C:\ProgramData\qykuat\spoof.avi Win32/Agent.SWD trojan
C:\Qoobox\Quarantine\C\Program Files (x86)\Yontoo Layers Runtime\YontooIEClient.dll.vir a variant of Win32/Adware.Yontoo.A application
C:\Qoobox\Quarantine\C\ProgramData\Tarma Installer\{2E1037EA-038A-425F-86B9-6CD19B8497E9}\_Setupx.dll.vir a variant of Win32/Adware.Yontoo.B application
C:\Qoobox\Quarantine\C\ProgramData\Tarma Installer\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}\_Setupx.dll.vir a variant of Win32/Adware.Yontoo.B application
C:\Qoobox\Quarantine\C\Users\Mr Roboto\AppData\Roaming\firefox.exe.vir Win32/Adware.WinAntiVirus.AD application
C:\Qoobox\Quarantine\C\Users\Mr Roboto\AppData\Roaming\r000uccS1ib3\AV Protection 2011v121.exe.vir Win32/Adware.WinAntiVirus.AD application
C:\Qoobox\Quarantine\C\Windows\System32\consrv.dll.vir Win64/Sirefef.E trojan
C:\Qoobox\Quarantine\C\Windows\SysWOW64\AV Protection 2011v121.exe.vir Win32/Adware.WinAntiVirus.AD application
C:\Users\All Users\qykuat\spoof.avi Win32/Agent.SWD trojan
C:\Windows\system64\consrv.dll Win64/Sirefef.E trojan
C:\_OTM\MovedFiles\12012011_084200\C_Users\Mr Roboto\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\16\773490-5eab2bdc a variant of Win32/Kryptik.WFA trojan
Operating memory a variant of Win32/Sirefef.DN trojan