One more scan...
I noticed Avira said it had not run a full scan. It looks like it found some stuff. Is there anything else I need to turn on or off?
Avira AntiVir Personal
Report file date: Sunday, August 07, 2011 07:58
Scanning for 3337992 virus strains and unwanted programs.
The program is running as an unrestricted full version.
Online services are available:
Licensee : Avira AntiVir Personal - Free Antivirus
Serial number : 0000149996-ADJIE-0000001
Platform : Windows 7 x64
Windows version : (Service Pack 1) [6.1.7601]
Boot mode : Normally booted
Username : SYSTEM
Computer name : SAMIAM-PC
Version information:
BUILD.DAT : 10.0.0.652 31824 Bytes 7/20/2011 16:49:00
AVSCAN.EXE : 10.0.4.2 442024 Bytes 7/20/2011 15:30:06
AVSCAN.DLL : 10.0.3.0 46440 Bytes 7/20/2011 15:30:45
LUKE.DLL : 10.0.3.2 104296 Bytes 7/20/2011 15:30:32
LUKERES.DLL : 10.0.0.1 12648 Bytes 2/11/2010 04:40:49
VBASE000.VDF : 7.10.0.0 19875328 Bytes 11/6/2009 14:05:36
VBASE001.VDF : 7.11.0.0 13342208 Bytes 12/14/2010 11:53:55
VBASE002.VDF : 7.11.3.0 1950720 Bytes 2/9/2011 11:53:56
VBASE003.VDF : 7.11.5.225 1980416 Bytes 4/7/2011 15:30:38
VBASE004.VDF : 7.11.8.178 2354176 Bytes 5/31/2011 15:30:40
VBASE005.VDF : 7.11.10.251 1788416 Bytes 7/7/2011 15:30:41
VBASE006.VDF : 7.11.10.252 2048 Bytes 7/7/2011 15:30:41
VBASE007.VDF : 7.11.10.253 2048 Bytes 7/7/2011 15:30:41
VBASE008.VDF : 7.11.10.254 2048 Bytes 7/7/2011 15:30:41
VBASE009.VDF : 7.11.10.255 2048 Bytes 7/7/2011 15:30:41
VBASE010.VDF : 7.11.11.0 2048 Bytes 7/7/2011 15:30:41
VBASE011.VDF : 7.11.11.1 2048 Bytes 7/7/2011 15:30:41
VBASE012.VDF : 7.11.11.2 2048 Bytes 7/7/2011 15:30:41
VBASE013.VDF : 7.11.11.75 688128 Bytes 7/12/2011 15:30:41
VBASE014.VDF : 7.11.11.104 978944 Bytes 7/13/2011 15:30:42
VBASE015.VDF : 7.11.11.137 655360 Bytes 7/14/2011 15:30:42
VBASE016.VDF : 7.11.11.184 699392 Bytes 7/18/2011 20:13:58
VBASE017.VDF : 7.11.11.214 414208 Bytes 7/19/2011 20:13:59
VBASE018.VDF : 7.11.11.242 772096 Bytes 7/20/2011 20:13:59
VBASE019.VDF : 7.11.12.3 1291776 Bytes 7/20/2011 20:14:00
VBASE020.VDF : 7.11.12.30 844288 Bytes 7/21/2011 20:14:00
VBASE021.VDF : 7.11.12.67 149504 Bytes 7/24/2011 20:14:01
VBASE022.VDF : 7.11.12.93 195072 Bytes 7/25/2011 20:14:01
VBASE023.VDF : 7.11.12.113 150528 Bytes 7/26/2011 20:14:01
VBASE024.VDF : 7.11.12.152 182784 Bytes 7/28/2011 20:14:01
VBASE025.VDF : 7.11.12.181 117760 Bytes 8/1/2011 20:14:01
VBASE026.VDF : 7.11.12.205 148480 Bytes 8/3/2011 20:14:01
VBASE027.VDF : 7.11.12.229 252928 Bytes 8/5/2011 20:14:01
VBASE028.VDF : 7.11.12.230 2048 Bytes 8/5/2011 20:14:02
VBASE029.VDF : 7.11.12.231 2048 Bytes 8/5/2011 20:14:02
VBASE030.VDF : 7.11.12.232 2048 Bytes 8/5/2011 20:14:02
VBASE031.VDF : 7.11.12.233 2048 Bytes 8/5/2011 20:14:02
Engineversion : 8.2.6.28
AEVDF.DLL : 8.1.2.1 106868 Bytes 4/21/2011 11:53:28
AESCRIPT.DLL : 8.1.3.74 1622393 Bytes 8/6/2011 20:14:04
AESCN.DLL : 8.1.7.2 127349 Bytes 4/21/2011 11:53:27
AESBX.DLL : 8.2.1.34 323957 Bytes 7/20/2011 15:29:54
AERDL.DLL : 8.1.9.13 639349 Bytes 7/20/2011 15:29:53
AEPACK.DLL : 8.2.9.5 676214 Bytes 7/20/2011 15:29:53
AEOFFICE.DLL : 8.1.2.13 201083 Bytes 8/6/2011 20:14:04
AEHEUR.DLL : 8.1.2.151 3584374 Bytes 8/6/2011 20:14:03
AEHELP.DLL : 8.1.17.7 254327 Bytes 8/6/2011 20:14:02
AEGEN.DLL : 8.1.5.7 401778 Bytes 8/6/2011 20:14:02
AEEMU.DLL : 8.1.3.0 393589 Bytes 4/21/2011 11:53:14
AECORE.DLL : 8.1.22.4 196983 Bytes 7/20/2011 15:29:42
AEBB.DLL : 8.1.1.0 53618 Bytes 4/21/2011 11:53:14
AVWINLL.DLL : 10.0.0.0 19304 Bytes 4/21/2011 11:53:36
AVPREF.DLL : 10.0.0.0 44904 Bytes 7/20/2011 15:30:04
AVREP.DLL : 10.0.0.8 62209 Bytes 7/20/2011 15:30:04
AVREG.DLL : 10.0.3.2 53096 Bytes 7/20/2011 15:30:04
AVSCPLR.DLL : 10.0.4.2 84840 Bytes 7/20/2011 15:30:06
AVARKT.DLL : 10.0.22.6 231784 Bytes 7/20/2011 15:29:58
AVEVTLOG.DLL : 10.0.0.8 203112 Bytes 7/20/2011 15:30:03
SQLITE3.DLL : 3.6.19.0 355688 Bytes 7/20/2011 20:40:24
AVSMTP.DLL : 10.0.0.17 63848 Bytes 4/21/2011 11:53:36
NETNT.DLL : 10.0.0.0 11624 Bytes 4/21/2011 11:53:46
RCIMAGE.DLL : 10.0.0.26 2550120 Bytes 7/20/2011 15:30:48
RCTEXT.DLL : 10.0.58.0 97128 Bytes 7/20/2011 15:30:48
Configuration settings for the scan:
Jobname.............................: Complete system scan
Configuration file..................: C:\Program Files (x86)\Avira\AntiVir Desktop\sysscan.avp
Logging.............................: low
Primary action......................: interactive
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:, E:, F:,
Process scan........................: on
Extended process scan...............: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: medium
Start of the scan: Sunday, August 07, 2011 07:58
Starting search for hidden objects.
C:\Program Files\Common Files\Microsoft Shared\Windows Live
C:\Program Files\Common Files\Microsoft Shared\Windows Live
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB6E-AE6D-11CF-96B8-444553540000}\compatibility flags
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Media Center\Extensibility\Entry Points\{f5d70db2-0c9b-4a2a-a24e-b06fbe9af19c}\run
[NOTE] The registry entry is invisible.
C:\Users\John\AppData\Local\Temp\{1F4882F7-14DF-46B2-80D5-EF7F28BBFC9D}\{9DF0196F-B6B8-4C3A-8790-DE42AA530101}\spore.png
C:\Users\John\AppData\Local\Temp\{1F4882F7-14DF-46B2-80D5-EF7F28BBFC9D}\{9DF0196F-B6B8-4C3A-8790-DE42AA530101}\spore.png
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Media Center\Settings\VideoSettings\recordingkeepuntil
[NOTE] The registry entry is invisible.
c:\windows\system32\wuauclt.exe
c:\windows\system32\wuauclt.exe
[NOTE] The process is not visible.
The scan of running processes will be started
Scan process 'avscan.exe' - '80' Module(s) have been scanned
Scan process 'avscan.exe' - '30' Module(s) have been scanned
Scan process 'avcenter.exe' - '75' Module(s) have been scanned
Scan process 'plugin-container.exe' - '80' Module(s) have been scanned
Scan process 'firefox.exe' - '98' Module(s) have been scanned
Scan process 'sched.exe' - '50' Module(s) have been scanned
Scan process 'avguard.exe' - '69' Module(s) have been scanned
Scan process 'IAStorDataMgrSvc.exe' - '47' Module(s) have been scanned
Scan process 'iTunesHelper.exe' - '75' Module(s) have been scanned
Scan process 'RoxioBurnLauncher.exe' - '66' Module(s) have been scanned
Scan process 'brs.exe' - '22' Module(s) have been scanned
Scan process 'stage_secondary.exe' - '77' Module(s) have been scanned
Scan process 'PDVD9Serv.exe' - '27' Module(s) have been scanned
Scan process 'ShwiconXP9106.exe' - '32' Module(s) have been scanned
Scan process 'IAStorIcon.exe' - '49' Module(s) have been scanned
Scan process 'rundll32.exe' - '49' Module(s) have been scanned
Scan process 'VolPanlu.exe' - '65' Module(s) have been scanned
Scan process 'MSOSYNC.EXE' - '49' Module(s) have been scanned
Scan process 'GoogleToolbarNotifier.exe' - '67' Module(s) have been scanned
Scan process 'stage_primary.exe' - '88' Module(s) have been scanned
Scan process 'SDWinSec.exe' - '48' Module(s) have been scanned
Scan process 'SeaPort.EXE' - '49' Module(s) have been scanned
Scan process 'mDNSResponder.exe' - '41' Module(s) have been scanned
Scan process 'AppleMobileDeviceService.exe' - '50' Module(s) have been scanned
Scan process 'vpnagent.exe' - '57' Module(s) have been scanned
Scan process 'CTAudSvc.exe' - '30' Module(s) have been scanned
Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!
Master boot sector HD1
[INFO] No virus was found!
Master boot sector HD2
[INFO] No virus was found!
Master boot sector HD3
[INFO] No virus was found!
Master boot sector HD4
[INFO] No virus was found!
Master boot sector HD5
[INFO] No virus was found!
Master boot sector HD6
[INFO] No virus was found!
Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Boot sector 'E:\'
[INFO] No virus was found!
Boot sector 'F:\'
[INFO] No virus was found!
Starting to scan executable files (registry).
The registry was scanned ( '735' files ).
Starting the file scan:
Begin scan in 'C:\' <OS>
C:\Users\John\Documents\John Salay\Local Settings\Temporary Internet Files\Content.IE5\W9EN4LAB\
www.safetyhomepage[1]
[DETECTION] Contains recognition pattern of the ADSPY/PestTrap adware or spyware
Begin scan in 'E:\' <HD-WIU2>
E:\John Salay\Local Settings\Temporary Internet Files\Content.IE5\W9EN4LAB\
www.safetyhomepage[1]
[DETECTION] Contains recognition pattern of the ADSPY/PestTrap adware or spyware
Begin scan in 'F:\' <HD-WIU2>
F:\JOHN-PC\Backup Set 2011-01-26 200110\Backup Files 2011-01-30 234808\Backup files 3.zip
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the ADSPY/PestTrap adware or spyware
--> C/Users/John/Documents/John Salay/Local Settings/Temporary Internet Files/Content.IE5/W9EN4LAB/www.safetyhomepage[1]
[DETECTION] Contains recognition pattern of the ADSPY/PestTrap adware or spyware
F:\SAMIAM-PC\Backup Set 2011-01-26 200110\Backup Files 2011-05-01 190000\Backup files 2.zip
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.BL exploit
--> C/Users/John/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/1/68ac45c1-6efd3d03
[1] Archive type: ZIP
--> menu/edit.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.BL exploit
--> menu/file.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.BW exploit
--> menu/help.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.U exploit
--> pocket/object3.class
[DETECTION] Contains recognition pattern of the JAVA/Formduce.A Java virus
--> C/Users/John/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/27/2e841c9b-59da3fd8
[1] Archive type: ZIP
--> gendalf/fire.class
[DETECTION] Contains recognition pattern of the JAVA/Exdoer.AG Java virus
--> mordor/bilbo.class
[DETECTION] Contains recognition pattern of the JAVA/Exdoer.AH Java virus
--> mordor/frodo.class
[DETECTION] Is the TR/Java.Downloader.K.2 Trojan
--> mordor/gorlum.class
[DETECTION] Is the TR/Java.Downloader.K.3 Trojan
--> mordor/saruman.class
[DETECTION] Contains recognition pattern of the JAVA/Exdoer.AJ Java virus
--> C/Users/John/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/35/57913e23-72b13c65
[1] Archive type: ZIP
--> lort/border.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.BN exploit
--> lort/object4.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.D exploit
--> menu/edit.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.BL exploit
--> menu/file.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.BW exploit
--> menu/help.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.U exploit
--> C/Users/John/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/4/75120c44-457728a7
[1] Archive type: ZIP
--> ClassPol.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.1184 Java virus
--> padle.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.1504 Java virus
--> hubert.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.4794 Java virus
--> CusBen.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.7976 Java virus
--> Trollllllle.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.4653 Java virus
--> Clrepor.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.1113 Java virus
--> Cload.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.3130 Java virus
--> novell.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.838 Java virus
--> huiak.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.10515 Java virus
F:\SAMIAM-PC\Backup Set 2011-05-08 190000\Backup Files 2011-05-08 190000\Backup files 3.zip
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the ADSPY/PestTrap adware or spyware
--> C/Users/John/Documents/John Salay/Local Settings/Temporary Internet Files/Content.IE5/W9EN4LAB/www.safetyhomepage[1]
[DETECTION] Contains recognition pattern of the ADSPY/PestTrap adware or spyware
F:\SAMIAM-PC\Backup Set 2011-05-08 190000\Backup Files 2011-05-08 190000\Backup files 6.zip
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.BL exploit
--> C/Users/John/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/1/68ac45c1-6efd3d03
[1] Archive type: ZIP
--> menu/edit.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.BL exploit
--> menu/file.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.BW exploit
--> menu/help.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.U exploit
--> pocket/object3.class
[DETECTION] Contains recognition pattern of the JAVA/Formduce.A Java virus
--> C/Users/John/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/27/2e841c9b-59da3fd8
[1] Archive type: ZIP
--> gendalf/fire.class
[DETECTION] Contains recognition pattern of the JAVA/Exdoer.AG Java virus
--> mordor/bilbo.class
[DETECTION] Contains recognition pattern of the JAVA/Exdoer.AH Java virus
--> mordor/frodo.class
[DETECTION] Is the TR/Java.Downloader.K.2 Trojan
--> mordor/gorlum.class
[DETECTION] Is the TR/Java.Downloader.K.3 Trojan
--> mordor/saruman.class
[DETECTION] Contains recognition pattern of the JAVA/Exdoer.AJ Java virus
--> C/Users/John/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/35/57913e23-72b13c65
[1] Archive type: ZIP
--> lort/border.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.BN exploit
--> lort/object4.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.D exploit
--> menu/edit.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.BL exploit
--> menu/file.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.BW exploit
--> menu/help.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.U exploit
--> C/Users/John/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/4/75120c44-457728a7
[1] Archive type: ZIP
--> ClassPol.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.1184 Java virus
--> padle.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.1504 Java virus
--> hubert.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.4794 Java virus
--> CusBen.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.7976 Java virus
--> Trollllllle.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.4653 Java virus
--> Clrepor.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.1113 Java virus
--> Cload.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.3130 Java virus
--> novell.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.838 Java virus
--> huiak.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.10515 Java virus
F:\SAMIAM-PC\Backup Set 2011-07-17 190000\Backup Files 2011-07-17 190000\Backup files 3.zip
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the ADSPY/PestTrap adware or spyware
--> C/Users/John/Documents/John Salay/Local Settings/Temporary Internet Files/Content.IE5/W9EN4LAB/www.safetyhomepage[1]
[DETECTION] Contains recognition pattern of the ADSPY/PestTrap adware or spyware
F:\SAMIAM-PC\Backup Set 2011-07-17 190000\Backup Files 2011-07-17 190000\Backup files 4.zip
[0] Archive type: ZIP
[DETECTION] Is the TR/Crypt.EPACK.Gen2 Trojan
--> C/Users/John/AppData/Roaming/dwm.exe
[DETECTION] Is the TR/Crypt.EPACK.Gen2 Trojan
--> C/Users/John/AppData/Roaming/Microsoft/conhost.exe
[DETECTION] Contains a recognition pattern of the (harmful) BDS/Backdoor.Gen5 back-door program
[WARNING] This file is a mailbox. To avoid damaging your emails this file will not be repaired or deleted.
F:\SAMIAM-PC\Backup Set 2011-07-17 190000\Backup Files 2011-07-17 190000\Backup files 7.zip
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.BL exploit
--> C/Users/John/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/1/68ac45c1-6efd3d03
[1] Archive type: ZIP
--> menu/edit.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.BL exploit
--> menu/file.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.BW exploit
--> menu/help.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.U exploit
--> pocket/object3.class
[DETECTION] Contains recognition pattern of the JAVA/Formduce.A Java virus
--> C/Users/John/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/27/2e841c9b-59da3fd8
[1] Archive type: ZIP
--> gendalf/fire.class
[DETECTION] Contains recognition pattern of the JAVA/Exdoer.AG Java virus
--> mordor/bilbo.class
[DETECTION] Contains recognition pattern of the JAVA/Exdoer.AH Java virus
--> mordor/frodo.class
[DETECTION] Is the TR/Java.Downloader.K.2 Trojan
--> mordor/gorlum.class
[DETECTION] Is the TR/Java.Downloader.K.3 Trojan
--> mordor/saruman.class
[DETECTION] Contains recognition pattern of the JAVA/Exdoer.AJ Java virus
--> C/Users/John/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/7ab66f1f-2b573dad
[1] Archive type: ZIP
--> rotor/zalux$vrkr.class
[DETECTION] Contains recognition pattern of the JAVA/Premarin.B Java virus
--> rotor/zalux.class
[DETECTION] Contains recognition pattern of the JAVA/Exdoer.DH Java virus
--> C/Users/John/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/35/57913e23-72b13c65
[1] Archive type: ZIP
--> lort/border.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.BN exploit
--> lort/object4.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.D exploit
--> menu/edit.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.BL exploit
--> menu/file.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.BW exploit
--> menu/help.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.U exploit
--> C/Users/John/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/4/75120c44-457728a7
[1] Archive type: ZIP
--> ClassPol.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.1184 Java virus
--> padle.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.1504 Java virus
--> hubert.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.4794 Java virus
--> CusBen.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.7976 Java virus
--> Trollllllle.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.4653 Java virus
--> Clrepor.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.1113 Java virus
--> Cload.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.3130 Java virus
--> novell.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.838 Java virus
--> huiak.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.10515 Java virus
--> C/Users/John/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/9/3ec26009-2fdb40ae
[1] Archive type: ZIP
--> rotor/zalux$vrkr.class
[DETECTION] Contains recognition pattern of the JAVA/Premarin.B Java virus
--> rotor/zalux.class
[DETECTION] Contains recognition pattern of the JAVA/Exdoer.DH Java virus
Beginning disinfection:
F:\SAMIAM-PC\Backup Set 2011-07-17 190000\Backup Files 2011-07-17 190000\Backup files 7.zip
[DETECTION] Contains recognition pattern of the JAVA/Exdoer.DH Java virus
[NOTE] The file was moved to the quarantine directory under the name '4b7a3e78.qua'.
F:\SAMIAM-PC\Backup Set 2011-07-17 190000\Backup Files 2011-07-17 190000\Backup files 4.zip
[DETECTION] Contains a recognition pattern of the (harmful) BDS/Backdoor.Gen5 back-door program
[WARNING] The file was ignored!
F:\SAMIAM-PC\Backup Set 2011-07-17 190000\Backup Files 2011-07-17 190000\Backup files 3.zip
[DETECTION] Contains recognition pattern of the ADSPY/PestTrap adware or spyware
[NOTE] The file was moved to the quarantine directory under the name '53ed11d8.qua'.
F:\SAMIAM-PC\Backup Set 2011-05-08 190000\Backup Files 2011-05-08 190000\Backup files 6.zip
[DETECTION] Contains recognition pattern of the JAVA/Agent.10515 Java virus
[NOTE] The file was moved to the quarantine directory under the name '01b24b31.qua'.
F:\SAMIAM-PC\Backup Set 2011-05-08 190000\Backup Files 2011-05-08 190000\Backup files 3.zip
[DETECTION] Contains recognition pattern of the ADSPY/PestTrap adware or spyware
[NOTE] The file was moved to the quarantine directory under the name '678504c8.qua'.
F:\SAMIAM-PC\Backup Set 2011-01-26 200110\Backup Files 2011-05-01 190000\Backup files 2.zip
[DETECTION] Contains recognition pattern of the JAVA/Agent.10515 Java virus
[NOTE] The file was moved to the quarantine directory under the name '220129e0.qua'.
F:\JOHN-PC\Backup Set 2011-01-26 200110\Backup Files 2011-01-30 234808\Backup files 3.zip
[DETECTION] Contains recognition pattern of the ADSPY/PestTrap adware or spyware
[NOTE] The file was moved to the quarantine directory under the name '5d1a1b88.qua'.
E:\John Salay\Local Settings\Temporary Internet Files\Content.IE5\W9EN4LAB\
www.safetyhomepage[1]
[DETECTION] Contains recognition pattern of the ADSPY/PestTrap adware or spyware
[NOTE] The file was moved to the quarantine directory under the name '11b63623.qua'.
C:\Users\John\Documents\John Salay\Local Settings\Temporary Internet Files\Content.IE5\W9EN4LAB\
www.safetyhomepage[1]
[DETECTION] Contains recognition pattern of the ADSPY/PestTrap adware or spyware
[NOTE] The file was moved to the quarantine directory under the name '6dae7672.qua'.
End of the scan: Sunday, August 07, 2011 10:01
Used time: 1:59:48 Hour(s)
The scan has been done completely.
64731 Scanned directories
1184978 Files were scanned
80 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
8 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
1184898 Files not concerned
10580 Archives were scanned
1 Warnings
14 Notes
544839 Objects were scanned with rootkit scan
6 Hidden objects were found