Thank you very much for attempting to answer my question, but you missed the point.
You said “you can’t access ‘System Volume Information’ for security reason”.
If you re-read my 1st post again, you will notice that CAV has detected 3 out of 4 malwares inside of the System Volume Information. So there is no reason why it can’t. The question is the 4th missed virus, where Avira managed to pick up but CAV missed.
As I have recommended my company to switch from Sophos to Avira, I would very much wanted to re-propose them a new antivirus - Comodo Anti-Virus. That is why I am very keen to improve CAV on my part as a home user.
Now referring back to my last post (the one before Creasy reply), I have attached a zip file but was removed. It’s alright - I will re-post it as picture & text in quote.
Avira AntiVir Personal
Report file date: Wednesday, March 25, 2009 16:24
Scanning for 1315646 virus strains and unwanted programs.
Licensee : Avira AntiVir Personal - FREE Antivirus
Serial number : 0000149996-ADJIE-0000001
Platform : Windows XP
Windows version : (Service Pack 3) [5.1.2600]
Boot mode : Normally booted
Username : SYSTEM
Computer name : CHRIS
Version information:
BUILD.DAT : 9.0.0.387 17962 Bytes 3/24/2009 11:04:00
AVSCAN.EXE : 9.0.3.3 464641 Bytes 2/24/2009 04:13:26
AVSCAN.DLL : 9.0.3.0 40705 Bytes 2/27/2009 02:58:24
LUKE.DLL : 9.0.3.2 209665 Bytes 2/20/2009 03:35:49
LUKERES.DLL : 9.0.2.0 12033 Bytes 2/27/2009 02:58:52
ANTIVIR0.VDF : 7.1.0.0 15603712 Bytes 10/27/2008 04:30:36
ANTIVIR1.VDF : 7.1.2.12 3336192 Bytes 2/11/2009 12:33:26
ANTIVIR2.VDF : 7.1.2.199 1008640 Bytes 3/22/2009 05:14:19
ANTIVIR3.VDF : 7.1.2.211 64000 Bytes 3/24/2009 05:14:21
Engineversion : 8.2.0.126
AEVDF.DLL : 8.1.1.0 106868 Bytes 1/27/2009 09:36:42
AESCRIPT.DLL : 8.1.1.67 364923 Bytes 3/25/2009 05:14:54
AESCN.DLL : 8.1.1.8 127346 Bytes 3/25/2009 05:14:51
AERDL.DLL : 8.1.1.3 438645 Bytes 10/29/2008 10:24:41
AEPACK.DLL : 8.1.3.11 397687 Bytes 3/25/2009 05:14:49
AEOFFICE.DLL : 8.1.0.36 196987 Bytes 2/26/2009 12:01:56
AEHEUR.DLL : 8.1.0.111 1679736 Bytes 3/25/2009 05:14:44
AEHELP.DLL : 8.1.2.2 119158 Bytes 2/26/2009 12:01:56
AEGEN.DLL : 8.1.1.30 336245 Bytes 3/25/2009 05:14:25
AEEMU.DLL : 8.1.0.9 393588 Bytes 10/9/2008 06:32:40
AECORE.DLL : 8.1.6.6 176501 Bytes 2/17/2009 06:22:44
AEBB.DLL : 8.1.0.3 53618 Bytes 10/9/2008 06:32:40
AVWINLL.DLL : 9.0.0.3 18177 Bytes 12/12/2008 00:47:59
AVPREF.DLL : 9.0.0.1 43777 Bytes 12/5/2008 02:32:15
AVREP.DLL : 8.0.0.3 155905 Bytes 1/20/2009 06:34:28
AVREG.DLL : 9.0.0.0 36609 Bytes 12/5/2008 02:32:09
AVARKT.DLL : 9.0.0.1 292609 Bytes 2/8/2009 23:52:24
AVEVTLOG.DLL : 9.0.0.7 167169 Bytes 1/30/2009 02:37:08
SQLITE3.DLL : 3.6.1.0 326401 Bytes 1/28/2009 07:03:49
SMTPLIB.DLL : 9.2.0.25 28417 Bytes 2/2/2009 00:21:33
NETNT.DLL : 9.0.0.0 11521 Bytes 12/5/2008 02:32:10
RCIMAGE.DLL : 9.0.0.21 2438401 Bytes 2/9/2009 03:45:45
RCTEXT.DLL : 9.0.35.0 87297 Bytes 3/11/2009 07:55:12
Configuration settings for the scan:
Jobname…: Complete system scan
Configuration file…: c:\program files\avira\antivir
desktop\sysscan.avp
Logging…: low
Primary action…: interactive
Secondary action…: ignore
Scan master boot sector…: on
Scan boot sector…: on
Boot sectors…: C:, D:, F:,
Process scan…: on
Scan registry…: on
Search for rootkits…: on
Integrity checking of system files…: off
Scan all files…: All files
Scan archives…: on
Recursion depth…: 20
Smart extensions…: on
Macro heuristic…: on
File heuristic…: medium
Start of the scan: Wednesday, March 25, 2009 16:24
Starting search for hidden objects.
‘38569’ objects were checked, ‘0’ hidden objects were found.
The scan of running processes will be started
Scan process ‘avscan.exe’ - ‘1’ Module(s) have been scanned
Scan process ‘firefox.exe’ - ‘1’ Module(s) have been scanned
Scan process ‘avgnt.exe’ - ‘1’ Module(s) have been scanned
Scan process ‘sched.exe’ - ‘1’ Module(s) have been scanned
Scan process ‘avguard.exe’ - ‘1’ Module(s) have been scanned
Scan process ‘cssurf.exe’ - ‘1’ Module(s) have been scanned
Scan process ‘SynTPEnh.exe’ - ‘1’ Module(s) have been scanned
Scan process ‘atiptaxx.exe’ - ‘1’ Module(s) have been scanned
Scan process ‘explorer.exe’ - ‘1’ Module(s) have been scanned
Scan process ‘ati2evxx.exe’ - ‘1’ Module(s) have been scanned
Scan process ‘hpqwmiex.exe’ - ‘1’ Module(s) have been scanned
Scan process ‘sqlwriter.exe’ - ‘1’ Module(s) have been scanned
Scan process ‘NMSAccessU.exe’ - ‘1’ Module(s) have been scanned
Scan process ‘spoolsv.exe’ - ‘1’ Module(s) have been scanned
Scan process ‘svchost.exe’ - ‘1’ Module(s) have been scanned
Scan process ‘svchost.exe’ - ‘1’ Module(s) have been scanned
Scan process ‘svchost.exe’ - ‘1’ Module(s) have been scanned
Scan process ‘svchost.exe’ - ‘1’ Module(s) have been scanned
Scan process ‘svchost.exe’ - ‘1’ Module(s) have been scanned
Scan process ‘ati2evxx.exe’ - ‘1’ Module(s) have been scanned
Scan process ‘lsass.exe’ - ‘1’ Module(s) have been scanned
Scan process ‘services.exe’ - ‘1’ Module(s) have been scanned
Scan process ‘winlogon.exe’ - ‘1’ Module(s) have been scanned
Scan process ‘csrss.exe’ - ‘1’ Module(s) have been scanned
Scan process ‘smss.exe’ - ‘1’ Module(s) have been scanned
25 processes with 25 modules were scanned
Starting master boot sector scan:
Start scanning boot sectors:
Starting to scan executable files (registry).
The registry was scanned ( ‘52’ files ).
Starting the file scan:
Begin scan in ‘C:’
C:\pagefile.sys
[WARNING] The file could not be opened!
[NOTE] This file is a Windows system file.
[NOTE] This file cannot be opened for scanning.
C:\Program Files\hMailServer\Data\live.email.bak\tma34\01{0181A070-F101-48AB-
A744-75415827BBAF}.eml
[0] Archive type: MIME
→ IPLOGS.zip
[1] Archive type: ZIP
→ IPLOGS.exe
[DETECTION] Is the TR/FraudPack.81408 Trojan
C:\Program Files\hMailServer\Data\live.email.bak\tma34\0A{0ACCA1E5-1DD6-4DE0-
BCE6-E213A3C383C8}.eml
[0] Archive type: MIME
→ user-EA49943X-activities.zip
[1] Archive type: ZIP
→ user-EA49943X-activities.exe
[DETECTION] Is the TR/Spy.Goldun.axt Trojan
C:\Program Files\hMailServer\Data\live.email.bak\tma34\1B{1B0AAB3D-9142-40B0-
B195-816D395EBAA9}.eml
[0] Archive type: MIME
→ user-EA49943X-activities.zip
[1] Archive type: ZIP
→ user-EA49943X-activities.exe
[DETECTION] Is the TR/Spy.Goldun.axt Trojan
C:\Program Files\hMailServer\Data\live.email.bak\tma34\24{24F79B7D-96DC-4D0E-
836C-7DD5CCC2EB94}.eml
[0] Archive type: MIME
→ user-EA49943X-activities.zip
[1] Archive type: ZIP
→ user-EA49943X-activities.exe
[DETECTION] Is the TR/Spy.Goldun.axt Trojan
C:\Program Files\hMailServer\Data\live.email.bak\tma34\27{27374B15-E4E2-499F-
AE40-CE0563D3C7F7}.eml
[0] Archive type: MIME
→ user-EA49943X-activities.zip
[1] Archive type: ZIP
→ user-EA49943X-activities.exe
[DETECTION] Is the TR/Spy.Goldun.axt Trojan
C:\Program Files\hMailServer\Data\live.email.bak\tma34\34{34258933-2880-494A-
9599-7CBE1BCCE344}.eml
[0] Archive type: MIME
→ eTicket_K2.zip
[DETECTION] The file contains an executable program that is disguised by a
harmless file extension (HIDDENEXT/Worm.Gen)
→ eTicket_K2.doc.exe
[DETECTION] Contains recognition pattern of the WORM/Autorun.muu worm
C:\Program Files\hMailServer\Data\live.email.bak\tma34\49{49E4F6E1-5B04-4076-
8A14-6E2071DE16C7}.eml
[0] Archive type: MIME
→ user-EA49943X-activities.zip
[1] Archive type: ZIP
→ user-EA49943X-activities.exe
[DETECTION] Is the TR/Spy.Goldun.axt Trojan
C:\Program Files\hMailServer\Data\live.email.bak\tma34\4C{4CA1FC32-3477-44A3-
98D1-171272A08A2D}.eml
[0] Archive type: MIME
→ user-EA49943X-activities.zip
[1] Archive type: ZIP
→ user-EA49943X-activities.exe
[DETECTION] Is the TR/Spy.Goldun.axt Trojan
C:\Program Files\hMailServer\Data\live.email.bak\tma34\53{5354F5AA-2BBF-4292-
8049-2FF8840D56F0}.eml
[0] Archive type: MIME
→ IPLOGS.zip
[1] Archive type: ZIP
→ IPLOGS.exe
[DETECTION] Is the TR/FraudPack.81408 Trojan
C:\Program Files\hMailServer\Data\live.email.bak\tma34\5C{5CAC09D1-2030-4482-
9C19-8626B9E848E3}.eml
[0] Archive type: MIME
→ user-EA49943X-activities.zip
[1] Archive type: ZIP
→ user-EA49943X-activities.exe
[DETECTION] Is the TR/Spy.Goldun.axt Trojan
C:\Program Files\hMailServer\Data\live.email.bak\tma34\72{722FEADC-5478-41BE-
AF24-B0554916272D}.eml
[0] Archive type: MIME
→ user-EA49943X-activities.zip
[1] Archive type: ZIP
→ user-EA49943X-activities.exe
[DETECTION] Is the TR/Spy.Goldun.axt Trojan
C:\Program Files\hMailServer\Data\live.email.bak\tma34\82{82AECFCE-67CD-49C7-
BC72-9EBB0A4612B0}.eml
[0] Archive type: MIME
→ Contract_I2_9.2008.zip
[DETECTION] The file contains an executable program that is disguised by a
harmless file extension (HIDDENEXT/Worm.Gen)
→ Contract_I2_9.2008.doc.exe
[DETECTION] Contains recognition pattern of the WORM/Autorun.mwj worm
C:\Program Files\hMailServer\Data\live.email.bak\tma34\83{839585BE-4B7C-4BAD-
B5EA-5C6B820A5080}.eml
[0] Archive type: MIME
→ user-EA49943X-activities.zip
[1] Archive type: ZIP
→ user-EA49943X-activities.exe
[DETECTION] Is the TR/Spy.Goldun.axt Trojan
C:\Program Files\hMailServer\Data\live.email.bak\tma34\83{83B21A18-8425-496C-
9387-8D7D21BA8A97}.eml
[0] Archive type: MIME
→ user-EA49943X-activities.zip
[1] Archive type: ZIP
→ user-EA49943X-activities.exe
[DETECTION] Is the TR/Spy.Goldun.axt Trojan
C:\Program Files\hMailServer\Data\live.email.bak\tma34\86{860D1DF7-327C-4496-
A598-8996919CD559}.eml
[0] Archive type: MIME
→ user-EA49943X-activities.zip
[1] Archive type: ZIP
→ user-EA49943X-activities.exe
[DETECTION] Is the TR/Spy.Goldun.axt Trojan
C:\Program Files\hMailServer\Data\live.email.bak\tma34\91{9171C4A1-C24A-440E-
AE44-D9EE55E932FD}.eml
[0] Archive type: MIME
→ Fees_2008-2009.zip
[DETECTION] The file contains an executable program that is disguised by a
harmless file extension (HIDDENEXT/Worm.Gen)
→ Fees_2008-2009.doc.exe
[DETECTION] Contains recognition pattern of the WORM/Autorun.eqm worm
C:\Program Files\hMailServer\Data\live.email.bak\tma34\96{964A89B1-0214-4513-
974D-21CE6FCDBC55}.eml
[0] Archive type: MIME
→ IPLOGS.zip
[1] Archive type: ZIP
→ IPLOGS.exe
[DETECTION] Is the TR/FraudPack.81408 Trojan
C:\Program Files\hMailServer\Data\live.email.bak\tma34\99{99F7D64D-993F-4BF9-
9492-39E9B4FF8B69}.eml
[0] Archive type: MIME
→ IPLOGS.zip
[1] Archive type: ZIP
→ IPLOGS.exe
[DETECTION] Is the TR/FraudPack.81408 Trojan
C:\Program Files\hMailServer\Data\live.email.bak\tma34\9B{9B76836C-F150-410C-
9A29-923A8FA4B415}.eml
[0] Archive type: MIME
→ user-EA49943X-activities.zip
[1] Archive type: ZIP
→ user-EA49943X-activities.exe
[DETECTION] Is the TR/Spy.Goldun.axt Trojan
C:\Program Files\hMailServer\Data\live.email.bak\tma34\9F{9F5A010F-5167-46FE-
8EE6-D1DB52BAD2F9}.eml
[0] Archive type: MIME
[DETECTION] Contains recognition pattern of the HTML/Spoofing.Gen HTML
script virus
→ file0.html
[DETECTION] Contains recognition pattern of the HTML/Spoofing.Gen HTML
script virus
C:\Program Files\hMailServer\Data\live.email.bak\tma34\A5{A52E9326-5F0A-4886-
A13D-99A4CF3647FD}.eml
[0] Archive type: MIME
→ user-EA49943X-activities.zip
[1] Archive type: ZIP
→ user-EA49943X-activities.exe
[DETECTION] Is the TR/Spy.Goldun.axt Trojan
C:\Program Files\hMailServer\Data\live.email.bak\tma34\AC{AC36C6B0-3B52-4E97-
AC1C-55545192EA02}.eml
[0] Archive type: MIME
→ user-EA49943X-activities.zip
[1] Archive type: ZIP
→ user-EA49943X-activities.exe
[DETECTION] Is the TR/Spy.Goldun.axt Trojan
C:\Program Files\hMailServer\Data\live.email.bak\tma34\BB{BB05357D-8879-4BC5-
B760-E8C1BD099D53}.eml
[0] Archive type: MIME
→ IPLOGS.zip
[1] Archive type: ZIP
→ IPLOGS.exe
[DETECTION] Is the TR/FraudPack.81408 Trojan
C:\Program Files\hMailServer\Data\live.email.bak\tma34\BC{BCC0FD23-BD72-49D0-
91A4-B1A85B037D82}.eml
[0] Archive type: MIME
→ user-EA49943X-activities.zip
[1] Archive type: ZIP
→ user-EA49943X-activities.exe
[DETECTION] Is the TR/Spy.Goldun.axt Trojan
C:\Program Files\hMailServer\Data\live.email.bak\tma34\C1{C1B53144-8489-4B26-
89E5-6681053CD2D4}.eml
[0] Archive type: MIME
→ user-EA49943X-activities.zip
[1] Archive type: ZIP
→ user-EA49943X-activities.exe
[DETECTION] Is the TR/Spy.Goldun.axt Trojan
C:\Program Files\hMailServer\Data\live.email.bak\tma34\DD{DD60B7A8-2B07-4899-
A773-8CF8278E7EB7}.eml
[0] Archive type: MIME
→ user-EA49943X-activities.zip
[1] Archive type: ZIP
→ user-EA49943X-activities.exe
[DETECTION] Is the TR/Spy.Goldun.axt Trojan
C:\Program Files\hMailServer\Data\live.email.bak\tma34\E6{E6F840BD-769F-4C18-
858B-C5FB84F58D5F}.eml
[0] Archive type: MIME
→ user-EA49943X-activities.zip
[1] Archive type: ZIP
→ user-EA49943X-activities.exe
[DETECTION] Is the TR/Spy.Goldun.axt Trojan
C:\Program Files\hMailServer\Data\live.email.bak\tma34\F2{F22956FB-8C66-4393-
912E-B66A9A5E5327}.eml
[0] Archive type: MIME
→ user-EA49943X-activities.zip
[1] Archive type: ZIP
→ user-EA49943X-activities.exe
[DETECTION] Is the TR/Spy.Goldun.axt Trojan
C:\TEMP\autorun.exe
[DETECTION] Is the TR/Agent.AIXL.152 Trojan
Begin scan in ‘D:’
Begin scan in ‘F:’
Beginning disinfection:
C:\Program Files\hMailServer\Data\live.email.bak\tma34\01{0181A070-F101-48AB-
A744-75415827BBAF}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\0A{0ACCA1E5-1DD6-4DE0-
BCE6-E213A3C383C8}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\1B{1B0AAB3D-9142-40B0-
B195-816D395EBAA9}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\24{24F79B7D-96DC-4D0E-
836C-7DD5CCC2EB94}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\27{27374B15-E4E2-499F-
AE40-CE0563D3C7F7}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\34{34258933-2880-494A-
9599-7CBE1BCCE344}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\49{49E4F6E1-5B04-4076-
8A14-6E2071DE16C7}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\4C{4CA1FC32-3477-44A3-
98D1-171272A08A2D}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\53{5354F5AA-2BBF-4292-
8049-2FF8840D56F0}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\5C{5CAC09D1-2030-4482-
9C19-8626B9E848E3}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\72{722FEADC-5478-41BE-
AF24-B0554916272D}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\82{82AECFCE-67CD-49C7-
BC72-9EBB0A4612B0}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\83{839585BE-4B7C-4BAD-
B5EA-5C6B820A5080}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\83{83B21A18-8425-496C-
9387-8D7D21BA8A97}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\86{860D1DF7-327C-4496-
A598-8996919CD559}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\91{9171C4A1-C24A-440E-
AE44-D9EE55E932FD}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\96{964A89B1-0214-4513-
974D-21CE6FCDBC55}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\99{99F7D64D-993F-4BF9-
9492-39E9B4FF8B69}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\9B{9B76836C-F150-410C-
9A29-923A8FA4B415}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\9F{9F5A010F-5167-46FE-
8EE6-D1DB52BAD2F9}.eml
[DETECTION] Contains recognition pattern of the HTML/Spoofing.Gen HTML
script virus
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\A5{A52E9326-5F0A-4886-
A13D-99A4CF3647FD}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\AC{AC36C6B0-3B52-4E97-
AC1C-55545192EA02}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\BB{BB05357D-8879-4BC5-
B760-E8C1BD099D53}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\BC{BCC0FD23-BD72-49D0-
91A4-B1A85B037D82}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\C1{C1B53144-8489-4B26-
89E5-6681053CD2D4}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\DD{DD60B7A8-2B07-4899-
A773-8CF8278E7EB7}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\E6{E6F840BD-769F-4C18-
858B-C5FB84F58D5F}.eml
[WARNING] The file was ignored!
C:\Program Files\hMailServer\Data\live.email.bak\tma34\F2{F22956FB-8C66-4393-
912E-B66A9A5E5327}.eml
[WARNING] The file was ignored!
C:\TEMP\autorun.exe
[DETECTION] Is the TR/Agent.AIXL.152 Trojan
[WARNING] The file was ignored!
End of the scan: Wednesday, March 25, 2009 17:57
Used time: 1:03:45 Hour(s)
The scan has been done completely.
9031 Scanned directories
591387 Files were scanned
27 Viruses and/or unwanted programs were found
6 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
0 Files were moved to quarantine
0 Files were renamed
1 Files cannot be scanned
591353 Files not concerned
17630 Archives were scanned
30 Warnings
1 Notes
38569 Objects were scanned with rootkit scan
0 Hidden objects were found
The screenshot picture attachment showed 2 things. [1] A CAV scan that took place after the Avira scan (I did not remove the virus with Avira). [2] The manual setting that I used for CAV scan.