Avira Free Antivirus Report file date: 18 listopada 2011 18:47 Scanning for 3557722 virus strains and unwanted programs. The program is running as an unrestricted full version. Online services are available: Licensee : Avira AntiVir Personal - Free Antivirus Serial number : 0000149996-ADJIE-0000001 Platform : Windows XP Windows version : (Dodatek Service Pack 3) [5.1.2600] Boot mode : Normally booted Username : Tomek Computer name : KOLMAS-Y4D3KMCO Version information: BUILD.DAT : 12.0.0.861 41826 Bytes 2011-10-19 19:24:00 AVSCAN.EXE : 12.1.0.18 490448 Bytes 2011-10-19 15:56:26 AVSCAN.DLL : 12.1.0.17 54224 Bytes 2011-10-19 15:56:48 LUKE.DLL : 12.1.0.17 68304 Bytes 2011-10-19 15:56:36 AVSCPLR.DLL : 12.1.0.19 99536 Bytes 2011-10-19 15:56:26 AVREG.DLL : 12.1.0.22 226512 Bytes 2011-10-19 15:56:26 VBASE000.VDF : 7.10.0.0 19875328 Bytes 2009-11-06 19:18:34 VBASE001.VDF : 7.11.0.0 13342208 Bytes 2010-12-14 10:07:40 VBASE002.VDF : 7.11.3.0 1950720 Bytes 2011-02-09 16:08:52 VBASE003.VDF : 7.11.5.225 1980416 Bytes 2011-04-07 11:00:56 VBASE004.VDF : 7.11.8.178 2354176 Bytes 2011-05-31 11:18:24 VBASE005.VDF : 7.11.10.251 1788416 Bytes 2011-07-07 13:12:54 VBASE006.VDF : 7.11.13.60 6411776 Bytes 2011-08-16 08:26:10 VBASE007.VDF : 7.11.15.106 2389504 Bytes 2011-10-05 15:56:42 VBASE008.VDF : 7.11.15.107 2048 Bytes 2011-10-05 15:56:42 VBASE009.VDF : 7.11.15.108 2048 Bytes 2011-10-05 15:56:42 VBASE010.VDF : 7.11.15.109 2048 Bytes 2011-10-05 15:56:42 VBASE011.VDF : 7.11.15.110 2048 Bytes 2011-10-05 15:56:42 VBASE012.VDF : 7.11.15.111 2048 Bytes 2011-10-05 15:56:42 VBASE013.VDF : 7.11.15.144 161792 Bytes 2011-10-07 15:56:42 VBASE014.VDF : 7.11.15.177 130048 Bytes 2011-10-10 15:56:42 VBASE015.VDF : 7.11.15.213 113664 Bytes 2011-10-11 15:56:42 VBASE016.VDF : 7.11.16.1 163328 Bytes 2011-10-14 15:56:42 VBASE017.VDF : 7.11.16.34 187904 Bytes 2011-10-18 15:56:42 VBASE018.VDF : 7.11.16.77 139264 Bytes 2011-10-20 10:59:46 VBASE019.VDF : 7.11.16.112 162816 Bytes 2011-10-24 10:59:50 VBASE020.VDF : 7.11.16.150 167424 Bytes 2011-10-26 10:59:52 VBASE021.VDF : 7.11.16.187 171520 Bytes 2011-10-28 10:59:56 VBASE022.VDF : 7.11.16.209 190976 Bytes 2011-10-31 10:59:58 VBASE023.VDF : 7.11.16.243 158208 Bytes 2011-11-02 11:00:02 VBASE024.VDF : 7.11.17.21 194560 Bytes 2011-11-06 11:00:04 VBASE025.VDF : 7.11.17.101 202752 Bytes 2011-11-09 11:00:10 VBASE026.VDF : 7.11.17.137 214528 Bytes 2011-11-11 11:00:16 VBASE027.VDF : 7.11.17.154 278528 Bytes 2011-11-14 11:59:12 VBASE028.VDF : 7.11.17.197 175616 Bytes 2011-11-16 11:59:14 VBASE029.VDF : 7.11.17.198 2048 Bytes 2011-11-16 11:59:16 VBASE030.VDF : 7.11.17.199 2048 Bytes 2011-11-16 11:59:16 VBASE031.VDF : 7.11.17.224 137728 Bytes 2011-11-18 11:59:18 Engineversion : 8.2.6.116 AEVDF.DLL : 8.1.2.2 106868 Bytes 2011-11-12 11:01:14 AESCRIPT.DLL : 8.1.3.86 471420 Bytes 2011-11-18 12:00:40 AESCN.DLL : 8.1.7.2 127349 Bytes 2011-09-01 22:46:04 AESBX.DLL : 8.2.1.34 323957 Bytes 2011-09-01 22:46:04 AERDL.DLL : 8.1.9.15 639348 Bytes 2011-09-08 22:16:08 AEPACK.DLL : 8.2.13.4 684406 Bytes 2011-11-12 11:01:10 AEOFFICE.DLL : 8.1.2.20 201083 Bytes 2011-11-18 12:00:36 AEHEUR.DLL : 8.1.2.192 3838328 Bytes 2011-11-18 12:00:32 AEHELP.DLL : 8.1.18.0 254327 Bytes 2011-11-12 11:00:30 AEGEN.DLL : 8.1.5.14 405877 Bytes 2011-11-18 11:59:24 AEEMU.DLL : 8.1.3.0 393589 Bytes 2011-09-01 22:46:02 AECORE.DLL : 8.1.24.0 196983 Bytes 2011-11-12 11:00:22 AEBB.DLL : 8.1.1.0 53618 Bytes 2011-09-01 22:46:02 AVWINLL.DLL : 12.1.0.17 27344 Bytes 2011-10-19 15:56:28 AVPREF.DLL : 12.1.0.17 51920 Bytes 2011-10-19 15:56:26 AVREP.DLL : 12.1.0.17 179408 Bytes 2011-10-19 15:56:26 AVARKT.DLL : 12.1.0.17 223184 Bytes 2011-10-19 15:56:24 AVEVTLOG.DLL : 12.1.0.17 169168 Bytes 2011-10-19 15:56:24 SQLITE3.DLL : 3.7.0.0 398288 Bytes 2011-10-19 15:56:40 AVSMTP.DLL : 12.1.0.17 62928 Bytes 2011-10-19 15:56:26 NETNT.DLL : 12.1.0.17 17104 Bytes 2011-10-19 15:56:36 RCIMAGE.DLL : 12.1.0.17 4450000 Bytes 2011-10-19 15:56:50 RCTEXT.DLL : 12.1.0.16 96208 Bytes 2011-10-19 15:56:50 Configuration settings for the scan: Jobname.............................: ShlExt Configuration file..................: C:\DOCUME~1\Tomek\USTAWI~1\Temp\4d81b921.avp Logging.............................: default Primary action......................: interactive Secondary action....................: ignore Scan master boot sector.............: on Scan boot sector....................: on Boot sectors........................: C:, Process scan........................: off Scan registry.......................: off Search for rootkits.................: off Integrity checking of system files..: off Scan all files......................: Intelligent file selection Scan archives.......................: on Recursion depth.....................: 20 Smart extensions....................: on Macro heuristic.....................: on File heuristic......................: extended Start of the scan: 18 listopada 2011 18:47 Starting the file scan: Begin scan in 'C:\' C:\Documents and Settings\Tomek\Dane aplikacji\10.tmp [DETECTION] Contains recognition pattern of the WORM/Dorkbot.A.917 worm C:\Documents and Settings\Tomek\Dane aplikacji\3.exe [DETECTION] Is the TR/Offend.kdv.399119.2 Trojan C:\Documents and Settings\Tomek\Dane aplikacji\4.exe [DETECTION] Is the TR/Offend.kdv.399119.2 Trojan C:\Documents and Settings\Tomek\Dane aplikacji\3.tmp [DETECTION] Is the TR/Offend.6849537 Trojan C:\Documents and Settings\Tomek\Dane aplikacji\4.tmp [DETECTION] Is the TR/Offend.6849537.2 Trojan C:\Documents and Settings\Tomek\Dane aplikacji\B7.exe [0] Archive type: RAR SFX (self extracting) --> newmoon17.exe [1] Archive type: RAR SFX (self extracting) --> fuckHDZSDP.exe [DETECTION] Is the TR/Malagent.A.3002 Trojan C:\Documents and Settings\Tomek\Start Menu\Programs\Startup\newmoon17.exe [0] Archive type: RAR SFX (self extracting) --> fuckHDZSDP.exe [DETECTION] Is the TR/Malagent.A.3002 Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0018866.exe [0] Archive type: RAR SFX (self extracting) --> newmoon17.exe [1] Archive type: RAR SFX (self extracting) --> fuckHDZSDP.exe [DETECTION] Is the TR/Malagent.A.3002 Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0018867.exe [DETECTION] Is the TR/Offend.KD.399105 Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0014679.exe [DETECTION] Is the TR/Buzus.jecj Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0014680.exe [DETECTION] Is the TR/Offend.kdv.399119.2 Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0014681.exe [DETECTION] Is the TR/Dropper.Gen Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016679.exe [0] Archive type: RAR SFX (self extracting) --> newmoon15.exe [1] Archive type: RAR SFX (self extracting) --> ev0ga.exe [DETECTION] Is the TR/Dropper.Gen Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016680.exe [0] Archive type: RAR SFX (self extracting) --> ev0ga.exe [DETECTION] Is the TR/Dropper.Gen Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016681.exe [0] Archive type: RAR SFX (self extracting) --> newmoon15.exe [1] Archive type: RAR SFX (self extracting) --> ev0ga.exe [DETECTION] Is the TR/Dropper.Gen Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016682.exe [DETECTION] Is the TR/Buzus.jecj Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016690.exe [0] Archive type: RAR SFX (self extracting) --> newmoon17.exe [1] Archive type: RAR SFX (self extracting) --> fuckHDZSDP.exe [DETECTION] Is the TR/Malagent.A.3002 Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016691.exe [DETECTION] Is the TR/Buzus.jecj Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016692.exe [DETECTION] Is the TR/Offend.kdv.399119.2 Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016698.exe [0] Archive type: RAR SFX (self extracting) --> newmoon17.exe [1] Archive type: RAR SFX (self extracting) --> fuckHDZSDP.exe [DETECTION] Is the TR/Malagent.A.3002 Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016699.exe [DETECTION] Is the TR/Buzus.jecj Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016700.exe [DETECTION] Is the TR/Offend.kdv.399119.2 Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016711.exe [DETECTION] Is the TR/Offend.kdv.399119.2 Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016726.exe [0] Archive type: RAR SFX (self extracting) --> newmoon17.exe [1] Archive type: RAR SFX (self extracting) --> fuckHDZSDP.exe [DETECTION] Is the TR/Malagent.A.3002 Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016727.exe [0] Archive type: RAR SFX (self extracting) --> newmoon17.exe [1] Archive type: RAR SFX (self extracting) --> fuckHDZSDP.exe [DETECTION] Is the TR/Malagent.A.3002 Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016728.exe [DETECTION] Is the TR/Buzus.jecj Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016752.exe [0] Archive type: RAR SFX (self extracting) --> newmoon17.exe [1] Archive type: RAR SFX (self extracting) --> fuckHDZSDP.exe [DETECTION] Is the TR/Malagent.A.3002 Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016753.exe [DETECTION] Contains recognition pattern of the WORM/Dorkbot.A.917 worm C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016758.exe [0] Archive type: RAR SFX (self extracting) --> newmoon17.exe [1] Archive type: RAR SFX (self extracting) --> fuckHDZSDP.exe [DETECTION] Is the TR/Malagent.A.3002 Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016759.exe [DETECTION] Is the TR/Offend.KD.399105 Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016798.exe [0] Archive type: RAR SFX (self extracting) --> newmoon17.exe [1] Archive type: RAR SFX (self extracting) --> fuckHDZSDP.exe [DETECTION] Is the TR/Malagent.A.3002 Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016799.exe [DETECTION] Is the TR/Offend.KD.399105 Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016800.exe [DETECTION] Is the TR/Offend.6849537 Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016823.exe [0] Archive type: RAR SFX (self extracting) --> newmoon17.exe [1] Archive type: RAR SFX (self extracting) --> fuckHDZSDP.exe [DETECTION] Is the TR/Malagent.A.3002 Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016824.exe [DETECTION] Is the TR/Offend.KD.399105 Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016867.exe [0] Archive type: RAR SFX (self extracting) --> newmoon17.exe [1] Archive type: RAR SFX (self extracting) --> fuckHDZSDP.exe [DETECTION] Is the TR/Malagent.A.3002 Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016868.exe [DETECTION] Is the TR/Offend.KD.399105 Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016869.exe [DETECTION] Is the TR/Offend.6849537.2 Trojan C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP10\A0019033.exe [DETECTION] Is the TR/Malagent.A.3002 Trojan Beginning disinfection: C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP10\A0019033.exe [DETECTION] Is the TR/Malagent.A.3002 Trojan [NOTE] The file was moved to the quarantine directory under the name '4c9206a1.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016869.exe [DETECTION] Is the TR/Offend.6849537.2 Trojan [NOTE] The file was moved to the quarantine directory under the name '54052906.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016868.exe [DETECTION] Is the TR/Offend.KD.399105 Trojan [NOTE] The file was moved to the quarantine directory under the name '065a73ee.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016867.exe [DETECTION] Is the TR/Malagent.A.3097 Trojan [NOTE] The file was moved to the quarantine directory under the name '606d3c2c.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016824.exe [DETECTION] Is the TR/Offend.KD.399105 Trojan [NOTE] The file was moved to the quarantine directory under the name '25e91112.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016823.exe [DETECTION] Is the TR/Malagent.A.3097 Trojan [NOTE] The file was moved to the quarantine directory under the name '5af22373.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016800.exe [DETECTION] Is the TR/Offend.6849537 Trojan [NOTE] The file was moved to the quarantine directory under the name '164a0f39.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016799.exe [DETECTION] Is the TR/Offend.KD.399105 Trojan [NOTE] The file was moved to the quarantine directory under the name '6a524f68.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016798.exe [DETECTION] Is the TR/Malagent.A.3097 Trojan [NOTE] The file was moved to the quarantine directory under the name '47086025.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016759.exe [DETECTION] Is the TR/Offend.KD.399105 Trojan [NOTE] The file was moved to the quarantine directory under the name '5e605bbf.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016758.exe [DETECTION] Is the TR/Malagent.A.3097 Trojan [NOTE] The file was moved to the quarantine directory under the name '323c778f.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016753.exe [DETECTION] Contains recognition pattern of the WORM/Dorkbot.A.917 worm [NOTE] The file was moved to the quarantine directory under the name '43854e1a.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016752.exe [DETECTION] Is the TR/Malagent.A.3097 Trojan [NOTE] The file was moved to the quarantine directory under the name '4d9f7edd.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016728.exe [DETECTION] Is the TR/Buzus.jecj Trojan [NOTE] The file was moved to the quarantine directory under the name '08b6079f.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016727.exe [DETECTION] Is the TR/Malagent.A.3097 Trojan [NOTE] The file was moved to the quarantine directory under the name '01bd0334.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016726.exe [DETECTION] Is the TR/Malagent.A.3097 Trojan [NOTE] The file was moved to the quarantine directory under the name '59fc1a5d.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016711.exe [DETECTION] Is the TR/Offend.kdv.399119.2 Trojan [NOTE] The file was moved to the quarantine directory under the name '75086391.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016700.exe [DETECTION] Is the TR/Offend.kdv.399119.2 Trojan [NOTE] The file was moved to the quarantine directory under the name '4bf6034b.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016699.exe [DETECTION] Is the TR/Buzus.jecj Trojan [NOTE] The file was moved to the quarantine directory under the name '28f82838.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016698.exe [DETECTION] Is the TR/Malagent.A.3097 Trojan [NOTE] The file was moved to the quarantine directory under the name '0e306825.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016692.exe [DETECTION] Is the TR/Offend.kdv.399119.2 Trojan [NOTE] The file was moved to the quarantine directory under the name '3ca41387.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016691.exe [DETECTION] Is the TR/Buzus.jecj Trojan [NOTE] The file was moved to the quarantine directory under the name '36e138f9.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016690.exe [DETECTION] Is the TR/Malagent.A.3097 Trojan [NOTE] The file was moved to the quarantine directory under the name '09b25cbc.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016682.exe [DETECTION] Is the TR/Buzus.jecj Trojan [NOTE] The file was moved to the quarantine directory under the name '779e509b.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016681.exe [DETECTION] Is the TR/Menti.itxm Trojan [NOTE] The file was moved to the quarantine directory under the name '22e65450.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016680.exe [DETECTION] Is the TR/Dropper.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '2f702578.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0016679.exe [DETECTION] Is the TR/Menti.itxm Trojan [NOTE] The file was moved to the quarantine directory under the name '332d3170.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0014681.exe [DETECTION] Is the TR/Dropper.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '02fe7cbe.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0014680.exe [DETECTION] Is the TR/Offend.kdv.399119.2 Trojan [NOTE] The file was moved to the quarantine directory under the name '6ea86888.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0014679.exe [DETECTION] Is the TR/Buzus.jecj Trojan [NOTE] The file was moved to the quarantine directory under the name '27324d8f.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0018867.exe [DETECTION] Is the TR/Offend.KD.399105 Trojan [NOTE] The file was moved to the quarantine directory under the name '7ca7455e.qua'. C:\System Volume Information\_restore{32CE6B9F-C15C-440B-93A3-E34BB6EF9730}\RP9\A0018866.exe [DETECTION] Is the TR/Malagent.A.3097 Trojan [NOTE] The file was moved to the quarantine directory under the name '1a1549b4.qua'. C:\Documents and Settings\Tomek\Start Menu\Programs\Startup\newmoon17.exe [DETECTION] Is the TR/Malagent.A.3002 Trojan [NOTE] The file was moved to the quarantine directory under the name '4c503ac1.qua'. C:\Documents and Settings\Tomek\Dane aplikacji\B7.exe [DETECTION] Is the TR/Malagent.A.3097 Trojan [NOTE] The file was moved to the quarantine directory under the name '6fe96c63.qua'. C:\Documents and Settings\Tomek\Dane aplikacji\4.tmp [DETECTION] Is the TR/Offend.6849537.2 Trojan [NOTE] The file was moved to the quarantine directory under the name '063716fc.qua'. C:\Documents and Settings\Tomek\Dane aplikacji\3.tmp [DETECTION] Is the TR/Offend.6849537 Trojan [NOTE] The file was moved to the quarantine directory under the name '26411279.qua'. C:\Documents and Settings\Tomek\Dane aplikacji\4.exe [DETECTION] Is the TR/Offend.kdv.399119.2 Trojan [NOTE] The file was moved to the quarantine directory under the name '737454cc.qua'. C:\Documents and Settings\Tomek\Dane aplikacji\3.exe [DETECTION] Is the TR/Offend.kdv.399119.2 Trojan [NOTE] The file was moved to the quarantine directory under the name '12547573.qua'. C:\Documents and Settings\Tomek\Dane aplikacji\10.tmp [DETECTION] Contains recognition pattern of the WORM/Dorkbot.A.917 worm [NOTE] The file was moved to the quarantine directory under the name '762737fa.qua'. End of the scan: 18 listopada 2011 19:24 Used time: 36:07 Minute(s) The scan has been done completely. 1221 Scanned directories 115155 Files were scanned 52 Viruses and/or unwanted programs were found 0 Files were classified as suspicious 0 Files were deleted 0 Viruses and unwanted programs were repaired 39 Files were moved to quarantine 0 Files were renamed 0 Files cannot be scanned 115103 Files not concerned 5246 Archives were scanned 0 Warnings 39 Notes na karcie pamięci wykryto: WORM/Dorkbot.A.917 na F:\RECYCLER\e621ca05.exe i VBS/Starter.B na F:\comment.htt