红伞检测99,修复23,隔离76
[mw_shl_code=css,true]
Antivirus Pro
Report file date: 2015年5月2日 10:55
The program is running as an unrestricted full version.
Online services are available.
Platform : Microsoft Windows XP
Windows version : (Service Pack 3) [5.1.2600]
Boot mode : Normally booted
Username : adminstartor
Computer name : 23Q2JEHX1NUPHVO
Version information:
BUILD.DAT : 15.0.9.504 94784 Bytes 2015-3-24 14:59:00
AVSCAN.EXE : 15.0.9.504 1027528 Bytes 2015-3-24 06:59:28
AVSCANRC.DLL : 15.0.9.460 54064 Bytes 2015-3-24 06:59:28
LUKE.DLL : 15.0.9.460 60664 Bytes 2015-3-24 06:59:30
AVSCPLR.DLL : 15.0.9.460 95536 Bytes 2015-3-24 06:59:28
REPAIR.DLL : 15.0.9.504 374064 Bytes 2015-3-24 06:59:28
REPAIR.RDF : 1.0.7.58 881292 Bytes 2015-4-30 09:18:50
AVREG.DLL : 15.0.9.460 273712 Bytes 2015-3-24 06:59:28
AVLODE.DLL : 15.0.9.504 596272 Bytes 2015-3-24 06:59:26
AVLODE.RDF : 14.0.4.64 79226 Bytes 2015-4-26 02:10:10
XBV00019.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00020.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00021.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00022.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00023.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00024.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00025.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00026.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00027.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00028.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00029.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00030.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00031.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00032.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00033.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00034.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00035.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00036.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00037.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00038.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00039.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00040.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00041.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00118.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00119.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00120.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00121.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00122.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00123.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00124.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00125.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00126.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00127.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00128.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00129.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00130.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00131.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00132.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00133.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00134.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00135.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00136.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00137.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00138.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00139.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00140.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00141.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00142.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00143.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00144.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00145.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00146.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00147.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00148.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00149.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00150.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00151.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00152.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00153.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00154.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00155.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00156.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00157.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00158.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00159.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00160.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00161.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00162.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00163.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00164.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00165.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00166.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00167.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00168.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00169.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00170.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00171.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00172.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00173.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00174.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00175.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00176.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00177.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00178.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00179.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00180.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00181.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00182.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00183.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00184.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00185.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00186.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00187.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00188.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00189.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00190.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00191.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00192.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00193.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00194.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00195.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00196.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00197.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00198.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00199.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00200.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00201.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00202.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00203.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00204.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00205.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00206.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00207.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00208.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00209.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00210.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00211.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00212.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00213.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00214.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00215.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00216.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00217.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00218.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00219.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00220.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00221.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00222.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00223.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00224.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00225.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00226.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00227.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00228.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00229.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00230.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00231.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00232.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00233.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00234.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00235.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00236.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00237.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00238.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00239.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00240.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00241.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00242.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00243.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00244.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00245.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00246.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00247.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00248.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00249.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00250.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00251.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00252.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00253.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00254.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00255.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00000.VDF : 7.11.70.0 66736640 Bytes 2013-4-4 06:59:31
XBV00001.VDF : 7.11.74.226 2201600 Bytes 2013-4-30 06:59:31
XBV00002.VDF : 7.11.80.60 2751488 Bytes 2013-5-28 06:59:31
XBV00003.VDF : 7.11.85.214 2162688 Bytes 2013-6-21 06:59:31
XBV00004.VDF : 7.11.91.176 3903488 Bytes 2013-7-23 06:59:31
XBV00005.VDF : 7.11.98.186 6822912 Bytes 2013-8-29 06:59:31
XBV00006.VDF : 7.11.139.38 15708672 Bytes 2014-3-27 06:59:31
XBV00007.VDF : 7.11.152.100 4193792 Bytes 2014-6-2 06:59:31
XBV00008.VDF : 8.11.165.192 4251136 Bytes 2014-8-7 06:59:31
XBV00009.VDF : 8.11.172.30 2094080 Bytes 2014-9-15 06:59:31
XBV00010.VDF : 8.11.178.32 1581056 Bytes 2014-10-14 06:59:31
XBV00011.VDF : 8.11.184.50 2178560 Bytes 2014-11-11 06:59:31
XBV00012.VDF : 8.11.190.32 1876992 Bytes 2014-12-3 06:59:31
XBV00013.VDF : 8.11.201.28 2973696 Bytes 2015-1-14 06:59:31
XBV00014.VDF : 8.11.206.252 2695680 Bytes 2015-2-4 06:59:31
XBV00015.VDF : 8.11.213.84 3175936 Bytes 2015-3-3 06:59:31
XBV00016.VDF : 8.11.213.176 212480 Bytes 2015-3-5 06:59:31
XBV00017.VDF : 8.11.219.166 2033664 Bytes 2015-3-25 02:10:10
XBV00018.VDF : 8.11.225.88 2367488 Bytes 2015-4-22 02:10:10
XBV00042.VDF : 8.11.225.112 23040 Bytes 2015-4-22 02:10:10
XBV00043.VDF : 8.11.225.138 2048 Bytes 2015-4-22 02:10:10
XBV00044.VDF : 8.11.225.164 43520 Bytes 2015-4-22 02:10:11
XBV00045.VDF : 8.11.225.188 27136 Bytes 2015-4-22 02:10:11
XBV00046.VDF : 8.11.225.190 2048 Bytes 2015-4-22 02:10:11
XBV00047.VDF : 8.11.225.192 24064 Bytes 2015-4-22 02:10:11
XBV00048.VDF : 8.11.225.196 35328 Bytes 2015-4-23 02:10:11
XBV00049.VDF : 8.11.225.198 14848 Bytes 2015-4-23 02:10:11
XBV00050.VDF : 8.11.225.202 2048 Bytes 2015-4-23 02:10:11
XBV00051.VDF : 8.11.225.224 30208 Bytes 2015-4-23 02:10:11
XBV00052.VDF : 8.11.225.244 2048 Bytes 2015-4-23 02:10:11
XBV00053.VDF : 8.11.226.8 21504 Bytes 2015-4-23 02:10:11
XBV00054.VDF : 8.11.226.30 35328 Bytes 2015-4-23 02:10:11
XBV00055.VDF : 8.11.226.34 2048 Bytes 2015-4-24 02:10:11
XBV00056.VDF : 8.11.226.42 32256 Bytes 2015-4-24 02:10:11
XBV00057.VDF : 8.11.226.44 39424 Bytes 2015-4-24 02:10:11
XBV00058.VDF : 8.11.226.46 7680 Bytes 2015-4-24 02:10:11
XBV00059.VDF : 8.11.226.48 6656 Bytes 2015-4-24 02:10:11
XBV00060.VDF : 8.11.226.68 14336 Bytes 2015-4-24 02:10:11
XBV00061.VDF : 8.11.226.88 19456 Bytes 2015-4-24 02:10:11
XBV00062.VDF : 8.11.226.112 24576 Bytes 2015-4-24 02:10:11
XBV00063.VDF : 8.11.226.134 55808 Bytes 2015-4-25 02:10:11
XBV00064.VDF : 8.11.226.136 2560 Bytes 2015-4-25 02:10:11
XBV00065.VDF : 8.11.226.138 9728 Bytes 2015-4-25 02:10:11
XBV00066.VDF : 8.11.226.140 12800 Bytes 2015-4-25 02:10:11
XBV00067.VDF : 8.11.226.160 94208 Bytes 2015-4-26 09:37:05
XBV00068.VDF : 8.11.226.178 10240 Bytes 2015-4-26 11:20:56
XBV00069.VDF : 8.11.226.196 10240 Bytes 2015-4-26 13:37:20
XBV00070.VDF : 8.11.226.214 7680 Bytes 2015-4-26 00:50:59
XBV00071.VDF : 8.11.226.216 59904 Bytes 2015-4-27 10:08:49
XBV00072.VDF : 8.11.226.220 7168 Bytes 2015-4-27 10:08:50
XBV00073.VDF : 8.11.226.222 10752 Bytes 2015-4-27 10:08:50
XBV00074.VDF : 8.11.226.242 10752 Bytes 2015-4-27 12:08:42
XBV00075.VDF : 8.11.227.4 23040 Bytes 2015-4-27 14:09:02
XBV00076.VDF : 8.11.227.6 2048 Bytes 2015-4-27 14:09:03
XBV00077.VDF : 8.11.227.28 52736 Bytes 2015-4-27 00:30:04
XBV00078.VDF : 8.11.227.46 9216 Bytes 2015-4-27 00:30:04
XBV00079.VDF : 8.11.227.52 11264 Bytes 2015-4-27 00:30:05
XBV00080.VDF : 8.11.227.54 6656 Bytes 2015-4-28 00:30:05
XBV00081.VDF : 8.11.227.56 5120 Bytes 2015-4-28 09:52:18
XBV00082.VDF : 8.11.227.58 26112 Bytes 2015-4-28 09:52:19
XBV00083.VDF : 8.11.227.78 6144 Bytes 2015-4-28 09:52:20
XBV00084.VDF : 8.11.227.94 6656 Bytes 2015-4-28 09:52:22
XBV00085.VDF : 8.11.227.110 5632 Bytes 2015-4-28 09:52:23
XBV00086.VDF : 8.11.227.126 15872 Bytes 2015-4-28 11:07:07
XBV00087.VDF : 8.11.227.130 41984 Bytes 2015-4-28 02:02:37
XBV00088.VDF : 8.11.227.132 7168 Bytes 2015-4-28 02:02:37
XBV00089.VDF : 8.11.227.134 17408 Bytes 2015-4-28 02:02:38
XBV00090.VDF : 8.11.227.136 7168 Bytes 2015-4-28 02:02:38
XBV00091.VDF : 8.11.227.138 11776 Bytes 2015-4-28 02:02:38
XBV00092.VDF : 8.11.227.140 19456 Bytes 2015-4-29 06:07:41
XBV00093.VDF : 8.11.227.156 32256 Bytes 2015-4-29 06:07:42
XBV00094.VDF : 8.11.227.172 7168 Bytes 2015-4-29 08:53:38
XBV00095.VDF : 8.11.227.188 7680 Bytes 2015-4-29 11:51:45
XBV00096.VDF : 8.11.227.190 2048 Bytes 2015-4-29 11:51:45
XBV00097.VDF : 8.11.227.206 23040 Bytes 2015-4-29 03:17:36
XBV00098.VDF : 8.11.227.208 2048 Bytes 2015-4-29 03:17:37
XBV00099.VDF : 8.11.227.212 55808 Bytes 2015-4-29 03:17:37
XBV00100.VDF : 8.11.227.216 2560 Bytes 2015-4-29 03:17:38
XBV00101.VDF : 8.11.227.232 13824 Bytes 2015-4-29 03:17:38
XBV00102.VDF : 8.11.227.246 7680 Bytes 2015-4-29 03:17:38
XBV00103.VDF : 8.11.228.6 30208 Bytes 2015-4-30 09:18:38
XBV00104.VDF : 8.11.228.8 2048 Bytes 2015-4-30 09:18:38
XBV00105.VDF : 8.11.228.22 2048 Bytes 2015-4-30 09:18:39
XBV00106.VDF : 8.11.228.36 15360 Bytes 2015-4-30 11:14:25
XBV00107.VDF : 8.11.228.38 6656 Bytes 2015-4-30 15:14:14
XBV00108.VDF : 8.11.228.40 2048 Bytes 2015-4-30 15:14:14
XBV00109.VDF : 8.11.228.42 8704 Bytes 2015-4-30 15:14:15
XBV00110.VDF : 8.11.228.44 8192 Bytes 2015-4-30 15:14:15
XBV00111.VDF : 8.11.228.46 23040 Bytes 2015-4-30 00:03:35
XBV00112.VDF : 8.11.228.50 46080 Bytes 2015-4-30 00:03:36
XBV00113.VDF : 8.11.228.52 6656 Bytes 2015-4-30 00:03:36
XBV00114.VDF : 8.11.228.66 32256 Bytes 2015-5-1 11:52:20
XBV00115.VDF : 8.11.228.80 16896 Bytes 2015-5-1 11:52:20
XBV00116.VDF : 8.11.228.94 2048 Bytes 2015-5-1 11:52:20
XBV00117.VDF : 8.11.228.108 17920 Bytes 2015-5-1 14:53:05
LOCAL001.VDF : 8.11.228.108 128680960 Bytes 2015-5-1 14:53:38
Engine version : 8.3.30.28
AEVDF.DLL : 8.3.1.6 133992 Bytes 2015-3-24 06:59:23
AESCRIPT.DLL : 8.2.2.62 567208 Bytes 2015-4-26 02:10:10
AESCN.DLL : 8.3.2.2 139456 Bytes 2015-3-24 06:59:23
AESBX.DLL : 8.2.20.34 1615784 Bytes 2015-3-24 06:59:23
AERDL.DLL : 8.2.1.20 731040 Bytes 2015-3-24 06:59:23
AEPACK.DLL : 8.4.0.62 793456 Bytes 2015-3-24 06:59:23
AEOFFICE.DLL : 8.3.1.22 363376 Bytes 2015-4-26 02:10:10
AEMOBILE.DLL : 8.1.7.2 281720 Bytes 2015-4-26 02:10:10
AEHEUR.DLL : 8.1.4.1668 8289136 Bytes 2015-4-30 09:18:36
AEHELP.DLL : 8.3.2.0 281456 Bytes 2015-3-24 06:59:23
AEGEN.DLL : 8.1.7.40 456608 Bytes 2015-3-24 06:59:23
AEEXP.DLL : 8.4.2.82 260968 Bytes 2015-4-26 02:10:10
AEEMU.DLL : 8.1.3.4 399264 Bytes 2015-3-24 06:59:23
AEDROID.DLL : 8.4.3.116 1050536 Bytes 2015-3-24 06:59:23
AECORE.DLL : 8.3.4.0 243624 Bytes 2015-3-24 06:59:23
AEBB.DLL : 8.1.2.0 60448 Bytes 2015-3-24 06:59:23
AVWINLL.DLL : 15.0.9.460 26872 Bytes 2015-3-24 06:59:29
AVPREF.DLL : 15.0.9.460 52984 Bytes 2015-3-24 06:59:28
AVREP.DLL : 15.0.9.460 220464 Bytes 2015-3-24 06:59:28
AVARKT.DLL : 15.0.9.460 228088 Bytes 2015-3-24 06:59:24
AVEVTLOG.DLL : 15.0.9.460 193328 Bytes 2015-3-24 06:59:25
SQLITE3.DLL : 15.0.9.460 455472 Bytes 2015-3-24 06:59:31
AVSMTP.DLL : 15.0.9.460 79096 Bytes 2015-3-24 06:59:28
NETNT.DLL : 15.0.9.460 15152 Bytes 2015-3-24 06:59:30
CommonImageRc.dll: 15.0.9.460 4355376 Bytes 2015-3-24 06:59:30
CommonTextRc.DLL: 15.0.9.476 71416 Bytes 2015-3-24 06:59:30
Configuration settings for the scan:
Jobname.............................: ShlExt
Configuration file..................: C:\DOCUME~1\ADMINS~1\LOCALS~1\Temp\a05e49d7.avp
Reporting...........................: default
Primary action......................: Interactive
Secondary action....................: Ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:,
Process scan........................: off
Scan registry.......................: off
Search for rootkits.................: off
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Limit recursion depth...............: 20
Smart extensions....................: on
Deviating archive types.............: +, +, +, +, +, +, +, +,
Macrovirus heuristic................: on
File heuristic......................: Complete
Deviating risk categories...........: +APPL,+JOKE,+SPR,
Start of the scan: 2015年5月2日 10:55
Starting the file scan:
Begin scan in 'C:\Documents and Settings\adminstartor\桌面\2015.5.2'
C:\Documents and Settings\adminstartor\桌面\2015.5.2\001.vir
[DETECTION] Contains patterns of software PUA/Linkury.iona
C:\Documents and Settings\adminstartor\桌面\2015.5.2\002.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\003.vir
[DETECTION] Contains patterns of software PUA/Linkury.iona
C:\Documents and Settings\adminstartor\桌面\2015.5.2\004.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\005.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\006.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\007.vir
[DETECTION] Contains patterns of software PUA/Linkury.iona
C:\Documents and Settings\adminstartor\桌面\2015.5.2\008.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\009.vir
[DETECTION] Is the TR/Kazy.220672.112 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\010.vir
[DETECTION] Is the TR/Starter.Y Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\011.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\012.vir
[DETECTION] Contains recognition pattern of the W32/Elkern.B Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\013.vir
[DETECTION] Is the TR/Banhguo.aone Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\014.vir
[DETECTION] Contains code of the W32/Virut.Gen Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\015.vir
[DETECTION] Contains patterns of software PUA/Linkury.iona
C:\Documents and Settings\adminstartor\桌面\2015.5.2\016.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\017.vir
[DETECTION] Contains recognition pattern of the W32/Elkern.B Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\018.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\019.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\020.vir
[DETECTION] Contains recognition pattern of the APPL/GetNow.ersd application
C:\Documents and Settings\adminstartor\桌面\2015.5.2\021.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\022.vir
[DETECTION] Is the TR/Agent.310815 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\023.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\024.vir
[DETECTION] Is the TR/PSW.Agent.73728.45 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\025.vir
[DETECTION] Contains patterns of software PUA/Linkury.iona
C:\Documents and Settings\adminstartor\桌面\2015.5.2\026.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\027.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen7 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\028.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\029.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\030.vir
[DETECTION] Is the TR/Patched.Ren.Gen Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\031.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\032.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\033.vir
[DETECTION] Is the TR/Miuref.A.25063 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\034.vir
[DETECTION] Is the TR/Spy.Gen Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\035.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\036.vir
[DETECTION] Is the TR/Rogue.104050271 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\037.vir
[DETECTION] Is the TR/Starter.Y Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\038.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\039.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\040.vir
[DETECTION] Contains patterns of software PUA/Linkury.iona
C:\Documents and Settings\adminstartor\桌面\2015.5.2\041.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\042.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\044.vir
[DETECTION] Contains virus patterns of Adware ADWARE/Wajam.1080832
C:\Documents and Settings\adminstartor\桌面\2015.5.2\045.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\046.vir
[DETECTION] Contains virus patterns of Adware ADWARE/BrowseFox.Gen7
C:\Documents and Settings\adminstartor\桌面\2015.5.2\047.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\048.vir
[DETECTION] Is the TR/Spy.Gen Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\049.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\050.vir
[DETECTION] Contains a recognition pattern of the (harmful) BDS/Backdoor.Gen back-door program
C:\Documents and Settings\adminstartor\桌面\2015.5.2\051.vir
[DETECTION] Is the TR/Starter.Y Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\052.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen2 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\053.vir
[DETECTION] Is the TR/Black.Gen2 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\054.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\055.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\056.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\057.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\058.vir
[DETECTION] Is the TR/ATRAPS.Gen2 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\059.vir
[DETECTION] Contains patterns of software PUA/Linkury.iona
C:\Documents and Settings\adminstartor\桌面\2015.5.2\060.vir
[DETECTION] Contains recognition pattern of the WORM/Debris.adjh.1 worm
C:\Documents and Settings\adminstartor\桌面\2015.5.2\061.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\062.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\063.vir
[DETECTION] Contains virus patterns of Adware ADWARE/MultiPlug.Gen7
C:\Documents and Settings\adminstartor\桌面\2015.5.2\064.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\065.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\066.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\067.vir
[DETECTION] Is the TR/Kazy.95950.3 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\068.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen2 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\069.vir
[DETECTION] Is the TR/PSW.Yunsip.axyza Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\070.vir
[DETECTION] Is the TR/Estiwir.A.47 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\071.vir
[DETECTION] Is the TR/Zegost.A.154 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\072.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\073.vir
[DETECTION] Is the TR/Agent.19456.267 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\074.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen7 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\075.vir
[DETECTION] Contains patterns of software PUA/Linkury.iona
C:\Documents and Settings\adminstartor\桌面\2015.5.2\076.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\077.vir
[DETECTION] Is the TR/Nitol.blanu Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\078.vir
[DETECTION] Is the TR/Spy.Gen7 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\079.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\080.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\081.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\082.vir
[DETECTION] Is the TR/PSW.OGames.AC Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\083.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\084.vir
[DETECTION] Contains virus patterns of Adware ADWARE/BrowseFox.apb
C:\Documents and Settings\adminstartor\桌面\2015.5.2\085.vir
[DETECTION] Is the TR/Starter.Y Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\086.vir
[DETECTION] Contains recognition pattern of the W32/Virut.CEE Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\087.vir
[DETECTION] Contains patterns of software PUA/Linkury.iona
C:\Documents and Settings\adminstartor\桌面\2015.5.2\088.vir
[DETECTION] Contains recognition pattern of the WORM/Debris.J.1 worm
C:\Documents and Settings\adminstartor\桌面\2015.5.2\089.vir
[DETECTION] Is the TR/Agent.18944.298 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\090.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\091.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen7 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\092.vir
[DETECTION] Is the TR/Starter.Y Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\093.vir
[DETECTION] Is the TR/Starter.Y Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\094.vir
[DETECTION] Is the TR/PSW.OGames.AC Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\095.vir
[DETECTION] Is the TR/Crypt.ZPACK.139189 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\096.vir
[DETECTION] Is the TR/Spy.Gen2 Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\097.vir
[DETECTION] Contains patterns of software PUA/Linkury.iona
C:\Documents and Settings\adminstartor\桌面\2015.5.2\098.vir
[DETECTION] Is the TR/Starter.Y Trojan
C:\Documents and Settings\adminstartor\桌面\2015.5.2\099.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
C:\Documents and Settings\adminstartor\桌面\2015.5.2\100.vir
[DETECTION] Is the TR/ATRAPS.Gen2 Trojan
Beginning disinfection:
[INFO] RepairMalware: Disinfection of malware W32/Ramnit.C needs a reboot to complete
[INFO] RepairMalware: Disinfection of malware W32/Ramnit.C needs a reboot to complete
[INFO] RepairMalware: Disinfection of malware W32/Ramnit.C needs a reboot to complete
[INFO] RepairMalware: Disinfection of malware W32/Ramnit.C needs a reboot to complete
[INFO] RepairMalware: Disinfection of malware W32/Ramnit.C needs a reboot to complete
[ERROR] RepairMalware: Not able to Repair Malware APPL/GetNow.ersd
C:\Documents and Settings\adminstartor\桌面\2015.5.2\100.vir
[DETECTION] Is the TR/ATRAPS.Gen2 Trojan
[NOTE] The file was moved to the quarantine directory under the name '510c9818.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\099.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.2\098.vir
[DETECTION] Is the TR/Starter.Y Trojan
[NOTE] The file was moved to the quarantine directory under the name '4993b648.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\097.vir
[DETECTION] Contains patterns of software PUA/Linkury.iona
[NOTE] The file was moved to the quarantine directory under the name '1bcbeca9.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\096.vir
[DETECTION] Is the TR/Spy.Gen2 Trojan
[NOTE] The file was moved to the quarantine directory under the name '7dfda36b.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\095.vir
[DETECTION] Is the TR/Crypt.ZPACK.139189 Trojan
[NOTE] The file was moved to the quarantine directory under the name '387a8e55.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\094.vir
[DETECTION] Is the TR/PSW.OGames.AC Trojan
[NOTE] The file was moved to the quarantine directory under the name '4760bc34.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\093.vir
[DETECTION] Is the TR/Starter.Y Trojan
[NOTE] The file was moved to the quarantine directory under the name '0bd7907e.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\092.vir
[DETECTION] Is the TR/Starter.Y Trojan
[NOTE] The file was moved to the quarantine directory under the name '77ced02e.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\091.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen7 Trojan
[NOTE] The file was moved to the quarantine directory under the name '5a97ff63.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\090.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.2\089.vir
[DETECTION] Is the TR/Agent.18944.298 Trojan
[NOTE] The file was moved to the quarantine directory under the name '43f7c4f8.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\088.vir
[DETECTION] Contains recognition pattern of the WORM/Debris.J.1 worm
[NOTE] The file was moved to the quarantine directory under the name '2faae8c8.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\087.vir
[DETECTION] Contains patterns of software PUA/Linkury.iona
[NOTE] The file was moved to the quarantine directory under the name '5e14d145.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\086.vir
[DETECTION] Contains recognition pattern of the W32/Virut.CEE Windows virus
[NOTE] The file was moved to the quarantine directory under the name '500fe182.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\085.vir
[DETECTION] Is the TR/Starter.Y Trojan
[NOTE] The file was moved to the quarantine directory under the name '152598c0.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\084.vir
[DETECTION] Contains virus patterns of Adware ADWARE/BrowseFox.apb
[NOTE] The file was moved to the quarantine directory under the name '1c2f9c63.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\083.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '4461850a.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\082.vir
[DETECTION] Is the TR/PSW.OGames.AC Trojan
[NOTE] The file was moved to the quarantine directory under the name '6894fcc6.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\081.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.2\080.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '56689c1c.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\079.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '356fb760.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\078.vir
[DETECTION] Is the TR/Spy.Gen7 Trojan
[NOTE] The file was moved to the quarantine directory under the name '13a6f77d.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\077.vir
[DETECTION] Is the TR/Nitol.blanu Trojan
[NOTE] The file was moved to the quarantine directory under the name '21358cd8.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\076.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.2\075.vir
[DETECTION] Contains patterns of software PUA/Linkury.iona
[NOTE] The file was moved to the quarantine directory under the name '2b72a790.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\074.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen7 Trojan
[NOTE] The file was moved to the quarantine directory under the name '1420c3d5.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\073.vir
[DETECTION] Is the TR/Agent.19456.267 Trojan
[NOTE] The file was moved to the quarantine directory under the name '6a03cff2.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\072.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.2\071.vir
[DETECTION] Is the TR/Zegost.A.154 Trojan
[NOTE] The file was moved to the quarantine directory under the name '3f79cb39.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\070.vir
[DETECTION] Is the TR/Estiwir.A.47 Trojan
[NOTE] The file was moved to the quarantine directory under the name '32eeba11.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\069.vir
[DETECTION] Is the TR/PSW.Yunsip.axyza Trojan
[NOTE] The file was moved to the quarantine directory under the name '2ebaae19.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\068.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen2 Trojan
[NOTE] The file was moved to the quarantine directory under the name '1f68e3d7.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\067.vir
[DETECTION] Is the TR/Kazy.95950.3 Trojan
[NOTE] The file was moved to the quarantine directory under the name '7339f7e1.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\066.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.2\065.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '3aa1d2e6.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\064.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '6135da37.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\063.vir
[DETECTION] Contains virus patterns of Adware ADWARE/MultiPlug.Gen7
[NOTE] The file was moved to the quarantine directory under the name '0788d6d6.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\062.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '5007a47e.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\061.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.2\060.vir
[DETECTION] Contains recognition pattern of the WORM/Debris.adjh.1 worm
[NOTE] The file was moved to the quarantine directory under the name '7275f30b.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\059.vir
[DETECTION] Contains patterns of software PUA/Linkury.iona
[NOTE] The file was moved to the quarantine directory under the name '1a6c899b.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\058.vir
[DETECTION] Is the TR/ATRAPS.Gen2 Trojan
[NOTE] The file was moved to the quarantine directory under the name '3a1b8d1e.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\057.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.2\056.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.2\055.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.2\054.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.2\053.vir
[DETECTION] Is the TR/Black.Gen2 Trojan
[NOTE] The file was moved to the quarantine directory under the name '6f34cbaa.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\052.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen2 Trojan
[NOTE] The file was moved to the quarantine directory under the name '0e15ea15.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\051.vir
[DETECTION] Is the TR/Starter.Y Trojan
[NOTE] The file was moved to the quarantine directory under the name '6bbaa89e.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\050.vir
[DETECTION] Contains a recognition pattern of the (harmful) BDS/Backdoor.Gen back-door program
[NOTE] The file was moved to the quarantine directory under the name '0e6cdc3f.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\049.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.2\048.vir
[DETECTION] Is the TR/Spy.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '1d80e0ad.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\047.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.2\046.vir
[DETECTION] Contains virus patterns of Adware ADWARE/BrowseFox.Gen7
[NOTE] The file was moved to the quarantine directory under the name '0f3f9c09.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\045.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.2\044.vir
[DETECTION] Contains virus patterns of Adware ADWARE/Wajam.1080832
[NOTE] The file was moved to the quarantine directory under the name '186dffcc.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\042.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.2\041.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.2\040.vir
[DETECTION] Contains patterns of software PUA/Linkury.iona
[NOTE] The file was moved to the quarantine directory under the name '4243cd54.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\039.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '6747b74f.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\038.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '131daf3c.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\037.vir
[DETECTION] Is the TR/Starter.Y Trojan
[NOTE] The file was moved to the quarantine directory under the name '3118fdb0.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\036.vir
[DETECTION] Is the TR/Rogue.104050271 Trojan
[NOTE] The file was moved to the quarantine directory under the name '448a85a9.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\035.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '6fded9a9.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\034.vir
[DETECTION] Is the TR/Spy.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '08b89116.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\033.vir
[DETECTION] Is the TR/Miuref.A.25063 Trojan
[NOTE] The file was moved to the quarantine directory under the name '43c7a800.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\032.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '4338a251.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\031.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.2\030.vir
[DETECTION] Is the TR/Patched.Ren.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '0995f74e.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\029.vir
[DETECTION] Contains code of the W32/Ramnit.C Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.2\028.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '67b4d889.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\027.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen7 Trojan
[NOTE] The file was moved to the quarantine directory under the name '2a9386f9.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\026.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.2\025.vir
[DETECTION] Contains patterns of software PUA/Linkury.iona
[NOTE] The file was moved to the quarantine directory under the name '42b5a1d5.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\024.vir
[DETECTION] Is the TR/PSW.Agent.73728.45 Trojan
[NOTE] The file was moved to the quarantine directory under the name '38059b1c.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\023.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.2\022.vir
[DETECTION] Is the TR/Agent.310815 Trojan
[NOTE] The file was moved to the quarantine directory under the name '4959c759.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\021.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.2\020.vir
[DETECTION] Contains recognition pattern of the APPL/GetNow.ersd application
[NOTE] The file was moved to the quarantine directory under the name '39bced43.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\019.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '42c59115.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\018.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '0c9fe27f.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\017.vir
[DETECTION] Contains recognition pattern of the W32/Elkern.B Windows virus
[NOTE] The file was moved to the quarantine directory under the name '72e3995a.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\016.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.2\015.vir
[DETECTION] Contains patterns of software PUA/Linkury.iona
[NOTE] The file was moved to the quarantine directory under the name '067bb112.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\014.vir
[DETECTION] Contains code of the W32/Virut.Gen Windows virus
[NOTE] The file was moved to the quarantine directory under the name '0d4eed7b.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\013.vir
[DETECTION] Is the TR/Banhguo.aone Trojan
[NOTE] The file was moved to the quarantine directory under the name '5e99feb9.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\012.vir
[DETECTION] Contains recognition pattern of the W32/Elkern.B Windows virus
[NOTE] The file was moved to the quarantine directory under the name '3bf1d5d3.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\011.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '13098571.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\010.vir
[DETECTION] Is the TR/Starter.Y Trojan
[NOTE] The file was moved to the quarantine directory under the name '67abdccb.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\009.vir
[DETECTION] Is the TR/Kazy.220672.112 Trojan
[NOTE] The file was moved to the quarantine directory under the name '28afa443.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\008.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '177afde5.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\007.vir
[DETECTION] Contains patterns of software PUA/Linkury.iona
[NOTE] The file was moved to the quarantine directory under the name '6d4bfe5b.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\006.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '3d42f92b.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\005.vir
[DETECTION] Is the TR/Graftor.254304 Trojan
[NOTE] The file was moved to the quarantine directory under the name '6b49f369.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\004.vir
[DETECTION] Contains code of the W32/Ramnit.A Windows virus
[NOTE] The file was repaired.
C:\Documents and Settings\adminstartor\桌面\2015.5.2\003.vir
[DETECTION] Contains patterns of software PUA/Linkury.iona
[NOTE] The file was moved to the quarantine directory under the name '2cf7f7a3.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\002.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '0fba9921.qua'!
C:\Documents and Settings\adminstartor\桌面\2015.5.2\001.vir
[DETECTION] Contains patterns of software PUA/Linkury.iona
[NOTE] The file was moved to the quarantine directory under the name '4832b0c7.qua'!
End of the scan: 2015年5月2日 10:58
Used time: 00:25 Minute(s)
The scan has been done completely.
1 Scanned directories
100 Files were scanned
99 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 Files were deleted
23 Viruses and unwanted programs were repaired
76 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
1 Files not concerned
3 Archives were scanned
0 Warnings
99 Notes
[/mw_shl_code]
其中41.vir修复后仍为病毒,二扫kill
[mw_shl_code=css,true]
Antivirus Pro
Report file date: 2015年5月2日 10:59
The program is running as an unrestricted full version.
Online services are available.
Platform : Microsoft Windows XP
Windows version : (Service Pack 3) [5.1.2600]
Boot mode : Normally booted
Username : adminstartor
Computer name : 23Q2JEHX1NUPHVO
Version information:
BUILD.DAT : 15.0.9.504 94784 Bytes 2015-3-24 14:59:00
AVSCAN.EXE : 15.0.9.504 1027528 Bytes 2015-3-24 06:59:28
AVSCANRC.DLL : 15.0.9.460 54064 Bytes 2015-3-24 06:59:28
LUKE.DLL : 15.0.9.460 60664 Bytes 2015-3-24 06:59:30
AVSCPLR.DLL : 15.0.9.460 95536 Bytes 2015-3-24 06:59:28
REPAIR.DLL : 15.0.9.504 374064 Bytes 2015-3-24 06:59:28
REPAIR.RDF : 1.0.7.58 881292 Bytes 2015-4-30 09:18:50
AVREG.DLL : 15.0.9.460 273712 Bytes 2015-3-24 06:59:28
AVLODE.DLL : 15.0.9.504 596272 Bytes 2015-3-24 06:59:26
AVLODE.RDF : 14.0.4.64 79226 Bytes 2015-4-26 02:10:10
XBV00019.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00020.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00021.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00022.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00023.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00024.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00025.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00026.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00027.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00028.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00029.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00030.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00031.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00032.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00033.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00034.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00035.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00036.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00037.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00038.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00039.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00040.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00041.VDF : 8.11.165.190 2048 Bytes 2014-8-7 06:59:31
XBV00118.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00119.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00120.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00121.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00122.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00123.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00124.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00125.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00126.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00127.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00128.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00129.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00130.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00131.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00132.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00133.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00134.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00135.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00136.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00137.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00138.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00139.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00140.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00141.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00142.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00143.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00144.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00145.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00146.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00147.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00148.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00149.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00150.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00151.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00152.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00153.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00154.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00155.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00156.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00157.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00158.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00159.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00160.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00161.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00162.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:12
XBV00163.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00164.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00165.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00166.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00167.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00168.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00169.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00170.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00171.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00172.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00173.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00174.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00175.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00176.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00177.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00178.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00179.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00180.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00181.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00182.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00183.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00184.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00185.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00186.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00187.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00188.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00189.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00190.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00191.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00192.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00193.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00194.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00195.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00196.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00197.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00198.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00199.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00200.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00201.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00202.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00203.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00204.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00205.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00206.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00207.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00208.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00209.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00210.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00211.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00212.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00213.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00214.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00215.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00216.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00217.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00218.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00219.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00220.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00221.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00222.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00223.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00224.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00225.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00226.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00227.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00228.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00229.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00230.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00231.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00232.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00233.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00234.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00235.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00236.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00237.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00238.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00239.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00240.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00241.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00242.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00243.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00244.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00245.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00246.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00247.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00248.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00249.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00250.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00251.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00252.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00253.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00254.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00255.VDF : 8.11.225.88 2048 Bytes 2015-4-22 02:10:13
XBV00000.VDF : 7.11.70.0 66736640 Bytes 2013-4-4 06:59:31
XBV00001.VDF : 7.11.74.226 2201600 Bytes 2013-4-30 06:59:31
XBV00002.VDF : 7.11.80.60 2751488 Bytes 2013-5-28 06:59:31
XBV00003.VDF : 7.11.85.214 2162688 Bytes 2013-6-21 06:59:31
XBV00004.VDF : 7.11.91.176 3903488 Bytes 2013-7-23 06:59:31
XBV00005.VDF : 7.11.98.186 6822912 Bytes 2013-8-29 06:59:31
XBV00006.VDF : 7.11.139.38 15708672 Bytes 2014-3-27 06:59:31
XBV00007.VDF : 7.11.152.100 4193792 Bytes 2014-6-2 06:59:31
XBV00008.VDF : 8.11.165.192 4251136 Bytes 2014-8-7 06:59:31
XBV00009.VDF : 8.11.172.30 2094080 Bytes 2014-9-15 06:59:31
XBV00010.VDF : 8.11.178.32 1581056 Bytes 2014-10-14 06:59:31
XBV00011.VDF : 8.11.184.50 2178560 Bytes 2014-11-11 06:59:31
XBV00012.VDF : 8.11.190.32 1876992 Bytes 2014-12-3 06:59:31
XBV00013.VDF : 8.11.201.28 2973696 Bytes 2015-1-14 06:59:31
XBV00014.VDF : 8.11.206.252 2695680 Bytes 2015-2-4 06:59:31
XBV00015.VDF : 8.11.213.84 3175936 Bytes 2015-3-3 06:59:31
XBV00016.VDF : 8.11.213.176 212480 Bytes 2015-3-5 06:59:31
XBV00017.VDF : 8.11.219.166 2033664 Bytes 2015-3-25 02:10:10
XBV00018.VDF : 8.11.225.88 2367488 Bytes 2015-4-22 02:10:10
XBV00042.VDF : 8.11.225.112 23040 Bytes 2015-4-22 02:10:10
XBV00043.VDF : 8.11.225.138 2048 Bytes 2015-4-22 02:10:10
XBV00044.VDF : 8.11.225.164 43520 Bytes 2015-4-22 02:10:11
XBV00045.VDF : 8.11.225.188 27136 Bytes 2015-4-22 02:10:11
XBV00046.VDF : 8.11.225.190 2048 Bytes 2015-4-22 02:10:11
XBV00047.VDF : 8.11.225.192 24064 Bytes 2015-4-22 02:10:11
XBV00048.VDF : 8.11.225.196 35328 Bytes 2015-4-23 02:10:11
XBV00049.VDF : 8.11.225.198 14848 Bytes 2015-4-23 02:10:11
XBV00050.VDF : 8.11.225.202 2048 Bytes 2015-4-23 02:10:11
XBV00051.VDF : 8.11.225.224 30208 Bytes 2015-4-23 02:10:11
XBV00052.VDF : 8.11.225.244 2048 Bytes 2015-4-23 02:10:11
XBV00053.VDF : 8.11.226.8 21504 Bytes 2015-4-23 02:10:11
XBV00054.VDF : 8.11.226.30 35328 Bytes 2015-4-23 02:10:11
XBV00055.VDF : 8.11.226.34 2048 Bytes 2015-4-24 02:10:11
XBV00056.VDF : 8.11.226.42 32256 Bytes 2015-4-24 02:10:11
XBV00057.VDF : 8.11.226.44 39424 Bytes 2015-4-24 02:10:11
XBV00058.VDF : 8.11.226.46 7680 Bytes 2015-4-24 02:10:11
XBV00059.VDF : 8.11.226.48 6656 Bytes 2015-4-24 02:10:11
XBV00060.VDF : 8.11.226.68 14336 Bytes 2015-4-24 02:10:11
XBV00061.VDF : 8.11.226.88 19456 Bytes 2015-4-24 02:10:11
XBV00062.VDF : 8.11.226.112 24576 Bytes 2015-4-24 02:10:11
XBV00063.VDF : 8.11.226.134 55808 Bytes 2015-4-25 02:10:11
XBV00064.VDF : 8.11.226.136 2560 Bytes 2015-4-25 02:10:11
XBV00065.VDF : 8.11.226.138 9728 Bytes 2015-4-25 02:10:11
XBV00066.VDF : 8.11.226.140 12800 Bytes 2015-4-25 02:10:11
XBV00067.VDF : 8.11.226.160 94208 Bytes 2015-4-26 09:37:05
XBV00068.VDF : 8.11.226.178 10240 Bytes 2015-4-26 11:20:56
XBV00069.VDF : 8.11.226.196 10240 Bytes 2015-4-26 13:37:20
XBV00070.VDF : 8.11.226.214 7680 Bytes 2015-4-26 00:50:59
XBV00071.VDF : 8.11.226.216 59904 Bytes 2015-4-27 10:08:49
XBV00072.VDF : 8.11.226.220 7168 Bytes 2015-4-27 10:08:50
XBV00073.VDF : 8.11.226.222 10752 Bytes 2015-4-27 10:08:50
XBV00074.VDF : 8.11.226.242 10752 Bytes 2015-4-27 12:08:42
XBV00075.VDF : 8.11.227.4 23040 Bytes 2015-4-27 14:09:02
XBV00076.VDF : 8.11.227.6 2048 Bytes 2015-4-27 14:09:03
XBV00077.VDF : 8.11.227.28 52736 Bytes 2015-4-27 00:30:04
XBV00078.VDF : 8.11.227.46 9216 Bytes 2015-4-27 00:30:04
XBV00079.VDF : 8.11.227.52 11264 Bytes 2015-4-27 00:30:05
XBV00080.VDF : 8.11.227.54 6656 Bytes 2015-4-28 00:30:05
XBV00081.VDF : 8.11.227.56 5120 Bytes 2015-4-28 09:52:18
XBV00082.VDF : 8.11.227.58 26112 Bytes 2015-4-28 09:52:19
XBV00083.VDF : 8.11.227.78 6144 Bytes 2015-4-28 09:52:20
XBV00084.VDF : 8.11.227.94 6656 Bytes 2015-4-28 09:52:22
XBV00085.VDF : 8.11.227.110 5632 Bytes 2015-4-28 09:52:23
XBV00086.VDF : 8.11.227.126 15872 Bytes 2015-4-28 11:07:07
XBV00087.VDF : 8.11.227.130 41984 Bytes 2015-4-28 02:02:37
XBV00088.VDF : 8.11.227.132 7168 Bytes 2015-4-28 02:02:37
XBV00089.VDF : 8.11.227.134 17408 Bytes 2015-4-28 02:02:38
XBV00090.VDF : 8.11.227.136 7168 Bytes 2015-4-28 02:02:38
XBV00091.VDF : 8.11.227.138 11776 Bytes 2015-4-28 02:02:38
XBV00092.VDF : 8.11.227.140 19456 Bytes 2015-4-29 06:07:41
XBV00093.VDF : 8.11.227.156 32256 Bytes 2015-4-29 06:07:42
XBV00094.VDF : 8.11.227.172 7168 Bytes 2015-4-29 08:53:38
XBV00095.VDF : 8.11.227.188 7680 Bytes 2015-4-29 11:51:45
XBV00096.VDF : 8.11.227.190 2048 Bytes 2015-4-29 11:51:45
XBV00097.VDF : 8.11.227.206 23040 Bytes 2015-4-29 03:17:36
XBV00098.VDF : 8.11.227.208 2048 Bytes 2015-4-29 03:17:37
XBV00099.VDF : 8.11.227.212 55808 Bytes 2015-4-29 03:17:37
XBV00100.VDF : 8.11.227.216 2560 Bytes 2015-4-29 03:17:38
XBV00101.VDF : 8.11.227.232 13824 Bytes 2015-4-29 03:17:38
XBV00102.VDF : 8.11.227.246 7680 Bytes 2015-4-29 03:17:38
XBV00103.VDF : 8.11.228.6 30208 Bytes 2015-4-30 09:18:38
XBV00104.VDF : 8.11.228.8 2048 Bytes 2015-4-30 09:18:38
XBV00105.VDF : 8.11.228.22 2048 Bytes 2015-4-30 09:18:39
XBV00106.VDF : 8.11.228.36 15360 Bytes 2015-4-30 11:14:25
XBV00107.VDF : 8.11.228.38 6656 Bytes 2015-4-30 15:14:14
XBV00108.VDF : 8.11.228.40 2048 Bytes 2015-4-30 15:14:14
XBV00109.VDF : 8.11.228.42 8704 Bytes 2015-4-30 15:14:15
XBV00110.VDF : 8.11.228.44 8192 Bytes 2015-4-30 15:14:15
XBV00111.VDF : 8.11.228.46 23040 Bytes 2015-4-30 00:03:35
XBV00112.VDF : 8.11.228.50 46080 Bytes 2015-4-30 00:03:36
XBV00113.VDF : 8.11.228.52 6656 Bytes 2015-4-30 00:03:36
XBV00114.VDF : 8.11.228.66 32256 Bytes 2015-5-1 11:52:20
XBV00115.VDF : 8.11.228.80 16896 Bytes 2015-5-1 11:52:20
XBV00116.VDF : 8.11.228.94 2048 Bytes 2015-5-1 11:52:20
XBV00117.VDF : 8.11.228.108 17920 Bytes 2015-5-1 14:53:05
LOCAL001.VDF : 8.11.228.108 128680960 Bytes 2015-5-1 14:53:38
Engine version : 8.3.30.28
AEVDF.DLL : 8.3.1.6 133992 Bytes 2015-3-24 06:59:23
AESCRIPT.DLL : 8.2.2.62 567208 Bytes 2015-4-26 02:10:10
AESCN.DLL : 8.3.2.2 139456 Bytes 2015-3-24 06:59:23
AESBX.DLL : 8.2.20.34 1615784 Bytes 2015-3-24 06:59:23
AERDL.DLL : 8.2.1.20 731040 Bytes 2015-3-24 06:59:23
AEPACK.DLL : 8.4.0.62 793456 Bytes 2015-3-24 06:59:23
AEOFFICE.DLL : 8.3.1.22 363376 Bytes 2015-4-26 02:10:10
AEMOBILE.DLL : 8.1.7.2 281720 Bytes 2015-4-26 02:10:10
AEHEUR.DLL : 8.1.4.1668 8289136 Bytes 2015-4-30 09:18:36
AEHELP.DLL : 8.3.2.0 281456 Bytes 2015-3-24 06:59:23
AEGEN.DLL : 8.1.7.40 456608 Bytes 2015-3-24 06:59:23
AEEXP.DLL : 8.4.2.82 260968 Bytes 2015-4-26 02:10:10
AEEMU.DLL : 8.1.3.4 399264 Bytes 2015-3-24 06:59:23
AEDROID.DLL : 8.4.3.116 1050536 Bytes 2015-3-24 06:59:23
AECORE.DLL : 8.3.4.0 243624 Bytes 2015-3-24 06:59:23
AEBB.DLL : 8.1.2.0 60448 Bytes 2015-3-24 06:59:23
AVWINLL.DLL : 15.0.9.460 26872 Bytes 2015-3-24 06:59:29
AVPREF.DLL : 15.0.9.460 52984 Bytes 2015-3-24 06:59:28
AVREP.DLL : 15.0.9.460 220464 Bytes 2015-3-24 06:59:28
AVARKT.DLL : 15.0.9.460 228088 Bytes 2015-3-24 06:59:24
AVEVTLOG.DLL : 15.0.9.460 193328 Bytes 2015-3-24 06:59:25
SQLITE3.DLL : 15.0.9.460 455472 Bytes 2015-3-24 06:59:31
AVSMTP.DLL : 15.0.9.460 79096 Bytes 2015-3-24 06:59:28
NETNT.DLL : 15.0.9.460 15152 Bytes 2015-3-24 06:59:30
CommonImageRc.dll: 15.0.9.460 4355376 Bytes 2015-3-24 06:59:30
CommonTextRc.DLL: 15.0.9.476 71416 Bytes 2015-3-24 06:59:30
Configuration settings for the scan:
Jobname.............................: ShlExt
Configuration file..................: C:\DOCUME~1\ADMINS~1\LOCALS~1\Temp\a8e90008.avp
Reporting...........................: default
Primary action......................: Interactive
Secondary action....................: Ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:,
Process scan........................: off
Scan registry.......................: off
Search for rootkits.................: off
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Limit recursion depth...............: 20
Smart extensions....................: on
Deviating archive types.............: +, +, +, +, +, +, +, +,
Macrovirus heuristic................: on
File heuristic......................: Complete
Deviating risk categories...........: +APPL,+JOKE,+SPR,
Start of the scan: 2015年5月2日 10:59
Starting the file scan:
Begin scan in 'C:\Documents and Settings\adminstartor\桌面\2015.5.2'
C:\Documents and Settings\adminstartor\桌面\2015.5.2\041.vir
[DETECTION] Is the TR/Hijacker.Gen Trojan
Beginning disinfection:
C:\Documents and Settings\adminstartor\桌面\2015.5.2\041.vir
[DETECTION] Is the TR/Hijacker.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '51139aca.qua'!
End of the scan: 2015年5月2日 11:01
Used time: 00:00 Minute(s)
The scan has been done completely.
1 Scanned directories
24 Files were scanned
1 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 Files were deleted
0 Viruses and unwanted programs were repaired
1 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
23 Files not concerned
2 Archives were scanned
0 Warnings
1 Notes
[/mw_shl_code] |