A voir également:
- Besoin pour supprimer Outerinfo
- Supprimer rond bleu whatsapp - Guide
- Supprimer page word - Guide
- Supprimer pub youtube - Accueil - Streaming
- Fichier impossible à supprimer - Guide
- Supprimer application windows 10 - Guide
1 réponse
Scanning Report
Friday, January 25, 2008 13:34:26 - 17:53:38
Computer name: LOURENCO
Scanning type: Scan system for viruses, rootkits, spyware
Target: C:\ E:\
--------------------------------------------------------------------------------
Result: 184 malware found
Adware.Agent (spyware)
System (Disinfected)
Adware.P2PNetworking (spyware)
System (Disinfected)
BAT/DelFil.AS (virus)
C:\WINDOWS\SYSTEM32\GGG.BAT (Renamed & Submitted)
C:\WINDOWS\SYSTEM32\N.BAT (Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\N.BAT (Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\N.BAT (Submitted)
Backdoor.Win32.VB.ary (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\FR13JP4W\KYBRDB_3[1].EXE (Renamed & Submitted)
E:\SNK\KYBRDB_3.EXE (Renamed & Submitted)
Backdoor.Win32.VB.axv (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\SETUP.EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\O9IN49QJ\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\SETUP.EXE (Renamed & Submitted)
ClickSpring (spyware)
System (Disinfected)
Exploit.HTML.CodeBaseExec (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\OVBNY45H\POPSEND[1].HTM (Renamed & Submitted)
Ircbot.YJI (virus)
E:\PROGRAM FILES\MD,AUTRES\INSTALLER PROGRAMMES\VTFTOOL_0.5B.EXE (Submitted)
TSUpdate.AI (virus)
C:\PROGRAM FILES\FICHIERS COMMUNS\FUKU\FUKUD\VOCABULARY (Submitted)
Tracking Cookie (spyware)
System (Disinfected)
System
System
System
System
System (Disinfected)
System
System (Disinfected)
Trojan-Clicker.HTML.Agent.a (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\VBPR7L4W\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\VBPR7L4W\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\T1WD59R3\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\SXEVWX2Z\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\QPHMZU9O\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\QPHMZU9O\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\QPHMZU9O\POPUP[3].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\QPHMZU9O\POPUP[4].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\OLIBG9IV\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\LVB7XDCE\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\LVB7XDCE\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\KRLBAA71\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\KRLBAA71\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\I7YZ2TA7\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\I7YZ2TA7\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\I7YZ2TA7\POPUP[3].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\CTU3CHY3\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\CTU3CHY3\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\CN3RU45X\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\0XW5U3KT\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\ZS7NBB50\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\ZS7NBB50\POPUP[5].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\ZS7NBB50\POPUP[6].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\ZS7NBB50\POPUP[7].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\POPUP[3].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\POPUP[4].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\POPUP[5].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[3].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[4].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[5].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[6].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[7].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[8].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\DA24ZWBM\POPUP[3].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\DA24ZWBM\POPUP[4].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\DA24ZWBM\POPUP[5].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\DA24ZWBM\POPUP[6].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\DA24ZWBM\POPUP[7].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\CBD3AA3L\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\CBD3AA3L\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9RN3D9CA\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9RN3D9CA\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9RN3D9CA\POPUP[3].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9RN3D9CA\POPUP[4].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9RN3D9CA\POPUP[5].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\433JA0LC\POPUP[1].HTM (Renamed & Submitted)
Trojan-Clicker.Win32.VB.fc (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\VBPR7L4W\KYBRDB_2[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\CN3RU45X\NWNMB_2[1].EXE (Renamed & Submitted)
E:\SNK\NWNM_1.EXE (Renamed & Submitted)
Trojan-Clicker.Win32.VB.fe (virus)
E:\SNK\NWNMD_5.EXE (Renamed & Submitted)
Trojan-Clicker.Win32.VB.ly (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\O1ERS5EJ\DEFENDER24[1].EXE (Renamed & Submitted)
Trojan-Clicker.Win32.VB.nh (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\CBD3AA3L\DFNDRC_4A[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\69LE7EL4\DFNDRC_4[1].EXE (Renamed & Submitted)
E:\SNK\DFNDRAC_6.EXE (Renamed & Submitted)
E:\SNK\DFNDRAD_5.EXE (Renamed & Submitted)
E:\SNK\DFNDRC_4.EXE (Renamed & Submitted)
E:\SNK\DFNDRC_4A.EXE (Renamed & Submitted)
E:\SNK\DFNDRDD_6.EXE (Renamed & Submitted)
E:\SNK\KYBRDAD_5.EXE (Renamed & Submitted)
E:\SNK\KYBRDD_5.EXE (Renamed & Submitted)
E:\SNK\KYBRDE_5.EXE (Renamed & Submitted)
E:\SNK\KYBRD_1.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.bo (virus)
C:\WINDOWS\SYSTEM32\DR.EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\DRSMARTLOAD45A[2].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.ca (virus)
E:\SNK\NWNMAD_5.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.ce (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\433JA0LC\DFNDR[1].EXE (Renamed & Submitted)
E:\SNK\DFNDR.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.ck (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\FR13JP4W\DRSMARTLOAD45A[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9SWV5XKP\DRSMARTLOAD46A[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.cn (virus)
E:\SNK\NWNMC_2.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.ct (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9SWV5XKP\DRSMARTLOAD[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.cu (virus)
E:\SNK\DFNDRD_4.EXE (Renamed & Submitted)
E:\SNK\DFNDRD_5.EXE (Renamed & Submitted)
E:\SNK\KYBRDD_4.EXE (Renamed & Submitted)
E:\SNK\NWNMD_4.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.db (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\KLM3SPYF\DRSMARTLOAD849A[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\G123OPQZ\DRSMARTLOAD46A[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\CT27KTQZ\DRSMARTLOAD45A[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.de (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\KLM3SPYF\LOADER[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\CH6J8DAB\DRSMARTLOAD[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.ef (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\OLIBG9IV\LOADER[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.jm (virus)
C:\WINDOWS\SYSTEM32\INSTALL.EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\INSTALL.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Agent.hql (virus)
C:\WINDOWS\MROFINU1000137.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.PurityScan.da (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\MES DOCUMENTS\?ICROSOFT.NET\WUACLT.EXE
Trojan-Downloader.Win32.PurityScan.ek (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\APPLICATION DATA\W?NSXS\WUAUCLT.EXE
Trojan-Downloader.Win32.PurityScan.fk (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\!UPDATE.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Small.hsg (virus)
C:\DOCUMENTS AND SETTINGS\HUGO.)\WINL.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.abh (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\VBPR7L4W\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\ZS7NBB50\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\OJ3RDPTD\I[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.ada (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\G123OPQZ\NWNMDD_6[1].EXE (Renamed & Submitted)
E:\SNK\KYBRDAC_6.EXE (Renamed & Submitted)
E:\SNK\NWNMAC_6.EXE (Renamed & Submitted)
E:\SNK\NWNMDD_6.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.aeo (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\433JA0LC\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\17R3P9CE\I[2].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.afb (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\I7YZ2TA7\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\ELZW9KZ2\I[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.afv (virus)
E:\SNK\DFNDRA_1.EXE (Renamed & Submitted)
E:\SNK\DFNDRC_2.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.agi (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\69LE7EL4\KYBRDC_4[1].EXE (Renamed & Submitted)
E:\SNK\KYBRDACA_6.EXE (Renamed & Submitted)
E:\SNK\KYBRDC_2.EXE (Renamed & Submitted)
E:\SNK\KYBRDC_4.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.agp (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\NWNMC_4[1].EXE (Renamed & Submitted)
E:\SNK\NWNMC_4.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.ahj (virus)
E:\SNK\NWNME_5.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.ahn (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\T1WD59R3\I[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.aid (virus)
E:\SNK\KYBRDDD_6.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.aik (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\G123OPQZ\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\DA24ZWBM\I[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.aiy (virus)
E:\SNK\NWNMFF_11.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.ajz (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\I7YZ2TA7\DRSMARTLOAD45A[2].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\I7YZ2TA7\DRSMARTLOAD46A[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\0XW5U3KT\DRSMARTLOAD849A[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.all (virus)
C:\WINDOWS\SETUP.EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\433JA0LC\I[2].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.bgq (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\DR.EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\DR.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.bij (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\LPC2K3H3\I[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.cgu (virus)
C:\WINDOWS\SYSTEM32\NGPXX07\NGPXX071084.EXE (Renamed & Submitted)
Trojan-Dropper.Win32.Agent.dgo (virus)
C:\WINDOWS\SYSTEM32\VTSTS.EXE (Renamed & Submitted)
C:\WINDOWS\SYSTEM32\SPOOL\DRIVERS\W32X86\3\HPZTSB04.EXE (Renamed & Submitted)
C:\PROGRAM FILES\ZYXEL\ADSL USB MODEM\CNXDSLTB.EXE (Renamed & Submitted)
C:\PROGRAM FILES\VEOH NETWORKS\VEOH\VEOHCLIENT.EXE (Renamed & Submitted)
C:\PROGRAM FILES\SPYBOT - SEARCH & DESTROY\TEATIMER.EXE (Renamed & Submitted)
C:\PROGRAM FILES\SONY ERICSSON\MOBILE2\APPLICATION LAUNCHER\APPLICATION LAUNCHER.EXE (Renamed)
C:\PROGRAM FILES\QUICKTIME\QTTASK.EXE (Renamed & Submitted)
C:\PROGRAM FILES\MICROSOFT INTELLITYPE PRO\TYPE32.EXE (Renamed & Submitted)
C:\PROGRAM FILES\MICROSOFT INTELLIPOINT\POINT32.EXE (Renamed & Submitted)
C:\PROGRAM FILES\JAVA\JRE1.5.0_03\BIN\JUSCHED.EXE (Renamed & Submitted)
C:\PROGRAM FILES\ITUNES\ITUNESHELPER.EXE (Renamed & Submitted)
C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBARNOTIFIER\GOOGLETOOLBARNOTIFIER.EXE (Renamed & Submitted)
C:\PROGRAM FILES\BLUEWIN\QUICK HELP\SMARTBRIDGE\MOTIVESB.EXE (Renamed & Submitted)
C:\PROGRAM FILES\ATI TECHNOLOGIES\ATI.ACE\CORE-STATIC\CLISTART.EXE (Renamed & Submitted)
C:\PROGRAM FILES\ATI TECHNOLOGIES\ATI CONTROL PANEL\ATIPTAXX.EXE (Renamed & Submitted)
C:\PROGRAM FILES\ADOBE\READER 8.0\READER\READER_SL.EXE (Renamed & Submitted)
Trojan-Dropper.Win32.VB.mn (virus)
C:\WINDOWS\IEXPLORE.EXE (Renamed & Submitted)
Virus.Win32.Fontra.c (virus)
C:\WINDOWS\SYSTEM32\P2PNETWORKING.EXE
C:\PROGRAM FILES\SETUP.EXE (Submitted)
C:\PROGRAM FILES\TRACK_03.EXE
C:\PROGRAM FILES\VIDEO.EXE (Submitted)
C:\DOCUMENTS AND SETTINGS\ALL USERS\MENU D�MARRER\PROGRAMMES\D�MARRAGE\DLLHOST.EXE (Submitted)
Vundo.BD (virus)
C:\WINDOWS\SYSTEM32\VTSTS.DLL (Submitted)
C:\DOCUMENTS AND SETTINGS\HUGO.)\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\3BKX28PA\CSS4[1] (Submitted)
W32/DLoader.AEMV (virus)
C:\RECYCLER\S-1-5-18\DC2\SERVICES.DLL (Submitted)
C:\RECYCLER\S-1-5-18\DC1\SERVICES.DLL (Submitted)
W32/DLoader.ASWU (virus)
C:\WINDOWS\DOWNLOADED PROGRAM FILES\UERSV_0001_LPNETINSTALLER.EXE (Submitted)
C:\WINDOWS\DOWNLOADED PROGRAM FILES\CONFLICT.2\UERSV_0001_LPNETINSTALLER.EXE (Submitted)
C:\WINDOWS\DOWNLOADED PROGRAM FILES\CONFLICT.1\UERSV_0001_LPNETINSTALLER.EXE (Submitted)
W32/DLoader.FFWX (virus)
C:\WINDOWS\SYSTEM32\SETUP9X.EXE (Submitted)
W32/Smalltroj.IMC (virus)
E:\PROGRAM FILES\MD,AUTRES\INSTALLER PROGRAMMES\FRETSONFIRE\FRETSONFIRE.EXE (Submitted)
WebHancer (spyware)
System (Disinfected)
Win32.Trojan.Agent (spyware)
System (Disinfected)
Win32.Trojandownloader.Zlob (spyware)
System (Disinfected)
Win32.Virus.Fontra (spyware)
System (Disinfected)
Friday, January 25, 2008 13:34:26 - 17:53:38
Computer name: LOURENCO
Scanning type: Scan system for viruses, rootkits, spyware
Target: C:\ E:\
--------------------------------------------------------------------------------
Result: 184 malware found
Adware.Agent (spyware)
System (Disinfected)
Adware.P2PNetworking (spyware)
System (Disinfected)
BAT/DelFil.AS (virus)
C:\WINDOWS\SYSTEM32\GGG.BAT (Renamed & Submitted)
C:\WINDOWS\SYSTEM32\N.BAT (Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\N.BAT (Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\N.BAT (Submitted)
Backdoor.Win32.VB.ary (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\FR13JP4W\KYBRDB_3[1].EXE (Renamed & Submitted)
E:\SNK\KYBRDB_3.EXE (Renamed & Submitted)
Backdoor.Win32.VB.axv (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\SETUP.EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\O9IN49QJ\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\SETUP.EXE (Renamed & Submitted)
ClickSpring (spyware)
System (Disinfected)
Exploit.HTML.CodeBaseExec (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\OVBNY45H\POPSEND[1].HTM (Renamed & Submitted)
Ircbot.YJI (virus)
E:\PROGRAM FILES\MD,AUTRES\INSTALLER PROGRAMMES\VTFTOOL_0.5B.EXE (Submitted)
TSUpdate.AI (virus)
C:\PROGRAM FILES\FICHIERS COMMUNS\FUKU\FUKUD\VOCABULARY (Submitted)
Tracking Cookie (spyware)
System (Disinfected)
System
System
System
System
System (Disinfected)
System
System (Disinfected)
Trojan-Clicker.HTML.Agent.a (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\VBPR7L4W\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\VBPR7L4W\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\T1WD59R3\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\SXEVWX2Z\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\QPHMZU9O\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\QPHMZU9O\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\QPHMZU9O\POPUP[3].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\QPHMZU9O\POPUP[4].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\OLIBG9IV\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\LVB7XDCE\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\LVB7XDCE\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\KRLBAA71\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\KRLBAA71\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\I7YZ2TA7\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\I7YZ2TA7\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\I7YZ2TA7\POPUP[3].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\CTU3CHY3\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\CTU3CHY3\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\CN3RU45X\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\0XW5U3KT\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\ZS7NBB50\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\ZS7NBB50\POPUP[5].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\ZS7NBB50\POPUP[6].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\ZS7NBB50\POPUP[7].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\POPUP[3].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\POPUP[4].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\POPUP[5].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[3].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[4].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[5].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[6].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[7].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[8].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\DA24ZWBM\POPUP[3].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\DA24ZWBM\POPUP[4].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\DA24ZWBM\POPUP[5].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\DA24ZWBM\POPUP[6].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\DA24ZWBM\POPUP[7].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\CBD3AA3L\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\CBD3AA3L\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9RN3D9CA\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9RN3D9CA\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9RN3D9CA\POPUP[3].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9RN3D9CA\POPUP[4].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9RN3D9CA\POPUP[5].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\433JA0LC\POPUP[1].HTM (Renamed & Submitted)
Trojan-Clicker.Win32.VB.fc (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\VBPR7L4W\KYBRDB_2[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\CN3RU45X\NWNMB_2[1].EXE (Renamed & Submitted)
E:\SNK\NWNM_1.EXE (Renamed & Submitted)
Trojan-Clicker.Win32.VB.fe (virus)
E:\SNK\NWNMD_5.EXE (Renamed & Submitted)
Trojan-Clicker.Win32.VB.ly (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\O1ERS5EJ\DEFENDER24[1].EXE (Renamed & Submitted)
Trojan-Clicker.Win32.VB.nh (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\CBD3AA3L\DFNDRC_4A[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\69LE7EL4\DFNDRC_4[1].EXE (Renamed & Submitted)
E:\SNK\DFNDRAC_6.EXE (Renamed & Submitted)
E:\SNK\DFNDRAD_5.EXE (Renamed & Submitted)
E:\SNK\DFNDRC_4.EXE (Renamed & Submitted)
E:\SNK\DFNDRC_4A.EXE (Renamed & Submitted)
E:\SNK\DFNDRDD_6.EXE (Renamed & Submitted)
E:\SNK\KYBRDAD_5.EXE (Renamed & Submitted)
E:\SNK\KYBRDD_5.EXE (Renamed & Submitted)
E:\SNK\KYBRDE_5.EXE (Renamed & Submitted)
E:\SNK\KYBRD_1.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.bo (virus)
C:\WINDOWS\SYSTEM32\DR.EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\DRSMARTLOAD45A[2].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.ca (virus)
E:\SNK\NWNMAD_5.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.ce (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\433JA0LC\DFNDR[1].EXE (Renamed & Submitted)
E:\SNK\DFNDR.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.ck (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\FR13JP4W\DRSMARTLOAD45A[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9SWV5XKP\DRSMARTLOAD46A[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.cn (virus)
E:\SNK\NWNMC_2.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.ct (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9SWV5XKP\DRSMARTLOAD[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.cu (virus)
E:\SNK\DFNDRD_4.EXE (Renamed & Submitted)
E:\SNK\DFNDRD_5.EXE (Renamed & Submitted)
E:\SNK\KYBRDD_4.EXE (Renamed & Submitted)
E:\SNK\NWNMD_4.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.db (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\KLM3SPYF\DRSMARTLOAD849A[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\G123OPQZ\DRSMARTLOAD46A[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\CT27KTQZ\DRSMARTLOAD45A[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.de (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\KLM3SPYF\LOADER[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\CH6J8DAB\DRSMARTLOAD[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.ef (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\OLIBG9IV\LOADER[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.jm (virus)
C:\WINDOWS\SYSTEM32\INSTALL.EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\INSTALL.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Agent.hql (virus)
C:\WINDOWS\MROFINU1000137.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.PurityScan.da (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\MES DOCUMENTS\?ICROSOFT.NET\WUACLT.EXE
Trojan-Downloader.Win32.PurityScan.ek (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\APPLICATION DATA\W?NSXS\WUAUCLT.EXE
Trojan-Downloader.Win32.PurityScan.fk (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\!UPDATE.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Small.hsg (virus)
C:\DOCUMENTS AND SETTINGS\HUGO.)\WINL.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.abh (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\VBPR7L4W\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\ZS7NBB50\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\OJ3RDPTD\I[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.ada (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\G123OPQZ\NWNMDD_6[1].EXE (Renamed & Submitted)
E:\SNK\KYBRDAC_6.EXE (Renamed & Submitted)
E:\SNK\NWNMAC_6.EXE (Renamed & Submitted)
E:\SNK\NWNMDD_6.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.aeo (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\433JA0LC\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\17R3P9CE\I[2].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.afb (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\I7YZ2TA7\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\ELZW9KZ2\I[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.afv (virus)
E:\SNK\DFNDRA_1.EXE (Renamed & Submitted)
E:\SNK\DFNDRC_2.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.agi (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\69LE7EL4\KYBRDC_4[1].EXE (Renamed & Submitted)
E:\SNK\KYBRDACA_6.EXE (Renamed & Submitted)
E:\SNK\KYBRDC_2.EXE (Renamed & Submitted)
E:\SNK\KYBRDC_4.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.agp (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\NWNMC_4[1].EXE (Renamed & Submitted)
E:\SNK\NWNMC_4.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.ahj (virus)
E:\SNK\NWNME_5.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.ahn (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\T1WD59R3\I[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.aid (virus)
E:\SNK\KYBRDDD_6.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.aik (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\G123OPQZ\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\DA24ZWBM\I[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.aiy (virus)
E:\SNK\NWNMFF_11.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.ajz (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\I7YZ2TA7\DRSMARTLOAD45A[2].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\I7YZ2TA7\DRSMARTLOAD46A[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\0XW5U3KT\DRSMARTLOAD849A[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.all (virus)
C:\WINDOWS\SETUP.EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\433JA0LC\I[2].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.bgq (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\DR.EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\DR.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.bij (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\LPC2K3H3\I[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.cgu (virus)
C:\WINDOWS\SYSTEM32\NGPXX07\NGPXX071084.EXE (Renamed & Submitted)
Trojan-Dropper.Win32.Agent.dgo (virus)
C:\WINDOWS\SYSTEM32\VTSTS.EXE (Renamed & Submitted)
C:\WINDOWS\SYSTEM32\SPOOL\DRIVERS\W32X86\3\HPZTSB04.EXE (Renamed & Submitted)
C:\PROGRAM FILES\ZYXEL\ADSL USB MODEM\CNXDSLTB.EXE (Renamed & Submitted)
C:\PROGRAM FILES\VEOH NETWORKS\VEOH\VEOHCLIENT.EXE (Renamed & Submitted)
C:\PROGRAM FILES\SPYBOT - SEARCH & DESTROY\TEATIMER.EXE (Renamed & Submitted)
C:\PROGRAM FILES\SONY ERICSSON\MOBILE2\APPLICATION LAUNCHER\APPLICATION LAUNCHER.EXE (Renamed)
C:\PROGRAM FILES\QUICKTIME\QTTASK.EXE (Renamed & Submitted)
C:\PROGRAM FILES\MICROSOFT INTELLITYPE PRO\TYPE32.EXE (Renamed & Submitted)
C:\PROGRAM FILES\MICROSOFT INTELLIPOINT\POINT32.EXE (Renamed & Submitted)
C:\PROGRAM FILES\JAVA\JRE1.5.0_03\BIN\JUSCHED.EXE (Renamed & Submitted)
C:\PROGRAM FILES\ITUNES\ITUNESHELPER.EXE (Renamed & Submitted)
C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBARNOTIFIER\GOOGLETOOLBARNOTIFIER.EXE (Renamed & Submitted)
C:\PROGRAM FILES\BLUEWIN\QUICK HELP\SMARTBRIDGE\MOTIVESB.EXE (Renamed & Submitted)
C:\PROGRAM FILES\ATI TECHNOLOGIES\ATI.ACE\CORE-STATIC\CLISTART.EXE (Renamed & Submitted)
C:\PROGRAM FILES\ATI TECHNOLOGIES\ATI CONTROL PANEL\ATIPTAXX.EXE (Renamed & Submitted)
C:\PROGRAM FILES\ADOBE\READER 8.0\READER\READER_SL.EXE (Renamed & Submitted)
Trojan-Dropper.Win32.VB.mn (virus)
C:\WINDOWS\IEXPLORE.EXE (Renamed & Submitted)
Virus.Win32.Fontra.c (virus)
C:\WINDOWS\SYSTEM32\P2PNETWORKING.EXE
C:\PROGRAM FILES\SETUP.EXE (Submitted)
C:\PROGRAM FILES\TRACK_03.EXE
C:\PROGRAM FILES\VIDEO.EXE (Submitted)
C:\DOCUMENTS AND SETTINGS\ALL USERS\MENU D�MARRER\PROGRAMMES\D�MARRAGE\DLLHOST.EXE (Submitted)
Vundo.BD (virus)
C:\WINDOWS\SYSTEM32\VTSTS.DLL (Submitted)
C:\DOCUMENTS AND SETTINGS\HUGO.)\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\3BKX28PA\CSS4[1] (Submitted)
W32/DLoader.AEMV (virus)
C:\RECYCLER\S-1-5-18\DC2\SERVICES.DLL (Submitted)
C:\RECYCLER\S-1-5-18\DC1\SERVICES.DLL (Submitted)
W32/DLoader.ASWU (virus)
C:\WINDOWS\DOWNLOADED PROGRAM FILES\UERSV_0001_LPNETINSTALLER.EXE (Submitted)
C:\WINDOWS\DOWNLOADED PROGRAM FILES\CONFLICT.2\UERSV_0001_LPNETINSTALLER.EXE (Submitted)
C:\WINDOWS\DOWNLOADED PROGRAM FILES\CONFLICT.1\UERSV_0001_LPNETINSTALLER.EXE (Submitted)
W32/DLoader.FFWX (virus)
C:\WINDOWS\SYSTEM32\SETUP9X.EXE (Submitted)
W32/Smalltroj.IMC (virus)
E:\PROGRAM FILES\MD,AUTRES\INSTALLER PROGRAMMES\FRETSONFIRE\FRETSONFIRE.EXE (Submitted)
WebHancer (spyware)
System (Disinfected)
Win32.Trojan.Agent (spyware)
System (Disinfected)
Win32.Trojandownloader.Zlob (spyware)
System (Disinfected)
Win32.Virus.Fontra (spyware)
System (Disinfected)