Besoin pour supprimer Outerinfo
hl666
-
hl666 -
hl666 -
Bonjour,
Mon pc est infecté par certains virus qui ne partent pas après le nettoyage du systéme (Outerinfo, Win32, Vundo.Bd...)
J'ai bessoin d'aide pour les supprimer. J'ai le rapport de F-Secure si ça peut vous aider.
Mon pc est infecté par certains virus qui ne partent pas après le nettoyage du systéme (Outerinfo, Win32, Vundo.Bd...)
J'ai bessoin d'aide pour les supprimer. J'ai le rapport de F-Secure si ça peut vous aider.
Configuration: Windows XP Internet Explorer 7.0
A voir également:
- Besoin pour supprimer Outerinfo
- Supprimer rond bleu whatsapp - Guide
- Supprimer page word - Guide
- Supprimer liste déroulante excel - Guide
- Comment supprimer une application préinstallée sur android - Guide
- Supprimer hiberfil.sys - Guide
1 réponse
Scanning Report
Friday, January 25, 2008 13:34:26 - 17:53:38
Computer name: LOURENCO
Scanning type: Scan system for viruses, rootkits, spyware
Target: C:\ E:\
--------------------------------------------------------------------------------
Result: 184 malware found
Adware.Agent (spyware)
System (Disinfected)
Adware.P2PNetworking (spyware)
System (Disinfected)
BAT/DelFil.AS (virus)
C:\WINDOWS\SYSTEM32\GGG.BAT (Renamed & Submitted)
C:\WINDOWS\SYSTEM32\N.BAT (Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\N.BAT (Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\N.BAT (Submitted)
Backdoor.Win32.VB.ary (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\FR13JP4W\KYBRDB_3[1].EXE (Renamed & Submitted)
E:\SNK\KYBRDB_3.EXE (Renamed & Submitted)
Backdoor.Win32.VB.axv (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\SETUP.EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\O9IN49QJ\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\SETUP.EXE (Renamed & Submitted)
ClickSpring (spyware)
System (Disinfected)
Exploit.HTML.CodeBaseExec (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\OVBNY45H\POPSEND[1].HTM (Renamed & Submitted)
Ircbot.YJI (virus)
E:\PROGRAM FILES\MD,AUTRES\INSTALLER PROGRAMMES\VTFTOOL_0.5B.EXE (Submitted)
TSUpdate.AI (virus)
C:\PROGRAM FILES\FICHIERS COMMUNS\FUKU\FUKUD\VOCABULARY (Submitted)
Tracking Cookie (spyware)
System (Disinfected)
System
System
System
System
System (Disinfected)
System
System (Disinfected)
Trojan-Clicker.HTML.Agent.a (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\VBPR7L4W\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\VBPR7L4W\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\T1WD59R3\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\SXEVWX2Z\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\QPHMZU9O\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\QPHMZU9O\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\QPHMZU9O\POPUP[3].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\QPHMZU9O\POPUP[4].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\OLIBG9IV\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\LVB7XDCE\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\LVB7XDCE\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\KRLBAA71\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\KRLBAA71\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\I7YZ2TA7\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\I7YZ2TA7\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\I7YZ2TA7\POPUP[3].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\CTU3CHY3\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\CTU3CHY3\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\CN3RU45X\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\0XW5U3KT\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\ZS7NBB50\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\ZS7NBB50\POPUP[5].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\ZS7NBB50\POPUP[6].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\ZS7NBB50\POPUP[7].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\POPUP[3].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\POPUP[4].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\POPUP[5].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[3].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[4].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[5].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[6].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[7].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[8].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\DA24ZWBM\POPUP[3].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\DA24ZWBM\POPUP[4].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\DA24ZWBM\POPUP[5].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\DA24ZWBM\POPUP[6].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\DA24ZWBM\POPUP[7].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\CBD3AA3L\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\CBD3AA3L\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9RN3D9CA\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9RN3D9CA\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9RN3D9CA\POPUP[3].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9RN3D9CA\POPUP[4].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9RN3D9CA\POPUP[5].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\433JA0LC\POPUP[1].HTM (Renamed & Submitted)
Trojan-Clicker.Win32.VB.fc (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\VBPR7L4W\KYBRDB_2[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\CN3RU45X\NWNMB_2[1].EXE (Renamed & Submitted)
E:\SNK\NWNM_1.EXE (Renamed & Submitted)
Trojan-Clicker.Win32.VB.fe (virus)
E:\SNK\NWNMD_5.EXE (Renamed & Submitted)
Trojan-Clicker.Win32.VB.ly (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\O1ERS5EJ\DEFENDER24[1].EXE (Renamed & Submitted)
Trojan-Clicker.Win32.VB.nh (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\CBD3AA3L\DFNDRC_4A[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\69LE7EL4\DFNDRC_4[1].EXE (Renamed & Submitted)
E:\SNK\DFNDRAC_6.EXE (Renamed & Submitted)
E:\SNK\DFNDRAD_5.EXE (Renamed & Submitted)
E:\SNK\DFNDRC_4.EXE (Renamed & Submitted)
E:\SNK\DFNDRC_4A.EXE (Renamed & Submitted)
E:\SNK\DFNDRDD_6.EXE (Renamed & Submitted)
E:\SNK\KYBRDAD_5.EXE (Renamed & Submitted)
E:\SNK\KYBRDD_5.EXE (Renamed & Submitted)
E:\SNK\KYBRDE_5.EXE (Renamed & Submitted)
E:\SNK\KYBRD_1.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.bo (virus)
C:\WINDOWS\SYSTEM32\DR.EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\DRSMARTLOAD45A[2].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.ca (virus)
E:\SNK\NWNMAD_5.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.ce (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\433JA0LC\DFNDR[1].EXE (Renamed & Submitted)
E:\SNK\DFNDR.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.ck (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\FR13JP4W\DRSMARTLOAD45A[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9SWV5XKP\DRSMARTLOAD46A[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.cn (virus)
E:\SNK\NWNMC_2.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.ct (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9SWV5XKP\DRSMARTLOAD[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.cu (virus)
E:\SNK\DFNDRD_4.EXE (Renamed & Submitted)
E:\SNK\DFNDRD_5.EXE (Renamed & Submitted)
E:\SNK\KYBRDD_4.EXE (Renamed & Submitted)
E:\SNK\NWNMD_4.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.db (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\KLM3SPYF\DRSMARTLOAD849A[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\G123OPQZ\DRSMARTLOAD46A[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\CT27KTQZ\DRSMARTLOAD45A[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.de (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\KLM3SPYF\LOADER[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\CH6J8DAB\DRSMARTLOAD[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.ef (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\OLIBG9IV\LOADER[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.jm (virus)
C:\WINDOWS\SYSTEM32\INSTALL.EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\INSTALL.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Agent.hql (virus)
C:\WINDOWS\MROFINU1000137.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.PurityScan.da (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\MES DOCUMENTS\?ICROSOFT.NET\WUACLT.EXE
Trojan-Downloader.Win32.PurityScan.ek (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\APPLICATION DATA\W?NSXS\WUAUCLT.EXE
Trojan-Downloader.Win32.PurityScan.fk (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\!UPDATE.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Small.hsg (virus)
C:\DOCUMENTS AND SETTINGS\HUGO.)\WINL.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.abh (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\VBPR7L4W\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\ZS7NBB50\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\OJ3RDPTD\I[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.ada (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\G123OPQZ\NWNMDD_6[1].EXE (Renamed & Submitted)
E:\SNK\KYBRDAC_6.EXE (Renamed & Submitted)
E:\SNK\NWNMAC_6.EXE (Renamed & Submitted)
E:\SNK\NWNMDD_6.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.aeo (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\433JA0LC\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\17R3P9CE\I[2].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.afb (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\I7YZ2TA7\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\ELZW9KZ2\I[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.afv (virus)
E:\SNK\DFNDRA_1.EXE (Renamed & Submitted)
E:\SNK\DFNDRC_2.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.agi (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\69LE7EL4\KYBRDC_4[1].EXE (Renamed & Submitted)
E:\SNK\KYBRDACA_6.EXE (Renamed & Submitted)
E:\SNK\KYBRDC_2.EXE (Renamed & Submitted)
E:\SNK\KYBRDC_4.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.agp (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\NWNMC_4[1].EXE (Renamed & Submitted)
E:\SNK\NWNMC_4.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.ahj (virus)
E:\SNK\NWNME_5.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.ahn (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\T1WD59R3\I[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.aid (virus)
E:\SNK\KYBRDDD_6.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.aik (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\G123OPQZ\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\DA24ZWBM\I[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.aiy (virus)
E:\SNK\NWNMFF_11.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.ajz (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\I7YZ2TA7\DRSMARTLOAD45A[2].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\I7YZ2TA7\DRSMARTLOAD46A[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\0XW5U3KT\DRSMARTLOAD849A[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.all (virus)
C:\WINDOWS\SETUP.EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\433JA0LC\I[2].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.bgq (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\DR.EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\DR.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.bij (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\LPC2K3H3\I[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.cgu (virus)
C:\WINDOWS\SYSTEM32\NGPXX07\NGPXX071084.EXE (Renamed & Submitted)
Trojan-Dropper.Win32.Agent.dgo (virus)
C:\WINDOWS\SYSTEM32\VTSTS.EXE (Renamed & Submitted)
C:\WINDOWS\SYSTEM32\SPOOL\DRIVERS\W32X86\3\HPZTSB04.EXE (Renamed & Submitted)
C:\PROGRAM FILES\ZYXEL\ADSL USB MODEM\CNXDSLTB.EXE (Renamed & Submitted)
C:\PROGRAM FILES\VEOH NETWORKS\VEOH\VEOHCLIENT.EXE (Renamed & Submitted)
C:\PROGRAM FILES\SPYBOT - SEARCH & DESTROY\TEATIMER.EXE (Renamed & Submitted)
C:\PROGRAM FILES\SONY ERICSSON\MOBILE2\APPLICATION LAUNCHER\APPLICATION LAUNCHER.EXE (Renamed)
C:\PROGRAM FILES\QUICKTIME\QTTASK.EXE (Renamed & Submitted)
C:\PROGRAM FILES\MICROSOFT INTELLITYPE PRO\TYPE32.EXE (Renamed & Submitted)
C:\PROGRAM FILES\MICROSOFT INTELLIPOINT\POINT32.EXE (Renamed & Submitted)
C:\PROGRAM FILES\JAVA\JRE1.5.0_03\BIN\JUSCHED.EXE (Renamed & Submitted)
C:\PROGRAM FILES\ITUNES\ITUNESHELPER.EXE (Renamed & Submitted)
C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBARNOTIFIER\GOOGLETOOLBARNOTIFIER.EXE (Renamed & Submitted)
C:\PROGRAM FILES\BLUEWIN\QUICK HELP\SMARTBRIDGE\MOTIVESB.EXE (Renamed & Submitted)
C:\PROGRAM FILES\ATI TECHNOLOGIES\ATI.ACE\CORE-STATIC\CLISTART.EXE (Renamed & Submitted)
C:\PROGRAM FILES\ATI TECHNOLOGIES\ATI CONTROL PANEL\ATIPTAXX.EXE (Renamed & Submitted)
C:\PROGRAM FILES\ADOBE\READER 8.0\READER\READER_SL.EXE (Renamed & Submitted)
Trojan-Dropper.Win32.VB.mn (virus)
C:\WINDOWS\IEXPLORE.EXE (Renamed & Submitted)
Virus.Win32.Fontra.c (virus)
C:\WINDOWS\SYSTEM32\P2PNETWORKING.EXE
C:\PROGRAM FILES\SETUP.EXE (Submitted)
C:\PROGRAM FILES\TRACK_03.EXE
C:\PROGRAM FILES\VIDEO.EXE (Submitted)
C:\DOCUMENTS AND SETTINGS\ALL USERS\MENU D�MARRER\PROGRAMMES\D�MARRAGE\DLLHOST.EXE (Submitted)
Vundo.BD (virus)
C:\WINDOWS\SYSTEM32\VTSTS.DLL (Submitted)
C:\DOCUMENTS AND SETTINGS\HUGO.)\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\3BKX28PA\CSS4[1] (Submitted)
W32/DLoader.AEMV (virus)
C:\RECYCLER\S-1-5-18\DC2\SERVICES.DLL (Submitted)
C:\RECYCLER\S-1-5-18\DC1\SERVICES.DLL (Submitted)
W32/DLoader.ASWU (virus)
C:\WINDOWS\DOWNLOADED PROGRAM FILES\UERSV_0001_LPNETINSTALLER.EXE (Submitted)
C:\WINDOWS\DOWNLOADED PROGRAM FILES\CONFLICT.2\UERSV_0001_LPNETINSTALLER.EXE (Submitted)
C:\WINDOWS\DOWNLOADED PROGRAM FILES\CONFLICT.1\UERSV_0001_LPNETINSTALLER.EXE (Submitted)
W32/DLoader.FFWX (virus)
C:\WINDOWS\SYSTEM32\SETUP9X.EXE (Submitted)
W32/Smalltroj.IMC (virus)
E:\PROGRAM FILES\MD,AUTRES\INSTALLER PROGRAMMES\FRETSONFIRE\FRETSONFIRE.EXE (Submitted)
WebHancer (spyware)
System (Disinfected)
Win32.Trojan.Agent (spyware)
System (Disinfected)
Win32.Trojandownloader.Zlob (spyware)
System (Disinfected)
Win32.Virus.Fontra (spyware)
System (Disinfected)
Friday, January 25, 2008 13:34:26 - 17:53:38
Computer name: LOURENCO
Scanning type: Scan system for viruses, rootkits, spyware
Target: C:\ E:\
--------------------------------------------------------------------------------
Result: 184 malware found
Adware.Agent (spyware)
System (Disinfected)
Adware.P2PNetworking (spyware)
System (Disinfected)
BAT/DelFil.AS (virus)
C:\WINDOWS\SYSTEM32\GGG.BAT (Renamed & Submitted)
C:\WINDOWS\SYSTEM32\N.BAT (Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\N.BAT (Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\N.BAT (Submitted)
Backdoor.Win32.VB.ary (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\FR13JP4W\KYBRDB_3[1].EXE (Renamed & Submitted)
E:\SNK\KYBRDB_3.EXE (Renamed & Submitted)
Backdoor.Win32.VB.axv (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\SETUP.EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\O9IN49QJ\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\SETUP.EXE (Renamed & Submitted)
ClickSpring (spyware)
System (Disinfected)
Exploit.HTML.CodeBaseExec (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\OVBNY45H\POPSEND[1].HTM (Renamed & Submitted)
Ircbot.YJI (virus)
E:\PROGRAM FILES\MD,AUTRES\INSTALLER PROGRAMMES\VTFTOOL_0.5B.EXE (Submitted)
TSUpdate.AI (virus)
C:\PROGRAM FILES\FICHIERS COMMUNS\FUKU\FUKUD\VOCABULARY (Submitted)
Tracking Cookie (spyware)
System (Disinfected)
System
System
System
System
System (Disinfected)
System
System (Disinfected)
Trojan-Clicker.HTML.Agent.a (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\VBPR7L4W\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\VBPR7L4W\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\T1WD59R3\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\SXEVWX2Z\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\QPHMZU9O\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\QPHMZU9O\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\QPHMZU9O\POPUP[3].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\QPHMZU9O\POPUP[4].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\OLIBG9IV\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\LVB7XDCE\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\LVB7XDCE\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\KRLBAA71\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\KRLBAA71\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\I7YZ2TA7\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\I7YZ2TA7\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\I7YZ2TA7\POPUP[3].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\CTU3CHY3\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\CTU3CHY3\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\CN3RU45X\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\0XW5U3KT\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\ZS7NBB50\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\ZS7NBB50\POPUP[5].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\ZS7NBB50\POPUP[6].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\ZS7NBB50\POPUP[7].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\POPUP[3].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\POPUP[4].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\POPUP[5].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[3].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[4].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[5].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[6].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[7].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\NYONV5K9\POPUP[8].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\DA24ZWBM\POPUP[3].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\DA24ZWBM\POPUP[4].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\DA24ZWBM\POPUP[5].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\DA24ZWBM\POPUP[6].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\DA24ZWBM\POPUP[7].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\CBD3AA3L\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\CBD3AA3L\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9RN3D9CA\POPUP[1].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9RN3D9CA\POPUP[2].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9RN3D9CA\POPUP[3].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9RN3D9CA\POPUP[4].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9RN3D9CA\POPUP[5].HTM (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\433JA0LC\POPUP[1].HTM (Renamed & Submitted)
Trojan-Clicker.Win32.VB.fc (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\VBPR7L4W\KYBRDB_2[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\CN3RU45X\NWNMB_2[1].EXE (Renamed & Submitted)
E:\SNK\NWNM_1.EXE (Renamed & Submitted)
Trojan-Clicker.Win32.VB.fe (virus)
E:\SNK\NWNMD_5.EXE (Renamed & Submitted)
Trojan-Clicker.Win32.VB.ly (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\O1ERS5EJ\DEFENDER24[1].EXE (Renamed & Submitted)
Trojan-Clicker.Win32.VB.nh (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\CBD3AA3L\DFNDRC_4A[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\69LE7EL4\DFNDRC_4[1].EXE (Renamed & Submitted)
E:\SNK\DFNDRAC_6.EXE (Renamed & Submitted)
E:\SNK\DFNDRAD_5.EXE (Renamed & Submitted)
E:\SNK\DFNDRC_4.EXE (Renamed & Submitted)
E:\SNK\DFNDRC_4A.EXE (Renamed & Submitted)
E:\SNK\DFNDRDD_6.EXE (Renamed & Submitted)
E:\SNK\KYBRDAD_5.EXE (Renamed & Submitted)
E:\SNK\KYBRDD_5.EXE (Renamed & Submitted)
E:\SNK\KYBRDE_5.EXE (Renamed & Submitted)
E:\SNK\KYBRD_1.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.bo (virus)
C:\WINDOWS\SYSTEM32\DR.EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\DRSMARTLOAD45A[2].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.ca (virus)
E:\SNK\NWNMAD_5.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.ce (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\433JA0LC\DFNDR[1].EXE (Renamed & Submitted)
E:\SNK\DFNDR.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.ck (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\FR13JP4W\DRSMARTLOAD45A[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9SWV5XKP\DRSMARTLOAD46A[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.cn (virus)
E:\SNK\NWNMC_2.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.ct (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\9SWV5XKP\DRSMARTLOAD[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.cu (virus)
E:\SNK\DFNDRD_4.EXE (Renamed & Submitted)
E:\SNK\DFNDRD_5.EXE (Renamed & Submitted)
E:\SNK\KYBRDD_4.EXE (Renamed & Submitted)
E:\SNK\NWNMD_4.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.db (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\KLM3SPYF\DRSMARTLOAD849A[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\G123OPQZ\DRSMARTLOAD46A[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\CT27KTQZ\DRSMARTLOAD45A[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.de (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\KLM3SPYF\LOADER[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\CH6J8DAB\DRSMARTLOAD[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.ef (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\OLIBG9IV\LOADER[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Adload.jm (virus)
C:\WINDOWS\SYSTEM32\INSTALL.EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\INSTALL.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Agent.hql (virus)
C:\WINDOWS\MROFINU1000137.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.PurityScan.da (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\MES DOCUMENTS\?ICROSOFT.NET\WUACLT.EXE
Trojan-Downloader.Win32.PurityScan.ek (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\APPLICATION DATA\W?NSXS\WUAUCLT.EXE
Trojan-Downloader.Win32.PurityScan.fk (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\!UPDATE.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.Small.hsg (virus)
C:\DOCUMENTS AND SETTINGS\HUGO.)\WINL.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.abh (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\VBPR7L4W\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\ZS7NBB50\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\OJ3RDPTD\I[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.ada (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\G123OPQZ\NWNMDD_6[1].EXE (Renamed & Submitted)
E:\SNK\KYBRDAC_6.EXE (Renamed & Submitted)
E:\SNK\NWNMAC_6.EXE (Renamed & Submitted)
E:\SNK\NWNMDD_6.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.aeo (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\433JA0LC\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\17R3P9CE\I[2].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.afb (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\I7YZ2TA7\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\ELZW9KZ2\I[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.afv (virus)
E:\SNK\DFNDRA_1.EXE (Renamed & Submitted)
E:\SNK\DFNDRC_2.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.agi (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\69LE7EL4\KYBRDC_4[1].EXE (Renamed & Submitted)
E:\SNK\KYBRDACA_6.EXE (Renamed & Submitted)
E:\SNK\KYBRDC_2.EXE (Renamed & Submitted)
E:\SNK\KYBRDC_4.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.agp (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\U7BOT6ZJ\NWNMC_4[1].EXE (Renamed & Submitted)
E:\SNK\NWNMC_4.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.ahj (virus)
E:\SNK\NWNME_5.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.ahn (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\T1WD59R3\I[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.aid (virus)
E:\SNK\KYBRDDD_6.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.aik (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\G123OPQZ\I[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\DA24ZWBM\I[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.aiy (virus)
E:\SNK\NWNMFF_11.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.ajz (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\I7YZ2TA7\DRSMARTLOAD45A[2].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\I7YZ2TA7\DRSMARTLOAD46A[1].EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\0XW5U3KT\DRSMARTLOAD849A[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.all (virus)
C:\WINDOWS\SETUP.EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\433JA0LC\I[2].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.bgq (virus)
C:\DOCUMENTS AND SETTINGS\PROPRI�TAIRE\DR.EXE (Renamed & Submitted)
C:\DOCUMENTS AND SETTINGS\PAPA\DR.EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.bij (virus)
C:\DOCUMENTS AND SETTINGS\PAPA\LOCAL SETTINGS\TEMP\TEMPORARY INTERNET FILES\CONTENT.IE5\LPC2K3H3\I[1].EXE (Renamed & Submitted)
Trojan-Downloader.Win32.VB.cgu (virus)
C:\WINDOWS\SYSTEM32\NGPXX07\NGPXX071084.EXE (Renamed & Submitted)
Trojan-Dropper.Win32.Agent.dgo (virus)
C:\WINDOWS\SYSTEM32\VTSTS.EXE (Renamed & Submitted)
C:\WINDOWS\SYSTEM32\SPOOL\DRIVERS\W32X86\3\HPZTSB04.EXE (Renamed & Submitted)
C:\PROGRAM FILES\ZYXEL\ADSL USB MODEM\CNXDSLTB.EXE (Renamed & Submitted)
C:\PROGRAM FILES\VEOH NETWORKS\VEOH\VEOHCLIENT.EXE (Renamed & Submitted)
C:\PROGRAM FILES\SPYBOT - SEARCH & DESTROY\TEATIMER.EXE (Renamed & Submitted)
C:\PROGRAM FILES\SONY ERICSSON\MOBILE2\APPLICATION LAUNCHER\APPLICATION LAUNCHER.EXE (Renamed)
C:\PROGRAM FILES\QUICKTIME\QTTASK.EXE (Renamed & Submitted)
C:\PROGRAM FILES\MICROSOFT INTELLITYPE PRO\TYPE32.EXE (Renamed & Submitted)
C:\PROGRAM FILES\MICROSOFT INTELLIPOINT\POINT32.EXE (Renamed & Submitted)
C:\PROGRAM FILES\JAVA\JRE1.5.0_03\BIN\JUSCHED.EXE (Renamed & Submitted)
C:\PROGRAM FILES\ITUNES\ITUNESHELPER.EXE (Renamed & Submitted)
C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBARNOTIFIER\GOOGLETOOLBARNOTIFIER.EXE (Renamed & Submitted)
C:\PROGRAM FILES\BLUEWIN\QUICK HELP\SMARTBRIDGE\MOTIVESB.EXE (Renamed & Submitted)
C:\PROGRAM FILES\ATI TECHNOLOGIES\ATI.ACE\CORE-STATIC\CLISTART.EXE (Renamed & Submitted)
C:\PROGRAM FILES\ATI TECHNOLOGIES\ATI CONTROL PANEL\ATIPTAXX.EXE (Renamed & Submitted)
C:\PROGRAM FILES\ADOBE\READER 8.0\READER\READER_SL.EXE (Renamed & Submitted)
Trojan-Dropper.Win32.VB.mn (virus)
C:\WINDOWS\IEXPLORE.EXE (Renamed & Submitted)
Virus.Win32.Fontra.c (virus)
C:\WINDOWS\SYSTEM32\P2PNETWORKING.EXE
C:\PROGRAM FILES\SETUP.EXE (Submitted)
C:\PROGRAM FILES\TRACK_03.EXE
C:\PROGRAM FILES\VIDEO.EXE (Submitted)
C:\DOCUMENTS AND SETTINGS\ALL USERS\MENU D�MARRER\PROGRAMMES\D�MARRAGE\DLLHOST.EXE (Submitted)
Vundo.BD (virus)
C:\WINDOWS\SYSTEM32\VTSTS.DLL (Submitted)
C:\DOCUMENTS AND SETTINGS\HUGO.)\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\3BKX28PA\CSS4[1] (Submitted)
W32/DLoader.AEMV (virus)
C:\RECYCLER\S-1-5-18\DC2\SERVICES.DLL (Submitted)
C:\RECYCLER\S-1-5-18\DC1\SERVICES.DLL (Submitted)
W32/DLoader.ASWU (virus)
C:\WINDOWS\DOWNLOADED PROGRAM FILES\UERSV_0001_LPNETINSTALLER.EXE (Submitted)
C:\WINDOWS\DOWNLOADED PROGRAM FILES\CONFLICT.2\UERSV_0001_LPNETINSTALLER.EXE (Submitted)
C:\WINDOWS\DOWNLOADED PROGRAM FILES\CONFLICT.1\UERSV_0001_LPNETINSTALLER.EXE (Submitted)
W32/DLoader.FFWX (virus)
C:\WINDOWS\SYSTEM32\SETUP9X.EXE (Submitted)
W32/Smalltroj.IMC (virus)
E:\PROGRAM FILES\MD,AUTRES\INSTALLER PROGRAMMES\FRETSONFIRE\FRETSONFIRE.EXE (Submitted)
WebHancer (spyware)
System (Disinfected)
Win32.Trojan.Agent (spyware)
System (Disinfected)
Win32.Trojandownloader.Zlob (spyware)
System (Disinfected)
Win32.Virus.Fontra (spyware)
System (Disinfected)