====================| Avira System Scan Log |=====================
Avira Antivirus Suite
Report file date: Sunday, June 15, 2014 02:04
The program is running as an unrestricted full version.
Online services are available.
Licensee : Ralph Wolf
Serial number : 2222585904-PEPWM-0000003
Platform : Windows 7 Professional
Windows version : (Service Pack 1) [6.1.7601]
Boot mode : Normally booted
Username : SYSTEM
Computer name : RWOLF02
Version information:
BUILD.DAT : 14.0.4.672 93716 Bytes 5/27/2014 17:59:00
AVSCAN.EXE : 14.0.4.632 1030736 Bytes 5/20/2014 07:53:37
AVSCANRC.DLL : 14.0.4.620 52304 Bytes 5/20/2014 07:53:37
LUKE.DLL : 14.0.4.620 57936 Bytes 5/20/2014 07:53:55
AVSCPLR.DLL : 14.0.4.620 89680 Bytes 5/20/2014 07:53:37
AVREG.DLL : 14.0.4.632 261200 Bytes 5/20/2014 07:53:35
avlode.dll : 14.0.4.638 583760 Bytes 5/20/2014 07:53:33
avlode.rdf : 14.0.4.22 64276 Bytes 5/15/2014 13:58:29
XBV00008.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:42
XBV00009.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:42
XBV00010.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:42
XBV00011.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:42
XBV00012.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:42
XBV00013.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:42
XBV00014.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:42
XBV00015.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:42
XBV00016.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:42
XBV00017.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:42
XBV00018.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:42
XBV00019.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:43
XBV00020.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:43
XBV00021.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:43
XBV00022.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:43
XBV00023.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:43
XBV00024.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:43
XBV00025.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:43
XBV00026.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:43
XBV00027.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:43
XBV00028.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:43
XBV00029.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:43
XBV00030.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:43
XBV00031.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:43
XBV00032.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:44
XBV00033.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:44
XBV00034.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:44
XBV00035.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:44
XBV00036.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:44
XBV00037.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:44
XBV00038.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:44
XBV00039.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:44
XBV00040.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:44
XBV00041.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:44
XBV00098.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:59
XBV00099.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:59
XBV00100.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:59
XBV00101.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:59
XBV00102.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:59
XBV00103.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:59
XBV00104.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:59
XBV00105.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:59
XBV00106.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:59
XBV00107.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:59
XBV00108.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:59
XBV00109.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:59
XBV00110.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:00:59
XBV00111.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:01
XBV00112.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:01
XBV00113.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:02
XBV00114.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:02
XBV00115.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:02
XBV00116.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:02
XBV00117.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:02
XBV00118.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:02
XBV00119.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:02
XBV00120.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:02
XBV00121.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:02
XBV00122.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:02
XBV00123.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:02
XBV00124.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:02
XBV00125.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:02
XBV00126.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:02
XBV00127.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:02
XBV00128.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:03
XBV00129.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:03
XBV00130.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:03
XBV00131.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:03
XBV00132.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:03
XBV00133.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:03
XBV00134.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:03
XBV00135.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:03
XBV00136.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:03
XBV00137.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:03
XBV00138.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:03
XBV00139.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:03
XBV00140.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:03
XBV00141.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:03
XBV00142.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:03
XBV00143.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:04
XBV00144.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:04
XBV00145.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:04
XBV00146.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:04
XBV00147.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:04
XBV00148.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:04
XBV00149.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:04
XBV00150.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:04
XBV00151.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:04
XBV00152.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:04
XBV00153.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:04
XBV00154.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:04
XBV00155.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:04
XBV00156.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:04
XBV00157.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:04
XBV00158.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:05
XBV00159.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:05
XBV00160.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:05
XBV00161.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:05
XBV00162.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:05
XBV00163.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:05
XBV00164.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:05
XBV00165.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:05
XBV00166.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:05
XBV00167.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:05
XBV00168.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:05
XBV00169.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:05
XBV00170.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:05
XBV00171.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:05
XBV00172.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:05
XBV00173.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:05
XBV00174.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:06
XBV00175.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:06
XBV00176.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:06
XBV00177.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:06
XBV00178.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:06
XBV00179.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:06
XBV00180.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:06
XBV00181.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:06
XBV00182.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:06
XBV00183.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:06
XBV00184.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:06
XBV00185.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:06
XBV00186.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:06
XBV00187.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:06
XBV00188.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:06
XBV00189.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:07
XBV00190.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:07
XBV00191.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:07
XBV00192.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:07
XBV00193.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:07
XBV00194.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:07
XBV00195.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:07
XBV00196.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:07
XBV00197.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:07
XBV00198.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:07
XBV00199.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:07
XBV00200.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:07
XBV00201.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:07
XBV00202.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:07
XBV00203.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:07
XBV00204.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:08
XBV00205.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:08
XBV00206.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:08
XBV00207.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:08
XBV00208.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:08
XBV00209.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:08
XBV00210.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:08
XBV00211.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:08
XBV00212.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:08
XBV00213.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:08
XBV00214.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:08
XBV00215.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:08
XBV00216.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:08
XBV00217.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:08
XBV00218.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:08
XBV00219.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:09
XBV00220.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:09
XBV00221.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:09
XBV00222.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:09
XBV00223.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:09
XBV00224.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:09
XBV00225.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:09
XBV00226.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:09
XBV00227.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:09
XBV00228.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:09
XBV00229.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:09
XBV00230.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:10
XBV00231.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:10
XBV00232.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:10
XBV00233.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:10
XBV00234.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:10
XBV00235.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:10
XBV00236.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:10
XBV00237.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:10
XBV00238.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:10
XBV00239.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:10
XBV00240.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:10
XBV00241.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:11
XBV00242.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:12
XBV00243.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:12
XBV00244.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:12
XBV00245.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:12
XBV00246.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:12
XBV00247.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:12
XBV00248.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:12
XBV00249.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:12
XBV00250.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:12
XBV00251.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:12
XBV00252.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:12
XBV00253.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:12
XBV00254.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:12
XBV00255.VDF : 8.11.153.142 2048 Bytes 6/6/2014 10:01:12
XBV00000.VDF : 7.11.70.0 66736640 Bytes 4/4/2013 09:27:05
XBV00001.VDF : 7.11.74.226 2201600 Bytes 4/30/2013 10:00:53
XBV00002.VDF : 7.11.80.60 2751488 Bytes 5/28/2013 09:45:21
XBV00003.VDF : 7.11.85.214 2162688 Bytes 6/21/2013 12:57:22
XBV00004.VDF : 7.11.91.176 3903488 Bytes 7/23/2013 10:27:03
XBV00005.VDF : 7.11.98.186 6822912 Bytes 8/29/2013 08:46:00
XBV00006.VDF : 7.11.139.38 15708672 Bytes 3/27/2014 11:54:35
XBV00007.VDF : 7.11.152.100 4193792 Bytes 6/2/2014 12:05:37
XBV00042.VDF : 8.11.153.142 710656 Bytes 6/6/2014 10:00:45
XBV00043.VDF : 8.11.153.146 297472 Bytes 6/6/2014 10:00:46
XBV00044.VDF : 8.11.153.148 32256 Bytes 6/6/2014 10:00:46
XBV00045.VDF : 8.11.153.150 2048 Bytes 6/6/2014 10:00:46
XBV00046.VDF : 8.11.153.156 43008 Bytes 6/6/2014 10:00:46
XBV00047.VDF : 8.11.153.176 2048 Bytes 6/6/2014 10:00:46
XBV00048.VDF : 8.11.153.178 2048 Bytes 6/7/2014 10:00:46
XBV00049.VDF : 8.11.153.196 27648 Bytes 6/7/2014 10:00:46
XBV00050.VDF : 8.11.153.214 4096 Bytes 6/7/2014 10:00:46
XBV00051.VDF : 8.11.153.218 26624 Bytes 6/7/2014 10:00:47
XBV00052.VDF : 8.11.153.220 2048 Bytes 6/7/2014 10:00:47
XBV00053.VDF : 8.11.153.222 43520 Bytes 6/8/2014 10:00:47
XBV00054.VDF : 8.11.153.226 2048 Bytes 6/8/2014 10:00:47
XBV00055.VDF : 8.11.153.230 37376 Bytes 6/8/2014 10:00:47
XBV00056.VDF : 8.11.153.232 2048 Bytes 6/8/2014 10:00:47
XBV00057.VDF : 8.11.153.234 33792 Bytes 6/9/2014 10:00:47
XBV00058.VDF : 8.11.153.236 2048 Bytes 6/9/2014 10:00:47
XBV00059.VDF : 8.11.153.238 17920 Bytes 6/9/2014 10:00:47
XBV00060.VDF : 8.11.153.240 4608 Bytes 6/9/2014 10:00:53
XBV00061.VDF : 8.11.153.242 3584 Bytes 6/9/2014 10:00:53
XBV00062.VDF : 8.11.153.244 4608 Bytes 6/9/2014 10:00:53
XBV00063.VDF : 8.11.153.246 2048 Bytes 6/9/2014 10:00:54
XBV00064.VDF : 8.11.154.8 11776 Bytes 6/10/2014 10:00:54
XBV00065.VDF : 8.11.154.26 2048 Bytes 6/10/2014 10:00:54
XBV00066.VDF : 8.11.154.44 2560 Bytes 6/10/2014 10:00:54
XBV00067.VDF : 8.11.154.46 253440 Bytes 6/10/2014 10:00:55
XBV00068.VDF : 8.11.154.58 293888 Bytes 6/10/2014 10:00:55
XBV00069.VDF : 8.11.154.60 12288 Bytes 6/10/2014 10:00:55
XBV00070.VDF : 8.11.154.66 9728 Bytes 6/10/2014 10:00:55
XBV00071.VDF : 8.11.154.68 93184 Bytes 6/11/2014 10:00:56
XBV00072.VDF : 8.11.154.86 31232 Bytes 6/11/2014 10:00:56
XBV00073.VDF : 8.11.154.102 4096 Bytes 6/11/2014 10:00:56
XBV00074.VDF : 8.11.154.122 135168 Bytes 6/11/2014 10:00:56
XBV00075.VDF : 8.11.154.126 17408 Bytes 6/11/2014 10:00:57
XBV00076.VDF : 8.11.154.128 139264 Bytes 6/11/2014 10:00:57
XBV00077.VDF : 8.11.154.130 4608 Bytes 6/11/2014 10:00:57
XBV00078.VDF : 8.11.154.134 10752 Bytes 6/11/2014 10:00:57
XBV00079.VDF : 8.11.154.136 8192 Bytes 6/11/2014 10:00:57
XBV00080.VDF : 8.11.154.142 171520 Bytes 6/12/2014 10:00:57
XBV00081.VDF : 8.11.154.144 7168 Bytes 6/12/2014 10:00:58
XBV00082.VDF : 8.11.154.146 153600 Bytes 6/12/2014 14:00:25
XBV00083.VDF : 8.11.154.150 2048 Bytes 6/12/2014 14:00:25
XBV00084.VDF : 8.11.154.152 19968 Bytes 6/12/2014 14:00:25
XBV00085.VDF : 8.11.154.156 138240 Bytes 6/12/2014 18:00:33
XBV00086.VDF : 8.11.154.158 2048 Bytes 6/12/2014 18:00:34
XBV00087.VDF : 8.11.154.162 4096 Bytes 6/12/2014 22:00:31
XBV00088.VDF : 8.11.154.166 183808 Bytes 6/13/2014 10:00:32
XBV00089.VDF : 8.11.154.168 2048 Bytes 6/13/2014 10:00:33
XBV00090.VDF : 8.11.154.184 18432 Bytes 6/13/2014 12:00:28
XBV00091.VDF : 8.11.154.200 19456 Bytes 6/13/2014 14:00:27
XBV00092.VDF : 8.11.154.218 54272 Bytes 6/13/2014 18:00:34
XBV00093.VDF : 8.11.154.220 171008 Bytes 6/14/2014 12:00:36
XBV00094.VDF : 8.11.154.222 2048 Bytes 6/14/2014 12:00:36
XBV00095.VDF : 8.11.154.226 142848 Bytes 6/14/2014 16:00:30
XBV00096.VDF : 8.11.154.228 2048 Bytes 6/14/2014 18:00:37
XBV00097.VDF : 8.11.154.230 2048 Bytes 6/14/2014 18:00:37
LOCAL000.VDF : 8.11.154.230 106263040 Bytes 6/14/2014 18:00:47
Engine version : 8.3.20.10
AEVDF.DLL : 8.3.0.4 118976 Bytes 3/20/2014 15:53:43
AESCRIPT.DLL : 8.1.4.212 528584 Bytes 6/13/2014 10:00:32
AESCN.DLL : 8.3.1.2 135360 Bytes 5/28/2014 16:03:36
AESBX.DLL : 8.2.20.24 1409224 Bytes 5/8/2014 13:20:37
AERDL.DLL : 8.2.0.138 704888 Bytes 12/2/2013 13:56:26
AEPACK.DLL : 8.4.0.24 778440 Bytes 5/13/2014 14:35:36
AEOFFICE.DLL : 8.3.0.4 205000 Bytes 4/17/2014 15:23:09
AEHEUR.DLL : 8.1.4.1112 6738120 Bytes 6/13/2014 10:00:32
AEHELP.DLL : 8.3.1.0 278728 Bytes 5/28/2014 16:03:31
AEGEN.DLL : 8.1.7.28 450752 Bytes 6/6/2014 10:05:33
AEEXP.DLL : 8.4.2.2 237760 Bytes 6/4/2014 14:05:32
AEEMU.DLL : 8.1.3.2 393587 Bytes 8/28/2012 18:07:28
AEDROID.DLL : 8.4.2.24 442568 Bytes 6/4/2014 14:05:33
AECORE.DLL : 8.3.1.4 241864 Bytes 6/6/2014 10:05:33
AEBB.DLL : 8.1.1.4 53619 Bytes 11/5/2012 15:32:13
AVWINLL.DLL : 14.0.4.620 24144 Bytes 5/20/2014 07:53:28
AVPREF.DLL : 14.0.4.632 50256 Bytes 5/20/2014 07:53:34
AVREP.DLL : 14.0.4.620 219216 Bytes 5/20/2014 07:53:35
AVARKT.DLL : 14.0.4.632 225872 Bytes 5/20/2014 07:53:29
AVEVTLOG.DLL : 14.0.4.620 182352 Bytes 5/20/2014 07:53:31
SQLITE3.DLL : 14.0.4.620 452176 Bytes 5/20/2014 07:54:00
AVSMTP.DLL : 14.0.4.620 76368 Bytes 5/20/2014 07:53:38
NETNT.DLL : 14.0.4.620 13392 Bytes 5/20/2014 07:53:55
RCIMAGE.DLL : 14.0.4.620 4786256 Bytes 5/20/2014 07:53:28
RCTEXT.DLL : 14.0.4.620 72784 Bytes 5/20/2014 07:53:28
Configuration settings for the scan:
Jobname.............................: Complete system scan
Configuration file..................: C:\program files (x86)\avira\antivir desktop\sysscan.avp
Reporting...........................: default
Primary action......................: Interactive
Secondary action....................: Ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:,
Process scan........................: on
Extended process scan...............: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Limit recursion depth...............: 20
Smart extensions....................: on
Macrovirus heuristic................: on
File heuristic......................: extended
Start of the scan: Sunday, June 15, 2014 02:04
Start scanning boot sectors:
Boot sector 'HDD0(C

'
[INFO] No virus was found!
Starting search for hidden objects.
Error in ARK library
The scan of running processes will be started:
Scan process 'svchost.exe' - '53' Module(s) have been scanned
Scan process 'VPDAgent_x64.exe' - '21' Module(s) have been scanned
Scan process 'nvvsvc.exe' - '36' Module(s) have been scanned
Scan process 'svchost.exe' - '40' Module(s) have been scanned
Scan process 'svchost.exe' - '104' Module(s) have been scanned
Scan process 'svchost.exe' - '120' Module(s) have been scanned
Scan process 'svchost.exe' - '91' Module(s) have been scanned
Scan process 'svchost.exe' - '160' Module(s) have been scanned
Scan process 'svchost.exe' - '29' Module(s) have been scanned
Scan process 'svchost.exe' - '99' Module(s) have been scanned
Scan process 'spoolsv.exe' - '100' Module(s) have been scanned
Scan process 'sched.exe' - '60' Module(s) have been scanned
Scan process 'nvxdsync.exe' - '55' Module(s) have been scanned
Scan process 'nvvsvc.exe' - '67' Module(s) have been scanned
Scan process 'svchost.exe' - '64' Module(s) have been scanned
Scan process 'ActiveDelayDeviceService.exe' - '34' Module(s) have been scanned
Scan process 'avguard.exe' - '109' Module(s) have been scanned
Scan process 'AppleMobileDeviceService.exe' - '74' Module(s) have been scanned
Scan process 'WLANExt.exe' - '81' Module(s) have been scanned
Scan process 'conhost.exe' - '17' Module(s) have been scanned
Scan process 'devmonsrv.exe' - '40' Module(s) have been scanned
Scan process 'mDNSResponder.exe' - '37' Module(s) have been scanned
Scan process 'svchost.exe' - '34' Module(s) have been scanned
Scan process 'E_S40STB.EXE' - '22' Module(s) have been scanned
Scan process 'E_S40RPB.EXE' - '18' Module(s) have been scanned
Scan process 'EvtEng.exe' - '66' Module(s) have been scanned
Scan process 'svchost.exe' - '81' Module(s) have been scanned
Scan process 'HeciServer.exe' - '28' Module(s) have been scanned
Scan process 'IntelMeFWService.exe' - '26' Module(s) have been scanned
Scan process 'jhi_service.exe' - '49' Module(s) have been scanned
Scan process 'lkads.exe' - '55' Module(s) have been scanned
Scan process 'sqlservr.exe' - '62' Module(s) have been scanned
Scan process 'nimxs.exe' - '60' Module(s) have been scanned
Scan process 'NeatStartupService.exe' - '50' Module(s) have been scanned
Scan process 'nidmsrv.exe' - '55' Module(s) have been scanned
Scan process 'SystemWebServer.exe' - '105' Module(s) have been scanned
Scan process 'tagsrv.exe' - '75' Module(s) have been scanned
Scan process 'Oasis2Service.exe' - '141' Module(s) have been scanned
Scan process 'PMBDeviceInfoProvider.exe' - '34' Module(s) have been scanned
Scan process 'rndlresolversvc.exe' - '26' Module(s) have been scanned
Scan process 'rpdsvc.exe' - '86' Module(s) have been scanned
Scan process 'avshadow.exe' - '29' Module(s) have been scanned
Scan process 'RealPlayerUpdateSvc.exe' - '58' Module(s) have been scanned
Scan process 'RegSrvc.exe' - '36' Module(s) have been scanned
Scan process 'sqlwriter.exe' - '34' Module(s) have been scanned
Scan process 'VESMgr.exe' - '42' Module(s) have been scanned
Scan process 'WLIDSVC.EXE' - '81' Module(s) have been scanned
Scan process 'VESMgrSub.exe' - '66' Module(s) have been scanned
Scan process 'VESMgrSub.exe' - '73' Module(s) have been scanned
Scan process 'ZeroConfigService.exe' - '85' Module(s) have been scanned
Scan process 'DllHost.exe' - '45' Module(s) have been scanned
Scan process 'unsecapp.exe' - '28' Module(s) have been scanned
Scan process 'obexsrv.exe' - '41' Module(s) have been scanned
Scan process 'wmiprvse.exe' - '49' Module(s) have been scanned
Scan process 'DllHost.exe' - '40' Module(s) have been scanned
Scan process 'lkcitdl.exe' - '58' Module(s) have been scanned
Scan process 'lktsrv.exe' - '57' Module(s) have been scanned
Scan process 'ApplicationWebServer.exe' - '59' Module(s) have been scanned
Scan process 'nimdnsResponder.exe' - '63' Module(s) have been scanned
Scan process 'niDiscSvc.exe' - '46' Module(s) have been scanned
Scan process 'WLIDSvcM.exe' - '18' Module(s) have been scanned
Scan process 'avmailc.exe' - '44' Module(s) have been scanned
Scan process 'AVWEBGRD.EXE' - '68' Module(s) have been scanned
Scan process 'SearchIndexer.exe' - '63' Module(s) have been scanned
Scan process 'svchost.exe' - '39' Module(s) have been scanned
Scan process 'PhotoshopElementsFileAgent.exe' - '33' Module(s) have been scanned
Scan process 'BTHSAmpPalService.exe' - '21' Module(s) have been scanned
Scan process 'BTHSSecurityMgr.exe' - '46' Module(s) have been scanned
Scan process 'esrv_svc.exe' - '55' Module(s) have been scanned
Scan process 'IAStorDataMgrSvc.exe' - '55' Module(s) have been scanned
Scan process 'GoogleCrashHandler.exe' - '35' Module(s) have been scanned
Scan process 'GoogleCrashHandler64.exe' - '30' Module(s) have been scanned
Scan process 'RIconMan.exe' - '34' Module(s) have been scanned
Scan process 'LMS.exe' - '34' Module(s) have been scanned
Scan process 'daemonu.exe' - '80' Module(s) have been scanned
Scan process 'VCPerfService.exe' - '43' Module(s) have been scanned
Scan process 'uCamMonitor.exe' - '34' Module(s) have been scanned
Scan process 'SPMService.exe' - '64' Module(s) have been scanned
Scan process 'VSNService.exe' - '58' Module(s) have been scanned
Scan process 'wmpnetwk.exe' - '121' Module(s) have been scanned
Scan process 'taskeng.exe' - '29' Module(s) have been scanned
Scan process 'vim.exe' - '60' Module(s) have been scanned
Scan process 'UNS.exe' - '65' Module(s) have been scanned
Scan process 'taskeng.exe' - '34' Module(s) have been scanned
Scan process 'VSNClient.exe' - '70' Module(s) have been scanned
Scan process 'VESGfxMgr.exe' - '27' Module(s) have been scanned
Scan process 'rundll32.exe' - '27' Module(s) have been scanned
Scan process 'Dwm.exe' - '38' Module(s) have been scanned
Scan process 'Explorer.EXE' - '200' Module(s) have been scanned
Scan process 'taskhost.exe' - '60' Module(s) have been scanned
Scan process 'igfxext.exe' - '24' Module(s) have been scanned
Scan process 'igfxsrvc.exe' - '30' Module(s) have been scanned
Scan process 'RAVBg64.exe' - '42' Module(s) have been scanned
Scan process 'RAVBg64.exe' - '42' Module(s) have been scanned
Scan process 'igfxtray.exe' - '28' Module(s) have been scanned
Scan process 'hkcmd.exe' - '26' Module(s) have been scanned
Scan process 'igfxpers.exe' - '39' Module(s) have been scanned
Scan process 'SynTPEnh.exe' - '47' Module(s) have been scanned
Scan process 'GoogleUpdate.exe' - '57' Module(s) have been scanned
Scan process 'rpsystray.exe' - '24' Module(s) have been scanned
Scan process 'iusb3mon.exe' - '35' Module(s) have been scanned
Scan process 'ISBMgr.exe' - '46' Module(s) have been scanned
Scan process 'PMBVolumeWatcher.exe' - '68' Module(s) have been scanned
Scan process 'avgnt.exe' - '126' Module(s) have been scanned
Scan process 'jusched.exe' - '36' Module(s) have been scanned
Scan process 'realsched.exe' - '39' Module(s) have been scanned
Scan process 'SYNTPHELPER.EXE' - '17' Module(s) have been scanned
Scan process 'nvtray.exe' - '59' Module(s) have been scanned
Scan process 'svchost.exe' - '62' Module(s) have been scanned
Scan process 'NOTEPAD.EXE' - '30' Module(s) have been scanned
Scan process 'listener.exe' - '26' Module(s) have been scanned
Scan process 'DllHost.exe' - '46' Module(s) have been scanned
Scan process 'esrv.exe' - '48' Module(s) have been scanned
Scan process 'conhost.exe' - '17' Module(s) have been scanned
Scan process 'SPMgr.exe' - '65' Module(s) have been scanned
Scan process 'taskeng.exe' - '34' Module(s) have been scanned
Scan process 'KeyboardShortcuts.exe' - '109' Module(s) have been scanned
Scan process 'IAStorIcon.exe' - '56' Module(s) have been scanned
Scan process 'VCSystemTray.exe' - '141' Module(s) have been scanned
Scan process 'VCService.exe' - '36' Module(s) have been scanned
Scan process 'VCAgent.exe' - '171' Module(s) have been scanned
Scan process 'vds.exe' - '62' Module(s) have been scanned
Scan process 'VCAdmin.exe' - '145' Module(s) have been scanned
Scan process 'vim.exe' - '64' Module(s) have been scanned
Scan process 'svchost.exe' - '29' Module(s) have been scanned
Scan process 'iexplore.exe' - '104' Module(s) have been scanned
Scan process 'IEXPLORE.EXE' - '133' Module(s) have been scanned
Scan process 'FlashUtil64_13_0_0_214_ActiveX.exe' - '67' Module(s) have been scanned
Scan process 'avcenter.exe' - '126' Module(s) have been scanned
Scan process 'avscan.exe' - '127' Module(s) have been scanned
Scan process 'vssvc.exe' - '48' Module(s) have been scanned
Scan process 'svchost.exe' - '29' Module(s) have been scanned
Scan process 'IEXPLORE.EXE' - '107' Module(s) have been scanned
Scan process 'SearchProtocolHost.exe' - '38' Module(s) have been scanned
Scan process 'SearchFilterHost.exe' - '29' Module(s) have been scanned
Scan process 'smss.exe' - '2' Module(s) have been scanned
Scan process 'csrss.exe' - '18' Module(s) have been scanned
Scan process 'csrss.exe' - '18' Module(s) have been scanned
Scan process 'wininit.exe' - '27' Module(s) have been scanned
Scan process 'winlogon.exe' - '32' Module(s) have been scanned
Scan process 'services.exe' - '37' Module(s) have been scanned
Scan process 'lsass.exe' - '76' Module(s) have been scanned
Scan process 'lsm.exe' - '31' Module(s) have been scanned
Starting to scan executable files (registry):
The registry was scanned ( '2868' files ).
Starting the file scan:
Begin scan in 'C:\'
[0] Archive type: NSIS
--> ProgramFilesDir/winusbcoinstaller2.dll
[1] Archive type: RSRC
--> C:\MyDocs\orion\CmnUtils\DiagUtils\zlib128.zip
[2] Archive type: ZIP
--> zlib-1.2.8/contrib/dotzlib/DotZLib.chm
[3] Archive type: CHM
--> #IDXHDR
[WARNING] The file could not be read!
--> #TOPICS
[WARNING] The file could not be read!
--> #URLTBL
[WARNING] The file could not be read!
--> #URLSTR
[WARNING] The file could not be read!
--> #STRINGS
[WARNING] The file could not be read!
--> C:\MyDocs\orion\CmnUtils\DiagUtils\zlib128\zlib-1.2.8\contrib\dotzlib\DotZLib.chm
[2] Archive type: CHM
--> #IDXHDR
[WARNING] The file could not be read!
--> #TOPICS
[WARNING] The file could not be read!
--> #URLTBL
[WARNING] The file could not be read!
--> #URLSTR
[WARNING] The file could not be read!
--> #STRINGS
[WARNING] The file could not be read!
--> C:\MyDocs\Personal\Diving-Personal\TechDiving\Liquivision\album.zip
[2] Archive type: ZIP
--> V5.5 (SN 3401 +) General Utility Software - OMNITEST 6.04/erase_X1_program.exe
[DETECTION] Is the TR/Buzus.isqza Trojan
[WARNING] Infected files in archives cannot be repaired
--> V5.5 (SN 3401 +) General Utility Software - OMNITEST 6.04/Public_OMNITEST_Software_v6_04.zzz
[3] Archive type: ZIP
--> erase_X1_program.exe
[DETECTION] Is the TR/Buzus.isqza Trojan
[WARNING] Infected files in archives cannot be repaired
--> V5.5 (SN 3401 +) General Utility Software - OMNITEST 6.04/V5.5 General Utility Software - OMNITEST 6.04.zzz
[3] Archive type: ZIP
--> Public_OMNITEST_Software_v6_04.zzz
[4] Archive type: ZIP
--> erase_X1_program.exe
[DETECTION] Is the TR/Buzus.isqza Trojan
[WARNING] Infected files in archives cannot be repaired
--> erase_X1_program.exe
[DETECTION] Is the TR/Buzus.isqza Trojan
[WARNING] Infected files in archives cannot be repaired
C:\MyDocs\Personal\Diving-Personal\TechDiving\Liquivision\album.zip
[DETECTION] Is the TR/Buzus.isqza Trojan
--> C:\MyDocs\Personal\Diving-Personal\TechDiving\Liquivision\X1_V5_5_Diagnostic_SoftwareTake2.zip
[2] Archive type: ZIP
--> X1_V5_5_Diagnostic_Software/erase_X1_program.exe
[DETECTION] Is the TR/Buzus.isqza Trojan
[WARNING] Infected files in archives cannot be repaired
C:\MyDocs\Personal\Diving-Personal\TechDiving\Liquivision\X1_V5_5_Diagnostic_SoftwareTake2.zip
[DETECTION] Is the TR/Buzus.isqza Trojan
C:\MyDocs\Personal\Diving-Personal\TechDiving\Liquivision\album\V5.5 (SN 3401 +) General Utility Software - OMNITEST 6.04\erase_X1_program.exe
[DETECTION] Is the TR/Gendal.KD.371745 Trojan
--> C:\MyDocs\Personal\Diving-Personal\TechDiving\Liquivision\album\V5.5 (SN 3401 +) General Utility Software - OMNITEST 6.04\Public_OMNITEST_Software_v6_04.zip
[2] Archive type: ZIP
--> erase_X1_program.exe
[DETECTION] Is the TR/Buzus.isqza Trojan
[WARNING] Infected files in archives cannot be repaired
C:\MyDocs\Personal\Diving-Personal\TechDiving\Liquivision\album\V5.5 (SN 3401 +) General Utility Software - OMNITEST 6.04\Public_OMNITEST_Software_v6_04.zip
[DETECTION] Is the TR/Buzus.isqza Trojan
--> C:\MyDocs\Personal\Diving-Personal\TechDiving\Liquivision\album\V5.5 (SN 3401 +) General Utility Software - OMNITEST 6.04\V5.5 General Utility Software - OMNITEST 6.04.zip
[2] Archive type: ZIP
--> Public_OMNITEST_Software_v6_04.zzz
[3] Archive type: ZIP
--> erase_X1_program.exe
[DETECTION] Is the TR/Buzus.isqza Trojan
[WARNING] Infected files in archives cannot be repaired
--> erase_X1_program.exe
[DETECTION] Is the TR/Buzus.isqza Trojan
[WARNING] Infected files in archives cannot be repaired
C:\MyDocs\Personal\Diving-Personal\TechDiving\Liquivision\album\V5.5 (SN 3401 +) General Utility Software - OMNITEST 6.04\V5.5 General Utility Software - OMNITEST 6.04.zip
[DETECTION] Is the TR/Buzus.isqza Trojan
Beginning disinfection:
C:\MyDocs\Personal\Diving-Personal\TechDiving\Liquivision\album\V5.5 (SN 3401 +) General Utility Software - OMNITEST 6.04\V5.5 General Utility Software - OMNITEST 6.04.zip
[DETECTION] Is the TR/Buzus.isqza Trojan
[WARNING] The file was ignored.
C:\MyDocs\Personal\Diving-Personal\TechDiving\Liquivision\album\V5.5 (SN 3401 +) General Utility Software - OMNITEST 6.04\Public_OMNITEST_Software_v6_04.zip
[DETECTION] Is the TR/Buzus.isqza Trojan
[WARNING] The file was ignored.
C:\MyDocs\Personal\Diving-Personal\TechDiving\Liquivision\album\V5.5 (SN 3401 +) General Utility Software - OMNITEST 6.04\erase_X1_program.exe
[DETECTION] Is the TR/Gendal.KD.371745 Trojan
[WARNING] The file was ignored.
C:\MyDocs\Personal\Diving-Personal\TechDiving\Liquivision\X1_V5_5_Diagnostic_SoftwareTake2.zip
[DETECTION] Is the TR/Buzus.isqza Trojan
[WARNING] The file was ignored.
C:\MyDocs\Personal\Diving-Personal\TechDiving\Liquivision\album.zip
[DETECTION] Is the TR/Buzus.isqza Trojan
[WARNING] The file was ignored.
End of the scan: Sunday, June 15, 2014 06:19
Used time: 3:58:59 Hour(s)
The scan has been done completely.
69701 Scanned directories
1821486 Files were scanned
13 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 Files were deleted
0 Viruses and unwanted programs were repaired
0 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
1821473 Files not concerned
40485 Archives were scanned
13 Warnings
0 Notes
145 Objects were scanned with rootkit scan
0 Hidden objects were found