Quote:
Originally Posted by mrfly0101
Sending HTTP Requests
[Only registered and activated users can see links. Click Here To Register...]
Trojan detect by windows
C:\Documents and Settings\Administrator\Local Settings\Temp\EB93A6\996E.exe
Also ,His nick name is Uepak as well.
As he said in original post . There are some version with virus inside.
|
you're right if the file was that "Clone" (in fact you say the same as the .exe) but this is the original file is from any virus, what is detected and because it is false positive and as they say above is encrypted and this is why it is detected as a virus, and anyway as written in red, no obligation to use it
PS : see that the path you wrote can not be accessed even by programs run as admin, being a junction file does not exist, assuming it is \user\administrator or your name there is not even the "Local settings" folder