38% - Scan : running -------------------Scanned: 265 Detected: 14 Untreated: 14 Start time: 9/20/2009 10:06:22 PM Duration: 00:00:57 Finish time: 9/20/2009 10:08:50 PM Detected -------Status Object ----------detected: virus Virus.Win32.Sality.aa File: I:\explorcr.exe detected: virus Virus.Win32.Sality.aa File: I:\vbvsf.cmd detected: Trojan program Trojan.Win32.Autoit.ciFile: I:\New Folder .exe detected: Trojan program Trojan.Win32.Autoit.ciFile: I:\Received\Received .exe detected: Trojan program Trojan.Win32.Autoit.ciFile: I:\Phbimage\Phbimage .exe detected: Trojan program Trojan.Win32.Autoit.ciFile: I:\Images\Images .exe detected: Trojan program Trojan.Win32.Autoit.ciFile: I:\Audio\Audio .exe detected: Trojan program Trojan.Win32.Autoit.ciFile: I:\Download\Download .exe detected: Trojan program Trojan.Win32.Autoit.ciFile: I:\Photos\Photos .exe detected: Trojan program Trojan.Win32.Autoit.ciFile: I:\My Music\My Music .exe detected: Trojan program Trojan.Win32.Autoit.ciFile: I:\brs\brs .exe detected: Trojan program Trojan.Win32.Autoit.ciFile: I:\brs\offline\offline .exe detected: Trojan program Trojan.Win32.Autoit.ciFile: I:\Video\Video .exe detected: Trojan program Trojan.Win32.Agent.rzwFile: I:\kaspersky\kaspersky solution.exe Events -----Time Name Status ---- ---- -----9/20/2009 10:06:22 PM 9/20/2009 10:06:22 PM
Reason -----Logical disk sector: I ok File: I:\phb_video.dat ok
scanned iChecker
Statistics ---------Object Scanned Dangerous objects Untreated Deleted Moved to Quarantine Archives Packed files Password protected Corrupted ---------------------------- --------------------------------------------------------------------------Settings -------Parameter Value ------------Security Level Recommended Action Prompt for action when the scan is complete Run mode Manually File types Scan all files Scan only new and changed files No Scan archives all Scan embedded OLE objects all
Do not scan archives larger than No Skip if scan takes longer than No Parse email formats No Scan password-protected archives No Use iChecker technology Yes Use iSwift technology Yes Register information about dangerous objects in application statistics Yes Rootkit scan Yes Extended rootkit scan No Use heuristic analyser Yes Heuristic analyser level 3