Hi askey127,
I had 45 days left on my webroot spysweeper subscription. Plus the price of Avira is to my liking. And being German, I'm happy to have my countrymen's product keeping my laptop virus free.
Avira AntiVir Personal
Report file date: Monday, May 30, 2011 18:11
Scanning for 2777566 virus strains and unwanted programs.
The program is running as an unrestricted full version.
Online services are available:
Licensee : Avira AntiVir Personal - FREE Antivirus
Serial number : 0000149996-ADJIE-0000001
Platform : Windows 7 x64
Windows version : (plain) [6.1.7600]
Boot mode : Normally booted
Username : SYSTEM
Computer name : OWNER-HP
Version information:
BUILD.DAT : 10.0.0.648 31823 Bytes 4/1/2011 18:36:00
AVSCAN.EXE : 10.0.4.2 442024 Bytes 4/1/2011 21:07:43
AVSCAN.DLL : 10.0.3.0 46440 Bytes 4/1/2011 21:07:57
LUKE.DLL : 10.0.3.2 104296 Bytes 4/1/2011 21:07:53
LUKERES.DLL : 10.0.0.1 12648 Bytes 2/11/2010 04:40:49
VBASE000.VDF : 7.10.0.0 19875328 Bytes 11/6/2009 14:05:36
VBASE001.VDF : 7.11.0.0 13342208 Bytes 12/14/2010 20:15:47
VBASE002.VDF : 7.11.3.0 1950720 Bytes 2/9/2011 20:15:47
VBASE003.VDF : 7.11.5.225 1980416 Bytes 4/7/2011 22:04:13
VBASE004.VDF : 7.11.5.226 2048 Bytes 4/7/2011 22:04:13
VBASE005.VDF : 7.11.5.227 2048 Bytes 4/7/2011 22:04:13
VBASE006.VDF : 7.11.5.228 2048 Bytes 4/7/2011 22:04:13
VBASE007.VDF : 7.11.5.229 2048 Bytes 4/7/2011 22:04:13
VBASE008.VDF : 7.11.5.230 2048 Bytes 4/7/2011 22:04:13
VBASE009.VDF : 7.11.5.231 2048 Bytes 4/7/2011 22:04:14
VBASE010.VDF : 7.11.5.232 2048 Bytes 4/7/2011 22:04:14
VBASE011.VDF : 7.11.5.233 2048 Bytes 4/7/2011 22:04:14
VBASE012.VDF : 7.11.5.234 2048 Bytes 4/7/2011 22:04:14
VBASE013.VDF : 7.11.6.28 158208 Bytes 4/11/2011 22:04:15
VBASE014.VDF : 7.11.6.74 116224 Bytes 4/13/2011 22:04:16
VBASE015.VDF : 7.11.6.113 137728 Bytes 4/14/2011 22:04:17
VBASE016.VDF : 7.11.6.150 146944 Bytes 4/18/2011 22:04:18
VBASE017.VDF : 7.11.6.192 138240 Bytes 4/20/2011 22:04:19
VBASE018.VDF : 7.11.6.237 156160 Bytes 4/22/2011 22:04:20
VBASE019.VDF : 7.11.7.45 427520 Bytes 4/27/2011 22:04:22
VBASE020.VDF : 7.11.7.64 192000 Bytes 4/28/2011 22:04:24
VBASE021.VDF : 7.11.7.97 182272 Bytes 5/2/2011 22:04:25
VBASE022.VDF : 7.11.7.127 467968 Bytes 5/4/2011 22:04:29
VBASE023.VDF : 7.11.7.183 185856 Bytes 5/9/2011 22:04:30
VBASE024.VDF : 7.11.7.218 133120 Bytes 5/11/2011 22:04:31
VBASE025.VDF : 7.11.7.234 139776 Bytes 5/11/2011 22:04:32
VBASE026.VDF : 7.11.8.16 147456 Bytes 5/13/2011 22:04:33
VBASE027.VDF : 7.11.8.46 169472 Bytes 5/17/2011 22:04:34
VBASE028.VDF : 7.11.8.109 181760 Bytes 5/24/2011 22:04:35
VBASE029.VDF : 7.11.8.158 191488 Bytes 5/27/2011 22:04:37
VBASE030.VDF : 7.11.8.159 2048 Bytes 5/27/2011 22:04:37
VBASE031.VDF : 7.11.8.172 95232 Bytes 5/30/2011 22:04:38
Engineversion : 8.2.5.6
AEVDF.DLL : 8.1.2.1 106868 Bytes 3/28/2011 20:15:27
AESCRIPT.DLL : 8.1.3.65 1606010 Bytes 5/30/2011 22:04:56
AESCN.DLL : 8.1.7.2 127349 Bytes 3/28/2011 20:15:27
AESBX.DLL : 8.2.1.33 323956 Bytes 5/30/2011 22:04:58
AERDL.DLL : 8.1.9.9 639347 Bytes 3/25/2011 16:21:38
AEPACK.DLL : 8.2.6.8 557430 Bytes 5/30/2011 22:04:53
AEOFFICE.DLL : 8.1.1.23 205178 Bytes 5/30/2011 22:04:51
AEHEUR.DLL : 8.1.2.122 3494263 Bytes 5/30/2011 22:04:51
AEHELP.DLL : 8.1.17.2 246135 Bytes 5/30/2011 22:04:42
AEGEN.DLL : 8.1.5.6 401780 Bytes 5/30/2011 22:04:41
AEEMU.DLL : 8.1.3.0 393589 Bytes 3/28/2011 20:15:19
AECORE.DLL : 8.1.21.1 196983 Bytes 5/30/2011 22:04:40
AEBB.DLL : 8.1.1.0 53618 Bytes 3/28/2011 20:15:19
AVWINLL.DLL : 10.0.0.0 19304 Bytes 3/28/2011 20:15:31
AVPREF.DLL : 10.0.0.0 44904 Bytes 4/1/2011 21:07:42
AVREP.DLL : 10.0.0.10 174120 Bytes 5/30/2011 22:05:00
AVREG.DLL : 10.0.3.2 53096 Bytes 4/1/2011 21:07:42
AVSCPLR.DLL : 10.0.4.2 84840 Bytes 4/1/2011 21:07:43
AVARKT.DLL : 10.0.22.6 231784 Bytes 4/1/2011 21:07:38
AVEVTLOG.DLL : 10.0.0.8 203112 Bytes 4/1/2011 21:07:41
SQLITE3.DLL : 3.6.19.0 355688 Bytes 6/17/2010 19:27:22
AVSMTP.DLL : 10.0.0.17 63848 Bytes 3/28/2011 20:15:30
NETNT.DLL : 10.0.0.0 11624 Bytes 3/28/2011 20:15:39
RCIMAGE.DLL : 10.0.0.26 2550120 Bytes 4/1/2011 21:07:58
RCTEXT.DLL : 10.0.58.0 97128 Bytes 3/28/2011 20:15:52
Configuration settings for the scan:
Jobname.............................: Complete system scan
Configuration file..................: C:\Program Files (x86)\Avira\AntiVir Desktop\sysscan.avp
Logging.............................: low
Primary action......................: interactive
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:, D:,
Process scan........................: on
Extended process scan...............: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: medium
Start of the scan: Monday, May 30, 2011 18:11
Starting search for hidden objects.
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{00020D75-0000-0000-C000-000000000046}\ShellFolder\attributes
[NOTE] The registry entry is invisible.
C:\Program Files\Common Files\Microsoft Shared\Windows Live
C:\Program Files\Common Files\Microsoft Shared\Windows Live
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Applets\SysTray\BattMeter\Flyout\381b4222-f694-41f0-9685-ff5bb260df2e
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\Fences Pro\versionmajor
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\Fences Pro\versionminor
[NOTE] The registry entry is invisible.
C:\Program Files\Hewlett-Packard\HP Client Services\
C:\Program Files\Hewlett-Packard\HP Client Services\
[NOTE] The registry entry is invisible.
The scan of running processes will be started
Scan process 'avscan.exe' - '74' Module(s) have been scanned
Scan process 'avscan.exe' - '29' Module(s) have been scanned
Scan process 'avcenter.exe' - '77' Module(s) have been scanned
Scan process 'avgnt.exe' - '59' Module(s) have been scanned
Scan process 'sched.exe' - '50' Module(s) have been scanned
Scan process 'avguard.exe' - '68' Module(s) have been scanned
Scan process 'UNS.exe' - '58' Module(s) have been scanned
Scan process 'LMS.exe' - '29' Module(s) have been scanned
Scan process 'YCMMirage.exe' - '42' Module(s) have been scanned
Scan process 'plugin-container.exe' - '77' Module(s) have been scanned
Scan process 'hpqwmiex.exe' - '38' Module(s) have been scanned
Scan process 'firefox.exe' - '104' Module(s) have been scanned
Scan process 'WinPatrol.exe' - '74' Module(s) have been scanned
Scan process 'HPMSGSVC.exe' - '50' Module(s) have been scanned
Scan process 'LightScribeControlPanel.exe' - '38' Module(s) have been scanned
Scan process 'DPAgent.exe' - '57' Module(s) have been scanned
Scan process 'RNowSvc.exe' - '27' Module(s) have been scanned
Scan process 'LSSrvc.exe' - '25' Module(s) have been scanned
Scan process 'HPWMISVC.exe' - '37' Module(s) have been scanned
Scan process 'HPDrvMntSvc.exe' - '19' Module(s) have been scanned
Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!
Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Boot sector 'D:\'
[INFO] No virus was found!
Starting to scan executable files (registry).
The registry was scanned ( '96' files ).
Starting the file scan:
Begin scan in 'C:\'
C:\Users\Owner\Desktop\Geek Squad Data Transfer\Schatzi\Documents\_delMe\Security Threat Analysis.mht
[0] Archive type: MIME
[DETECTION] Contains recognition pattern of the JS/Fraud.AJ Java script virus
-->
http://www2.megarockz9.co.cc/107a68c6ce ... 3010311.js[DETECTION] Contains recognition pattern of the JS/Fraud.AJ Java script virus
C:\Users\schatzi\cxux.exe
[DETECTION] Is the TR/Alureon.DX.309 Trojan
C:\Users\schatzi\dvmap.exe
[DETECTION] Is the TR/Kazy.GJ.2 Trojan
C:\Users\schatzi\guasuw.exe
[DETECTION] Contains recognition pattern of the WORM/Vobfus.F.2 worm
C:\Users\schatzi\mvmgr.exe
[DETECTION] Is the TR/Kazy.23682.6 Trojan
C:\Users\schatzi\nvqmgr.exe
[DETECTION] Is the TR/Kazy.23682.5 Trojan
C:\Users\schatzi\qaigih.exe
[DETECTION] Contains recognition pattern of the WORM/Vobfus.F.16 worm
C:\Users\schatzi\rsvhost.exe
[DETECTION] Is the TR/Agent.dek Trojan
C:\Users\schatzi\svcnat.exe
[DETECTION] Is the TR/Kazy.23682.5 Trojan
C:\Users\schatzi\Documents\_delMe\Security Threat Analysis.mht
[0] Archive type: MIME
[DETECTION] Contains recognition pattern of the JS/Fraud.AJ Java script virus
-->
http://www2.megarockz9.co.cc/107a68c6ce ... 3010311.js[DETECTION] Contains recognition pattern of the JS/Fraud.AJ Java script virus
Begin scan in 'D:\' <RECOVERY>
Beginning disinfection:
C:\Users\schatzi\Documents\_delMe\Security Threat Analysis.mht
[DETECTION] Contains recognition pattern of the JS/Fraud.AJ Java script virus
[NOTE] The file was moved to the quarantine directory under the name '48749b85.qua'.
C:\Users\schatzi\svcnat.exe
[DETECTION] Is the TR/Kazy.23682.5 Trojan
[NOTE] The file was moved to the quarantine directory under the name '50e3b433.qua'.
C:\Users\schatzi\rsvhost.exe
[DETECTION] Is the TR/Agent.dek Trojan
[NOTE] The file was moved to the quarantine directory under the name '02a1eed8.qua'.
C:\Users\schatzi\qaigih.exe
[DETECTION] Contains recognition pattern of the WORM/Vobfus.F.16 worm
[NOTE] The file was moved to the quarantine directory under the name '6481a10c.qua'.
C:\Users\schatzi\nvqmgr.exe
[DETECTION] Is the TR/Kazy.23682.5 Trojan
[NOTE] The file was moved to the quarantine directory under the name '211d8c27.qua'.
C:\Users\schatzi\mvmgr.exe
[DETECTION] Is the TR/Kazy.23682.6 Trojan
[NOTE] The file was moved to the quarantine directory under the name '5e02be46.qua'.
C:\Users\schatzi\guasuw.exe
[DETECTION] Contains recognition pattern of the WORM/Vobfus.F.2 worm
[NOTE] The file was moved to the quarantine directory under the name '12ae920d.qua'.
C:\Users\schatzi\dvmap.exe
[DETECTION] Is the TR/Kazy.GJ.2 Trojan
[NOTE] The file was moved to the quarantine directory under the name '6ea2d25c.qua'.
C:\Users\schatzi\cxux.exe
[DETECTION] Is the TR/Alureon.DX.309 Trojan
[NOTE] The file was moved to the quarantine directory under the name '43f0fd1f.qua'.
C:\Users\Owner\Desktop\Geek Squad Data Transfer\Schatzi\Documents\_delMe\Security Threat Analysis.mht
[DETECTION] Contains recognition pattern of the JS/Fraud.AJ Java script virus
[NOTE] The file was moved to the quarantine directory under the name '5a86c69a.qua'.
End of the scan: Monday, May 30, 2011 21:05
Used time: 2:28:35 Hour(s)
The scan has been done completely.
31338 Scanned directories
645282 Files were scanned
10 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
10 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
645272 Files not concerned
2532 Archives were scanned
0 Warnings
16 Notes
469424 Objects were scanned with rootkit scan
6 Hidden objects were found