[NOTE] The file was moved to '4a879473.qua'!
E:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0009242.exe
[DETECTION] Contains recognition pattern of the WORM/Agent.143872 worm
[NOTE] The file was moved to '4a6a9461.qua'!
E:\System Volume Information\_restore{58A85B35-38BA-4D6E-8FD8-53ED36571EC7}\RP5\A0009243.exe
[DETECTION] Contains recognition pattern of the WORM/Agent.143872 worm
[NOTE] The file was moved to '4dc57cca.qua'!
End of the scan: 25 جمادى الثانية, 1430 22:23
Used time: 34:00 Minute(s)
The scan has been done completely.
4414 Scanned directories
492930 Files were scanned
112 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
85 Files were moved to quarantine
0 Files were renamed
2 Files cannot be scanned
492816 Files not concerned
7879 Archives were scanned
2 Warnings
86 Notes