本帖最后由 aboringman 于 2015-5-1 11:05 编辑
红伞检测96,隔离49,修复47
87.vir修复后仍为病毒,继续被杀
[mw_shl_code=css,true]
Antivirus Pro
Report file date: 2015年5月1日 10:54
The program is running as an unrestricted full version.
Online services are available.
Platform : Microsoft Windows XP
Windows version : (Service Pack 3) [5.1.2600]
Boot mode : Normally booted
Username : adminstartor
Computer name : 23Q2JEHX1NUPHVO
Version information:
BUILD.DAT : 15.0.9.504 94784 Bytes 2015-3-24 14:59:00
AVSCAN.EXE : 15.0.9.504 1027528 Bytes 2015-3-24 06:59:28
AVSCANRC.DLL : 15.0.9.460 54064 Bytes 2015-3-24 06:59:28
LUKE.DLL : 15.0.9.460 60664 Bytes 2015-3-24 06:59:30
AVSCPLR.DLL : 15.0.9.460 95536 Bytes 2015-3-24 06:59:28
REPAIR.DLL : 15.0.9.504 374064 Bytes 2015-3-24 06:59:28
REPAIR.RDF : 1.0.7.58 881292 Bytes 2015-4-30 09:18:50
AVREG.DLL : 15.0.9.460 273712 Bytes 2015-3-24 06:59:28
AVLODE.DLL : 15.0.9.504 596272 Bytes 2015-3-24 06:59:26
AVLODE.RDF : 14.0.4.64 79226 Bytes 2015-4-26 02:10:10
XBV00019.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00020.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00021.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00022.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00023.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00024.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00025.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00026.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00027.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00028.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00029.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00030.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00031.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00032.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00033.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00034.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00035.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00036.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00037.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00038.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00039.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00040.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00041.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00114.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00115.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00116.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00117.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00118.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00119.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00120.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00121.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00122.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00123.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00124.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00125.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00126.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00127.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00128.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00129.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00130.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00131.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00132.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00133.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00134.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00135.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00136.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00137.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00138.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00139.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00140.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00141.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00142.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00143.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00144.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00145.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00146.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00147.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00148.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00149.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00150.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00151.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00152.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00153.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00154.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00155.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00156.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00157.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00158.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00159.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00160.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00161.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00162.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00163.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00164.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00165.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00166.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00167.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00168.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00169.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00170.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00171.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00172.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00173.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00174.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00175.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00176.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00177.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00178.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00179.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00180.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00181.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00182.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00183.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00184.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00185.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00186.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00187.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00188.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00189.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00190.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00191.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00192.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00193.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00194.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00195.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00196.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00197.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00198.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00199.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00200.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00201.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00202.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00203.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00204.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00205.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00206.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00207.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00208.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00209.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00210.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00211.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00212.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00213.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00214.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00215.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00216.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00217.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00218.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00219.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00220.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00221.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00222.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00223.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00224.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00225.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00226.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00227.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00228.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00229.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00230.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00231.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00232.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00233.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00234.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00235.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00236.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00237.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00238.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00239.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00240.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00241.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00242.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00243.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00244.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00245.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00246.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00247.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00248.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00249.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00250.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00251.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00252.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00253.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00254.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00255.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00000.VDF : 7.11.70.0 66736640 Bytes 2013-4-4 06:59:31
XBV00001.VDF : 7.11.74.226 2201600 Bytes 2013-4-30 06:59:31
XBV00002.VDF : 7.11.80.60 2751488 Bytes 2013-5-28 06:59:31
XBV00003.VDF : 7.11.85.214 2162688 Bytes 2013-6-21 06:59:31
XBV00004.VDF : 7.11.91.176 3903488 Bytes 2013-7-23 06:59:31
XBV00005.VDF : 7.11.98.186 6822912 Bytes 2013-8-29 06:59:31
XBV00006.VDF : 7.11.139.38 15708672 Bytes 2014-3-27 06:59:31
XBV00007.VDF : 7.11.152.100 4193792 Bytes 2014-6-2 06:59:31
XBV00008.VDF : 8.11.165.192 4251136 Bytes 2014-8-7 06:59:31
XBV00009.VDF : 8.11.172.30 2094080 Bytes 2014-9-15 06:59:31
XBV00010.VDF : 8.11.178.32 1581056 Bytes 2014-10-14 06:59:31
XBV00011.VDF : 8.11.184.50 2178560 Bytes 2014-11-11 06:59:31
XBV00012.VDF : 8.11.190.32 1876992 Bytes 2014-12-3 06:59:31
XBV00013.VDF : 8.11.201.28 2973696 Bytes 2015-1-14 06:59:31
XBV00014.VDF : 8.11.206.252 2695680 Bytes 2015-2-4 06:59:31
XBV00015.VDF : 8.11.213.84 3175936 Bytes 2015-3-3 06:59:31
XBV00016.VDF : 8.11.213.176 212480 Bytes 2015-3-5 06:59:31
XBV00017.VDF : 8.11.219.166 2033664 Bytes 2015-3-25 02:10:10
XBV00018.VDF : 8.11.225.88 2367488 Bytes 2015-4-22 02:10:10
XBV00042.VDF : 8.11.225.112 23040 Bytes 2015-4-22 02:10:10
XBV00043.VDF : 8.11.225.138 2048 Bytes 2015-4-22 02:10:10
XBV00044.VDF : 8.11.225.164 43520 Bytes 2015-4-22 02:10:11
XBV00045.VDF : 8.11.225.188 27136 Bytes 2015-4-22 02:10:11
XBV00046.VDF : 8.11.225.190 2048 Bytes 2015-4-22 02:10:11
XBV00047.VDF : 8.11.225.192 24064 Bytes 2015-4-22 02:10:11
XBV00048.VDF : 8.11.225.196 35328 Bytes 2015-4-23 02:10:11
XBV00049.VDF : 8.11.225.198 14848 Bytes 2015-4-23 02:10:11
XBV00050.VDF : 8.11.225.202 2048 Bytes 2015-4-23 02:10:11
XBV00051.VDF : 8.11.225.224 30208 Bytes 2015-4-23 02:10:11
XBV00052.VDF : 8.11.225.244 2048 Bytes 2015-4-23 02:10:11
XBV00053.VDF : 8.11.226.8 21504 Bytes 2015-4-23 02:10:11
XBV00054.VDF : 8.11.226.30 35328 Bytes 2015-4-23 02:10:11
XBV00055.VDF : 8.11.226.34 2048 Bytes 2015-4-24 02:10:11
XBV00056.VDF : 8.11.226.42 32256 Bytes 2015-4-24 02:10:11
XBV00057.VDF : 8.11.226.44 39424 Bytes 2015-4-24 02:10:11
XBV00058.VDF : 8.11.226.46 7680 Bytes 2015-4-24 02:10:11
XBV00059.VDF : 8.11.226.48 6656 Bytes 2015-4-24 02:10:11
XBV00060.VDF : 8.11.226.68 14336 Bytes 2015-4-24 02:10:11
XBV00061.VDF : 8.11.226.88 19456 Bytes 2015-4-24 02:10:11
XBV00062.VDF : 8.11.226.112 24576 Bytes 2015-4-24 02:10:11
XBV00063.VDF : 8.11.226.134 55808 Bytes 2015-4-25 02:10:11
XBV00064.VDF : 8.11.226.136 2560 Bytes 2015-4-25 02:10:11
XBV00065.VDF : 8.11.226.138 9728 Bytes 2015-4-25 02:10:11
XBV00066.VDF : 8.11.226.140 12800 Bytes 2015-4-25 02:10:11
XBV00067.VDF : 8.11.226.160 94208 Bytes 2015-4-26 09:37:05
XBV00068.VDF : 8.11.226.178 10240 Bytes 2015-4-26 11:20:56
XBV00069.VDF : 8.11.226.196 10240 Bytes 2015-4-26 13:37:20
XBV00070.VDF : 8.11.226.214 7680 Bytes 2015-4-26 00:50:59
XBV00071.VDF : 8.11.226.216 59904 Bytes 2015-4-27 10:08:49
XBV00072.VDF : 8.11.226.220 7168 Bytes 2015-4-27 10:08:50
XBV00073.VDF : 8.11.226.222 10752 Bytes 2015-4-27 10:08:50
XBV00074.VDF : 8.11.226.242 10752 Bytes 2015-4-27 12:08:42
XBV00075.VDF : 8.11.227.4 23040 Bytes 2015-4-27 14:09:02
XBV00076.VDF : 8.11.227.6 2048 Bytes 2015-4-27 14:09:03
XBV00077.VDF : 8.11.227.28 52736 Bytes 2015-4-27 00:30:04
XBV00078.VDF : 8.11.227.46 9216 Bytes 2015-4-27 00:30:04
XBV00079.VDF : 8.11.227.52 11264 Bytes 2015-4-27 00:30:05
XBV00080.VDF : 8.11.227.54 6656 Bytes 2015-4-28 00:30:05
XBV00081.VDF : 8.11.227.56 5120 Bytes 2015-4-28 09:52:18
XBV00082.VDF : 8.11.227.58 26112 Bytes 2015-4-28 09:52:19
XBV00083.VDF : 8.11.227.78 6144 Bytes 2015-4-28 09:52:20
XBV00084.VDF : 8.11.227.94 6656 Bytes 2015-4-28 09:52:22
XBV00085.VDF : 8.11.227.110 5632 Bytes 2015-4-28 09:52:23
XBV00086.VDF : 8.11.227.126 15872 Bytes 2015-4-28 11:07:07
XBV00087.VDF : 8.11.227.130 41984 Bytes 2015-4-28 02:02:37
XBV00088.VDF : 8.11.227.132 7168 Bytes 2015-4-28 02:02:37
XBV00089.VDF : 8.11.227.134 17408 Bytes 2015-4-28 02:02:38
XBV00090.VDF : 8.11.227.136 7168 Bytes 2015-4-28 02:02:38
XBV00091.VDF : 8.11.227.138 11776 Bytes 2015-4-28 02:02:38
XBV00092.VDF : 8.11.227.140 19456 Bytes 2015-4-29 06:07:41
XBV00093.VDF : 8.11.227.156 32256 Bytes 2015-4-29 06:07:42
XBV00094.VDF : 8.11.227.172 7168 Bytes 2015-4-29 08:53:38
XBV00095.VDF : 8.11.227.188 7680 Bytes 2015-4-29 11:51:45
XBV00096.VDF : 8.11.227.190 2048 Bytes 2015-4-29 11:51:45
XBV00097.VDF : 8.11.227.206 23040 Bytes 2015-4-29 03:17:36
XBV00098.VDF : 8.11.227.208 2048 Bytes 2015-4-29 03:17:37
XBV00099.VDF : 8.11.227.212 55808 Bytes 2015-4-29 03:17:37
XBV00100.VDF : 8.11.227.216 2560 Bytes 2015-4-29 03:17:38
XBV00101.VDF : 8.11.227.232 13824 Bytes 2015-4-29 03:17:38
XBV00102.VDF : 8.11.227.246 7680 Bytes 2015-4-29 03:17:38
XBV00103.VDF : 8.11.228.6 30208 Bytes 2015-4-30 09:18:38
XBV00104.VDF : 8.11.228.8 2048 Bytes 2015-4-30 09:18:38
XBV00105.VDF : 8.11.228.22 2048 Bytes 2015-4-30 09:18:39
XBV00106.VDF : 8.11.228.36 15360 Bytes 2015-4-30 11:14:25
XBV00107.VDF : 8.11.228.38 6656 Bytes 2015-4-30 15:14:14
XBV00108.VDF : 8.11.228.40 2048 Bytes 2015-4-30 15:14:14
XBV00109.VDF : 8.11.228.42 8704 Bytes 2015-4-30 15:14:15
XBV00110.VDF : 8.11.228.44 8192 Bytes 2015-4-30 15:14:15
XBV00111.VDF : 8.11.228.46 23040 Bytes 2015-4-30 00:03:35
XBV00112.VDF : 8.11.228.50 46080 Bytes 2015-4-30 00:03:36
XBV00113.VDF : 8.11.228.52 6656 Bytes 2015-4-30 00:03:36
LOCAL001.VDF : 8.11.228.52 128626688 Bytes 2015-4-30 00:05:21
Engine version : 8.3.30.28
AEVDF.DLL : 8.3.1.6 133992 Bytes 2015-3-24 06:59:23
AESCRIPT.DLL : 8.2.2.62 567208 Bytes 2015-4-26 02:10:10
AESCN.DLL : 8.3.2.2 139456 Bytes 2015-3-24 06:59:23
AESBX.DLL : 8.2.20.34 1615784 Bytes 2015-3-24 06:59:23
AERDL.DLL : 8.2.1.20 731040 Bytes 2015-3-24 06:59:23
AEPACK.DLL : 8.4.0.62 793456 Bytes 2015-3-24 06:59:23
AEOFFICE.DLL : 8.3.1.22 363376 Bytes 2015-4-26 02:10:10
AEMOBILE.DLL : 8.1.7.2 281720 Bytes 2015-4-26 02:10:10
AEHEUR.DLL : 8.1.4.1668 8289136 Bytes 2015-4-30 09:18:36
AEHELP.DLL : 8.3.2.0 281456 Bytes 2015-3-24 06:59:23
AEGEN.DLL : 8.1.7.40 456608 Bytes 2015-3-24 06:59:23
AEEXP.DLL : 8.4.2.82 260968 Bytes 2015-4-26 02:10:10
AEEMU.DLL : 8.1.3.4 399264 Bytes 2015-3-24 06:59:23
AEDROID.DLL : 8.4.3.116 1050536 Bytes 2015-3-24 06:59:23
AECORE.DLL : 8.3.4.0 243624 Bytes 2015-3-24 06:59:23
AEBB.DLL : 8.1.2.0 60448 Bytes 2015-3-24 06:59:23
AVWINLL.DLL : 15.0.9.460 26872 Bytes 2015-3-24 06:59:29
AVPREF.DLL : 15.0.9.460 52984 Bytes 2015-3-24 06:59:28
AVREP.DLL : 15.0.9.460 220464 Bytes 2015-3-24 06:59:28
AVARKT.DLL : 15.0.9.460 228088 Bytes 2015-3-24 06:59:24
AVEVTLOG.DLL : 15.0.9.460 193328 Bytes 2015-3-24 06:59:25
SQLITE3.DLL : 15.0.9.460 455472 Bytes 2015-3-24 06:59:31
AVSMTP.DLL : 15.0.9.460 79096 Bytes 2015-3-24 06:59:28
NETNT.DLL : 15.0.9.460 15152 Bytes 2015-3-24 06:59:30
CommonImageRc.dll: 15.0.9.460 4355376 Bytes 2015-3-24 06:59:30
CommonTextRc.DLL: 15.0.9.476 71416 Bytes 2015-3-24 06:59:30
Configuration settings for the scan:
Jobname.............................: ShlExt
Configuration file..................: C:\DOCUME~1\ADMINS~1\LOCALS~1\Temp\0b21a72a.avp
Reporting...........................: default
Primary action......................: Interactive
Secondary action....................: Ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:,
Process scan........................: off
Scan registry.......................: off
Search for rootkits.................: off
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Limit recursion depth...............: 20
Smart extensions....................: on
Deviating archive types.............: +, +, +, +, +, +, +, +,
Macrovirus heuristic................: on
File heuristic......................: Complete
Deviating risk categories...........: +APPL,+JOKE,+SPR,
Start of the scan: 2015年5月1日 10:54
Starting the file scan:
Begin scan in 'C:\Documents and Settings\adminstartor\桌面\2015.5.1'
C:\Documents and Settings\adminstartor\桌面\2015.5.1\001.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\002.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\003.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\004.vir
[DETECTION] Is the TR/Spy.Gen2 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\005.vir
[DETECTION] Is the TR/Starter.Y Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\006.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\007.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\008.vir
[DETECTION] Is the TR/Downloader.Gen Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\009.vir
[DETECTION] Is the TR/Crypt.XDR.Gen Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\010.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\011.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\012.vir
[DETECTION] Contains virus patterns of Adware ADWARE/BrowseFox.Gen
C:\Documents and Settings\adminstartor\桌面\2015.5.1\013.vir
[DETECTION] Is the TR/Dropper.Gen Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\014.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\015.vir
[DETECTION] Contains virus patterns of Adware ADWARE/BrowseFox.Gen7
C:\Documents and Settings\adminstartor\桌面\2015.5.1\016.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\017.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\018.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\019.vir
[DETECTION] Contains virus patterns of Adware ADWARE/Wajam.1081344
C:\Documents and Settings\adminstartor\桌面\2015.5.1\020.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\021.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\022.vir
[DETECTION] Is the TR/Spy.Gen Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\023.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\024.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\025.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\026.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\027.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\029.vir
[DETECTION] Is the TR/Agent.boows Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\030.vir
[DETECTION] Contains a recognition pattern of the (harmful) BDS/SpyBot.1412608 back-door program
C:\Documents and Settings\adminstartor\桌面\2015.5.1\031.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\032.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\033.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\034.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\035.vir
[DETECTION] Is the TR/PSW.OGames.AC Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\036.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\037.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen2 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\038.vir
[DETECTION] Is the TR/Agent.18944.298 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\039.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\040.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\041.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\042.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\043.vir
[DETECTION] Is the TR/Agent.18944.298 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\044.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\045.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen2 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\046.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\047.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\048.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\049.vir
[DETECTION] Is the TR/Rogue.104050271 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\050.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\051.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\052.vir
[DETECTION] Is the TR/PSW.OGames.AC Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\053.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\054.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\055.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\056.vir
[DETECTION] Is the TR/Starter.Y Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\057.vir
[DETECTION] Is the TR/Starter.Y Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\058.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen2 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\059.vir
[DETECTION] Contains patterns of software PUA/Linkury.iona
C:\Documents and Settings\adminstartor\桌面\2015.5.1\060.vir
[DETECTION] Is the TR/Downloader.Gen Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\061.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\062.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\063.vir
[DETECTION] Is the TR/Unpacked.Gen Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\064.vir
[DETECTION] Contains virus patterns of Adware ADWARE/Wajam.1087488.2
C:\Documents and Settings\adminstartor\桌面\2015.5.1\065.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\066.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\067.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\068.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\069.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\070.vir
[DETECTION] Contains recognition pattern of the WORM/Debris.J.1 worm
C:\Documents and Settings\adminstartor\桌面\2015.5.1\071.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\073.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen7 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\075.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\077.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\078.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\079.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\080.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\081.vir
[DETECTION] Contains virus patterns of Adware ADWARE/BrowseFox.Gen7
C:\Documents and Settings\adminstartor\桌面\2015.5.1\082.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\083.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\084.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\085.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\086.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\087.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\088.vir
[DETECTION] Contains recognition pattern of the WORM/Gamarue.409654 worm
C:\Documents and Settings\adminstartor\桌面\2015.5.1\089.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\090.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\091.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\092.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\093.vir
[DETECTION] Contains virus patterns of Adware ADWARE/Wajam.Gen
C:\Documents and Settings\adminstartor\桌面\2015.5.1\094.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\095.vir
[DETECTION] Contains virus patterns of Adware ADWARE/BrowseFox.Gen7
C:\Documents and Settings\adminstartor\桌面\2015.5.1\096.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\097.vir
[DETECTION] Is the TR/Graftor.1080321 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.1\098.vir
[DETECTION] Contains virus patterns of Adware ADWARE/Wajam.1081344
C:\Documents and Settings\adminstartor\桌面\2015.5.1\099.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.1\100.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
Beginning disinfection:
[INFO] RepairMalware: Disinfection of malware W32/Ramnit.C needs a reboot to complete
[INFO] RepairMalware: Disinfection of malware W32/Ramnit.C needs a reboot to complete
[INFO] RepairMalware: Disinfection of malware W32/Ramnit.C needs a reboot to complete
[INFO] RepairMalware: Disinfection of malware W32/Ramnit.C needs a reboot to complete
[INFO] RepairMalware: Disinfection of malware W32/Ramnit.C needs a reboot to complete
[INFO] RepairMalware: Disinfection of malware W32/Ramnit.C needs a reboot to complete
[INFO] RepairMalware: Disinfection of malware W32/Ramnit.C needs a reboot to complete
[INFO] RepairMalware: Disinfection of malware W32/Ramnit.C needs a reboot to complete
[INFO] RepairMalware: Disinfection of malware W32/Ramnit.C needs a reboot to complete
[INFO] RepairMalware: Disinfection of malware W32/Ramnit.C needs a reboot to complete
[INFO] RepairMalware: Disinfection of malware W32/Ramnit.C needs a reboot to complete
[INFO] RepairMalware: Disinfection of malware W32/Ramnit.C needs a reboot to complete
[INFO] RepairMalware: Disinfection of malware W32/Ramnit.C needs a reboot to complete
[INFO] RepairMalware: Disinfection of malware W32/Ramnit.C needs a reboot to complete
[INFO] RepairMalware: Disinfection of malware W32/Ramnit.C needs a reboot to complete
C:\Documents and Settings\adminstartor\桌面\2015.5.1\100.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '510b4fd6.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\099.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\098.vir
[DETECTION] Contains virus patterns of Adware ADWARE/Wajam.1081344
[NOTE] The file was moved to the quarantine directory under the name '49946004.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\097.vir
[DETECTION] Is the TR/Graftor.1080321 Trojan
[NOTE] The file was moved to the quarantine directory under the name '1bc83aec.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\096.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\095.vir
[DETECTION] Contains virus patterns of Adware ADWARE/BrowseFox.Gen7
[NOTE] The file was moved to the quarantine directory under the name '7df17537.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\094.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\093.vir
[DETECTION] Contains virus patterns of Adware ADWARE/Wajam.Gen
[NOTE] The file was moved to the quarantine directory under the name '38775802.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\092.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\091.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\090.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\089.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\088.vir
[DETECTION] Contains recognition pattern of the WORM/Gamarue.409654 worm
[NOTE] The file was moved to the quarantine directory under the name '47636a60.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\087.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\086.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\085.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\084.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\083.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\082.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\081.vir
[DETECTION] Contains virus patterns of Adware ADWARE/BrowseFox.Gen7
[NOTE] The file was moved to the quarantine directory under the name '0bd24610.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\080.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\079.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\078.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '77c30641.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\077.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\075.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\073.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen7 Trojan
[NOTE] The file was moved to the quarantine directory under the name '5a96290c.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\071.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\070.vir
[DETECTION] Contains recognition pattern of the WORM/Debris.J.1 worm
[NOTE] The file was moved to the quarantine directory under the name '43f91296.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\069.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\068.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\067.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\066.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\065.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\064.vir
[DETECTION] Contains virus patterns of Adware ADWARE/Wajam.1087488.2
[NOTE] The file was moved to the quarantine directory under the name '2fa13ead.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\063.vir
[DETECTION] Is the TR/Unpacked.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '5e1b0738.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\062.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '500037ff.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\061.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\060.vir
[DETECTION] Is the TR/Downloader.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '152f4ebd.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\059.vir
[DETECTION] Contains patterns of software PUA/Linkury.iona
[NOTE] The file was moved to the quarantine directory under the name '1c2d4a0e.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\058.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen2 Trojan
[NOTE] The file was moved to the quarantine directory under the name '446d5367.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\057.vir
[DETECTION] Is the TR/Starter.Y Trojan
[NOTE] The file was moved to the quarantine directory under the name '689a2aab.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\056.vir
[DETECTION] Is the TR/Starter.Y Trojan
[NOTE] The file was moved to the quarantine directory under the name '56654a71.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\055.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\054.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\053.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '35666102.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\052.vir
[DETECTION] Is the TR/PSW.OGames.AC Trojan
[NOTE] The file was moved to the quarantine directory under the name '13af211f.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\051.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\050.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '213d5aba.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\049.vir
[DETECTION] Is the TR/Rogue.104050271 Trojan
[NOTE] The file was moved to the quarantine directory under the name '2b7171c5.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\048.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '14231580.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\047.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '6a0c19a7.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\046.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '3f751d6c.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\045.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen2 Trojan
[NOTE] The file was moved to the quarantine directory under the name '32ec6c44.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\044.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\043.vir
[DETECTION] Is the TR/Agent.18944.298 Trojan
[NOTE] The file was moved to the quarantine directory under the name '2eb3784d.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\042.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\041.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '1f663583.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\040.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '733121b5.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\039.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '3aa204b2.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\038.vir
[DETECTION] Is the TR/Agent.18944.298 Trojan
[NOTE] The file was moved to the quarantine directory under the name '61360c63.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\037.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen2 Trojan
[NOTE] The file was moved to the quarantine directory under the name '0787008a.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\036.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\035.vir
[DETECTION] Is the TR/PSW.OGames.AC Trojan
[NOTE] The file was moved to the quarantine directory under the name '50077222.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\034.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\033.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\032.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '72742556.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\031.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '1a635fc0.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\030.vir
[DETECTION] Contains a recognition pattern of the (harmful) BDS/SpyBot.1412608 back-door program
[NOTE] The file was moved to the quarantine directory under the name '3a145b45.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\029.vir
[DETECTION] Is the TR/Agent.boows Trojan
[NOTE] The file was moved to the quarantine directory under the name '6f391df6.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\027.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\026.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\025.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\024.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\023.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\022.vir
[DETECTION] Is the TR/Spy.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '0e163c49.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\021.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '6bbd7ec2.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\020.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\019.vir
[DETECTION] Contains virus patterns of Adware ADWARE/Wajam.1081344
[NOTE] The file was moved to the quarantine directory under the name '0e620a6b.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\018.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '1d8736f8.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\017.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\016.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\015.vir
[DETECTION] Contains virus patterns of Adware ADWARE/BrowseFox.Gen7
[NOTE] The file was moved to the quarantine directory under the name '0f334aba.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\014.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\013.vir
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '18612909.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\012.vir
[DETECTION] Contains virus patterns of Adware ADWARE/BrowseFox.Gen
[NOTE] The file was moved to the quarantine directory under the name '42421b91.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\011.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\010.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\009.vir
[DETECTION] Is the TR/Crypt.XDR.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '67406184.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\008.vir
[DETECTION] Is the TR/Downloader.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '131a79f7.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\007.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '311b2b7b.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\006.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\005.vir
[DETECTION] Is the TR/Starter.Y Trojan
[NOTE] The file was moved to the quarantine directory under the name '44865362.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\004.vir
[DETECTION] Is the TR/Spy.Gen2 Trojan
[NOTE] The file was moved to the quarantine directory under the name '6fd00f62.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.1\003.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\002.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.1\001.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
End of the scan: 2015年5月1日 10:56
Used time: 00:23 Minute(s)
The scan has been done completely.
1 Scanned directories
100 Files were scanned
96 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 Files were deleted
47 Viruses and unwanted programs were repaired
49 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
4 Files not concerned
6 Archives were scanned
0 Warnings
96 Notes
[/mw_shl_code]
[mw_shl_code=css,true]
Antivirus Pro
Report file date: 2015年5月1日 10:57
The program is running as an unrestricted full version.
Online services are available.
Platform : Microsoft Windows XP
Windows version : (Service Pack 3) [5.1.2600]
Boot mode : Normally booted
Username : adminstartor
Computer name : 23Q2JEHX1NUPHVO
Version information:
BUILD.DAT : 15.0.9.504 94784 Bytes 2015-3-24 14:59:00
AVSCAN.EXE : 15.0.9.504 1027528 Bytes 2015-3-24 06:59:28
AVSCANRC.DLL : 15.0.9.460 54064 Bytes 2015-3-24 06:59:28
LUKE.DLL : 15.0.9.460 60664 Bytes 2015-3-24 06:59:30
AVSCPLR.DLL : 15.0.9.460 95536 Bytes 2015-3-24 06:59:28
REPAIR.DLL : 15.0.9.504 374064 Bytes 2015-3-24 06:59:28
REPAIR.RDF : 1.0.7.58 881292 Bytes 2015-4-30 09:18:50
AVREG.DLL : 15.0.9.460 273712 Bytes 2015-3-24 06:59:28
AVLODE.DLL : 15.0.9.504 596272 Bytes 2015-3-24 06:59:26
AVLODE.RDF : 14.0.4.64 79226 Bytes 2015-4-26 02:10:10
XBV00019.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00020.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00021.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00022.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00023.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00024.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00025.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00026.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00027.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00028.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00029.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00030.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00031.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00032.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00033.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00034.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00035.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00036.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00037.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00038.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00039.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00040.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00041.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00114.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00115.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00116.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00117.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00118.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00119.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00120.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00121.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00122.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00123.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00124.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00125.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00126.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00127.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00128.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00129.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00130.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00131.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00132.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00133.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00134.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00135.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00136.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00137.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00138.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00139.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00140.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00141.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00142.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00143.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00144.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00145.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00146.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00147.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00148.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00149.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00150.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00151.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00152.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00153.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00154.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00155.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00156.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00157.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00158.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00159.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00160.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00161.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00162.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00163.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00164.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00165.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00166.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00167.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00168.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00169.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00170.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00171.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00172.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00173.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00174.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00175.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00176.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00177.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00178.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00179.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00180.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00181.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00182.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00183.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00184.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00185.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00186.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00187.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00188.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00189.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00190.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00191.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00192.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00193.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00194.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00195.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00196.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00197.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00198.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00199.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00200.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00201.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00202.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00203.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00204.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00205.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00206.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00207.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00208.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00209.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00210.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00211.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00212.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00213.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00214.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00215.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00216.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00217.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00218.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00219.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00220.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00221.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00222.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00223.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00224.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00225.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00226.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00227.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00228.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00229.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00230.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00231.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00232.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00233.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00234.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00235.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00236.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00237.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00238.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00239.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00240.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00241.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00242.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00243.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00244.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00245.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00246.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00247.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00248.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00249.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00250.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00251.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00252.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00253.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00254.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00255.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00000.VDF : 7.11.70.0 66736640 Bytes 2013-4-4 06:59:31
XBV00001.VDF : 7.11.74.226 2201600 Bytes 2013-4-30 06:59:31
XBV00002.VDF : 7.11.80.60 2751488 Bytes 2013-5-28 06:59:31
XBV00003.VDF : 7.11.85.214 2162688 Bytes 2013-6-21 06:59:31
XBV00004.VDF : 7.11.91.176 3903488 Bytes 2013-7-23 06:59:31
XBV00005.VDF : 7.11.98.186 6822912 Bytes 2013-8-29 06:59:31
XBV00006.VDF : 7.11.139.38 15708672 Bytes 2014-3-27 06:59:31
XBV00007.VDF : 7.11.152.100 4193792 Bytes 2014-6-2 06:59:31
XBV00008.VDF : 8.11.165.192 4251136 Bytes 2014-8-7 06:59:31
XBV00009.VDF : 8.11.172.30 2094080 Bytes 2014-9-15 06:59:31
XBV00010.VDF : 8.11.178.32 1581056 Bytes 2014-10-14 06:59:31
XBV00011.VDF : 8.11.184.50 2178560 Bytes 2014-11-11 06:59:31
XBV00012.VDF : 8.11.190.32 1876992 Bytes 2014-12-3 06:59:31
XBV00013.VDF : 8.11.201.28 2973696 Bytes 2015-1-14 06:59:31
XBV00014.VDF : 8.11.206.252 2695680 Bytes 2015-2-4 06:59:31
XBV00015.VDF : 8.11.213.84 3175936 Bytes 2015-3-3 06:59:31
XBV00016.VDF : 8.11.213.176 212480 Bytes 2015-3-5 06:59:31
XBV00017.VDF : 8.11.219.166 2033664 Bytes 2015-3-25 02:10:10
XBV00018.VDF : 8.11.225.88 2367488 Bytes 2015-4-22 02:10:10
XBV00042.VDF : 8.11.225.112 23040 Bytes 2015-4-22 02:10:10
XBV00043.VDF : 8.11.225.138 2048 Bytes 2015-4-22 02:10:10
XBV00044.VDF : 8.11.225.164 43520 Bytes 2015-4-22 02:10:11
XBV00045.VDF : 8.11.225.188 27136 Bytes 2015-4-22 02:10:11
XBV00046.VDF : 8.11.225.190 2048 Bytes 2015-4-22 02:10:11
XBV00047.VDF : 8.11.225.192 24064 Bytes 2015-4-22 02:10:11
XBV00048.VDF : 8.11.225.196 35328 Bytes 2015-4-23 02:10:11
XBV00049.VDF : 8.11.225.198 14848 Bytes 2015-4-23 02:10:11
XBV00050.VDF : 8.11.225.202 2048 Bytes 2015-4-23 02:10:11
XBV00051.VDF : 8.11.225.224 30208 Bytes 2015-4-23 02:10:11
XBV00052.VDF : 8.11.225.244 2048 Bytes 2015-4-23 02:10:11
XBV00053.VDF : 8.11.226.8 21504 Bytes 2015-4-23 02:10:11
XBV00054.VDF : 8.11.226.30 35328 Bytes 2015-4-23 02:10:11
XBV00055.VDF : 8.11.226.34 2048 Bytes 2015-4-24 02:10:11
XBV00056.VDF : 8.11.226.42 32256 Bytes 2015-4-24 02:10:11
XBV00057.VDF : 8.11.226.44 39424 Bytes 2015-4-24 02:10:11
XBV00058.VDF : 8.11.226.46 7680 Bytes 2015-4-24 02:10:11
XBV00059.VDF : 8.11.226.48 6656 Bytes 2015-4-24 02:10:11
XBV00060.VDF : 8.11.226.68 14336 Bytes 2015-4-24 02:10:11
XBV00061.VDF : 8.11.226.88 19456 Bytes 2015-4-24 02:10:11
XBV00062.VDF : 8.11.226.112 24576 Bytes 2015-4-24 02:10:11
XBV00063.VDF : 8.11.226.134 55808 Bytes 2015-4-25 02:10:11
XBV00064.VDF : 8.11.226.136 2560 Bytes 2015-4-25 02:10:11
XBV00065.VDF : 8.11.226.138 9728 Bytes 2015-4-25 02:10:11
XBV00066.VDF : 8.11.226.140 12800 Bytes 2015-4-25 02:10:11
XBV00067.VDF : 8.11.226.160 94208 Bytes 2015-4-26 09:37:05
XBV00068.VDF : 8.11.226.178 10240 Bytes 2015-4-26 11:20:56
XBV00069.VDF : 8.11.226.196 10240 Bytes 2015-4-26 13:37:20
XBV00070.VDF : 8.11.226.214 7680 Bytes 2015-4-26 00:50:59
XBV00071.VDF : 8.11.226.216 59904 Bytes 2015-4-27 10:08:49
XBV00072.VDF : 8.11.226.220 7168 Bytes 2015-4-27 10:08:50
XBV00073.VDF : 8.11.226.222 10752 Bytes 2015-4-27 10:08:50
XBV00074.VDF : 8.11.226.242 10752 Bytes 2015-4-27 12:08:42
XBV00075.VDF : 8.11.227.4 23040 Bytes 2015-4-27 14:09:02
XBV00076.VDF : 8.11.227.6 2048 Bytes 2015-4-27 14:09:03
XBV00077.VDF : 8.11.227.28 52736 Bytes 2015-4-27 00:30:04
XBV00078.VDF : 8.11.227.46 9216 Bytes 2015-4-27 00:30:04
XBV00079.VDF : 8.11.227.52 11264 Bytes 2015-4-27 00:30:05
XBV00080.VDF : 8.11.227.54 6656 Bytes 2015-4-28 00:30:05
XBV00081.VDF : 8.11.227.56 5120 Bytes 2015-4-28 09:52:18
XBV00082.VDF : 8.11.227.58 26112 Bytes 2015-4-28 09:52:19
XBV00083.VDF : 8.11.227.78 6144 Bytes 2015-4-28 09:52:20
XBV00084.VDF : 8.11.227.94 6656 Bytes 2015-4-28 09:52:22
XBV00085.VDF : 8.11.227.110 5632 Bytes 2015-4-28 09:52:23
XBV00086.VDF : 8.11.227.126 15872 Bytes 2015-4-28 11:07:07
XBV00087.VDF : 8.11.227.130 41984 Bytes 2015-4-28 02:02:37
XBV00088.VDF : 8.11.227.132 7168 Bytes 2015-4-28 02:02:37
XBV00089.VDF : 8.11.227.134 17408 Bytes 2015-4-28 02:02:38
XBV00090.VDF : 8.11.227.136 7168 Bytes 2015-4-28 02:02:38
XBV00091.VDF : 8.11.227.138 11776 Bytes 2015-4-28 02:02:38
XBV00092.VDF : 8.11.227.140 19456 Bytes 2015-4-29 06:07:41
XBV00093.VDF : 8.11.227.156 32256 Bytes 2015-4-29 06:07:42
XBV00094.VDF : 8.11.227.172 7168 Bytes 2015-4-29 08:53:38
XBV00095.VDF : 8.11.227.188 7680 Bytes 2015-4-29 11:51:45
XBV00096.VDF : 8.11.227.190 2048 Bytes 2015-4-29 11:51:45
XBV00097.VDF : 8.11.227.206 23040 Bytes 2015-4-29 03:17:36
XBV00098.VDF : 8.11.227.208 2048 Bytes 2015-4-29 03:17:37
XBV00099.VDF : 8.11.227.212 55808 Bytes 2015-4-29 03:17:37
XBV00100.VDF : 8.11.227.216 2560 Bytes 2015-4-29 03:17:38
XBV00101.VDF : 8.11.227.232 13824 Bytes 2015-4-29 03:17:38
XBV00102.VDF : 8.11.227.246 7680 Bytes 2015-4-29 03:17:38
XBV00103.VDF : 8.11.228.6 30208 Bytes 2015-4-30 09:18:38
XBV00104.VDF : 8.11.228.8 2048 Bytes 2015-4-30 09:18:38
XBV00105.VDF : 8.11.228.22 2048 Bytes 2015-4-30 09:18:39
XBV00106.VDF : 8.11.228.36 15360 Bytes 2015-4-30 11:14:25
XBV00107.VDF : 8.11.228.38 6656 Bytes 2015-4-30 15:14:14
XBV00108.VDF : 8.11.228.40 2048 Bytes 2015-4-30 15:14:14
XBV00109.VDF : 8.11.228.42 8704 Bytes 2015-4-30 15:14:15
XBV00110.VDF : 8.11.228.44 8192 Bytes 2015-4-30 15:14:15
XBV00111.VDF : 8.11.228.46 23040 Bytes 2015-4-30 00:03:35
XBV00112.VDF : 8.11.228.50 46080 Bytes 2015-4-30 00:03:36
XBV00113.VDF : 8.11.228.52 6656 Bytes 2015-4-30 00:03:36
LOCAL001.VDF : 8.11.228.52 128626688 Bytes 2015-4-30 00:05:21
Engine version : 8.3.30.28
AEVDF.DLL : 8.3.1.6 133992 Bytes 2015-3-24 06:59:23
AESCRIPT.DLL : 8.2.2.62 567208 Bytes 2015-4-26 02:10:10
AESCN.DLL : 8.3.2.2 139456 Bytes 2015-3-24 06:59:23
AESBX.DLL : 8.2.20.34 1615784 Bytes 2015-3-24 06:59:23
AERDL.DLL : 8.2.1.20 731040 Bytes 2015-3-24 06:59:23
AEPACK.DLL : 8.4.0.62 793456 Bytes 2015-3-24 06:59:23
AEOFFICE.DLL : 8.3.1.22 363376 Bytes 2015-4-26 02:10:10
AEMOBILE.DLL : 8.1.7.2 281720 Bytes 2015-4-26 02:10:10
AEHEUR.DLL : 8.1.4.1668 8289136 Bytes 2015-4-30 09:18:36
AEHELP.DLL : 8.3.2.0 281456 Bytes 2015-3-24 06:59:23
AEGEN.DLL : 8.1.7.40 456608 Bytes 2015-3-24 06:59:23
AEEXP.DLL : 8.4.2.82 260968 Bytes 2015-4-26 02:10:10
AEEMU.DLL : 8.1.3.4 399264 Bytes 2015-3-24 06:59:23
AEDROID.DLL : 8.4.3.116 1050536 Bytes 2015-3-24 06:59:23
AECORE.DLL : 8.3.4.0 243624 Bytes 2015-3-24 06:59:23
AEBB.DLL : 8.1.2.0 60448 Bytes 2015-3-24 06:59:23
AVWINLL.DLL : 15.0.9.460 26872 Bytes 2015-3-24 06:59:29
AVPREF.DLL : 15.0.9.460 52984 Bytes 2015-3-24 06:59:28
AVREP.DLL : 15.0.9.460 220464 Bytes 2015-3-24 06:59:28
AVARKT.DLL : 15.0.9.460 228088 Bytes 2015-3-24 06:59:24
AVEVTLOG.DLL : 15.0.9.460 193328 Bytes 2015-3-24 06:59:25
SQLITE3.DLL : 15.0.9.460 455472 Bytes 2015-3-24 06:59:31
AVSMTP.DLL : 15.0.9.460 79096 Bytes 2015-3-24 06:59:28
NETNT.DLL : 15.0.9.460 15152 Bytes 2015-3-24 06:59:30
CommonImageRc.dll: 15.0.9.460 4355376 Bytes 2015-3-24 06:59:30
CommonTextRc.DLL: 15.0.9.476 71416 Bytes 2015-3-24 06:59:30
Configuration settings for the scan:
Jobname.............................: ShlExt
Configuration file..................: C:\DOCUME~1\ADMINS~1\LOCALS~1\Temp\1d61ad73.avp
Reporting...........................: default
Primary action......................: Interactive
Secondary action....................: Ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:,
Process scan........................: off
Scan registry.......................: off
Search for rootkits.................: off
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Limit recursion depth...............: 20
Smart extensions....................: on
Deviating archive types.............: +, +, +, +, +, +, +, +,
Macrovirus heuristic................: on
File heuristic......................: Complete
Deviating risk categories...........: +APPL,+JOKE,+SPR,
Start of the scan: 2015年5月1日 10:57
Starting the file scan:
Begin scan in 'C:\Documents and Settings\adminstartor\桌面\2015.5.1'
C:\Documents and Settings\adminstartor\桌面\2015.5.1\087.vir
[DETECTION] Contains code of the W32/Virut.X Windows virus
Beginning disinfection:
C:\Documents and Settings\adminstartor\桌面\2015.5.1\087.vir
[DETECTION] Contains code of the W32/Virut.X Windows virus
[NOTE] The file was moved to the quarantine directory under the name '511849b6.qua'!
End of the scan: 2015年5月1日 11:04
Used time: 00:00 Minute(s)
The scan has been done completely.
1 Scanned directories
51 Files were scanned
1 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 Files were deleted
0 Viruses and unwanted programs were repaired
1 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
50 Files not concerned
1 Archives were scanned
0 Warnings
1 Notes
[/mw_shl_code] |