"Scan ""Scan whole computer"" was finished." "Infections found:";"59" "Infected objects removed or healed";"58" "Not removed or healed.";"1" "Spyware found:";"8" "Spyware removed:";"8" "Not removed:";"0" "Warnings count:";"24" "Information count:";"0" "Scan started:";"mardi 27 mai 2008, 13:18:06" "Total object scanned:";"189915" "Time needed:";"1 hour(s) 8 minute(s) 18 second(s) " "Errors encountered:";"0" "Infections" "File";"Infection";"Result" "C:\WINDOWS\system32\WinCtrl32.dll";"Virus found Win32/Agent";"Reboot is required to finish the action" "C:\WINDOWS\system32\winlogon.exe (688)";"Virus found Win32/Agent";"Reboot is required to finish the action" "C:\WINDOWS\system32\msdefender.exe";"Trojan horse SHeur.BLYS";"Reboot is required to finish the action" "C:\WINDOWS\system32\msdefender.exe (2068)";"Trojan horse SHeur.BLYS";"Reboot is required to finish the action" "C:\WINDOWS\system32\drivers\spools.exe";"Trojan horse BackDoor.Generic9.AQXG";"Reboot is required to finish the action" "C:\WINDOWS\system32\drivers\spools.exe (2076)";"Trojan horse BackDoor.Generic9.AQXG";"Reboot is required to finish the action" "C:\WINDOWS\system32\drivers\spools.exe";"Trojan horse BackDoor.Generic9.AQXG";"Reboot is required to finish the action" "HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\\ntuser";"Found registry key with reference to infected file C:\WINDOWS\system32\drivers\spools.exe";"Moved to Virus Vault" "C:\Documents and Settings\LocalService\cftmon.exe";"Trojan horse BackDoor.Generic9.AQXG";"Moved to Virus Vault" "HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\\autoload";"Found registry key with reference to infected file C:\Documents and Settings\LocalService\cftmon.exe";"Moved to Virus Vault" "C:\WINDOWS\system32\msdefender.exe";"Trojan horse SHeur.BLYS";"Reboot is required to finish the action" "HKU\S-1-5-21-1214440339-1454471165-682003330-1003\Software\Microsoft\Windows\CurrentVersion\Run\\msdefender.exe";"Found registry key with reference to infected file C:\WINDOWS\system32\msdefender.exe";"Moved to Virus Vault" "C:\WINDOWS\system32\drivers\spools.exe";"Trojan horse BackDoor.Generic9.AQXG";"Reboot is required to finish the action" "HKU\S-1-5-21-1214440339-1454471165-682003330-1003\Software\Microsoft\Windows\CurrentVersion\Run\\ntuser";"Found registry key with reference to infected file C:\WINDOWS\system32\drivers\spools.exe";"Moved to Virus Vault" "C:\Documents and Settings\Malekal_morte\cftmon.exe";"Trojan horse BackDoor.Generic9.AQXG";"Moved to Virus Vault" "HKU\S-1-5-21-1214440339-1454471165-682003330-1003\Software\Microsoft\Windows\CurrentVersion\Run\\autoload";"Found registry key with reference to infected file C:\Documents and Settings\Malekal_morte\cftmon.exe";"Moved to Virus Vault" "C:\WINDOWS\system32\drivers\spools.exe";"Trojan horse BackDoor.Generic9.AQXG";"Reboot is required to finish the action" "HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Run\\ntuser";"Found registry key with reference to infected file C:\WINDOWS\system32\drivers\spools.exe";"Moved to Virus Vault" "C:\Documents and Settings\LocalService\cftmon.exe";"Trojan horse BackDoor.Generic9.AQXG";"Moved to Virus Vault" "HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Run\\autoload";"Found registry key with reference to infected file C:\Documents and Settings\LocalService\cftmon.exe";"Moved to Virus Vault" "C:\WINDOWS\system32\drivers\spools.exe";"Trojan horse BackDoor.Generic9.AQXG";"Infected" "C:\Documents and Settings\Malekal_morte\Application Data\Microsoft\Internet Explorer\Desktop.htt";"Virus found SpySheriff";"Moved to Virus Vault" "C:\Documents and Settings\Malekal_morte\Local Settings\Temporary Internet Files\Content.IE5\7KKKCQM6\found[1].exe";"Virus identified I-Worm/Nuwar.R";"Moved to Virus Vault" "C:\Documents and Settings\Malekal_morte\Local Settings\Temporary Internet Files\Content.IE5\7KKKCQM6\winem[1].exe";"Trojan horse Generic10.ADTM";"Moved to Virus Vault" "C:\Documents and Settings\Malekal_morte\Local Settings\Temporary Internet Files\Content.IE5\MK0Z9QK6\6c09f3eeefbf543ab2469afa5020d1ea[1].zip:\b148.exe";"Trojan horse Downloader.Generic7.ORJ";"Moved to Virus Vault" "C:\Documents and Settings\Malekal_morte\Local Settings\Temporary Internet Files\Content.IE5\MK0Z9QK6\6c09f3eeefbf543ab2469afa5020d1ea[1].zip";"Trojan horse Downloader.Generic7.ORJ";"Moved to Virus Vault" "C:\Documents and Settings\Malekal_morte\Local Settings\Temporary Internet Files\Content.IE5\P2ZCWWUL\windad[2].exe";"Trojan horse BackDoor.Generic9.AQXG";"Moved to Virus Vault" "C:\Documents and Settings\Malekal_morte\Local Settings\Temporary Internet Files\Content.IE5\P2ZCWWUL\winzl2[2].exe";"Virus found Win32/Agent";"Moved to Virus Vault" "C:\Documents and Settings\Malekal_morte\Local Settings\Temporary Internet Files\Content.IE5\TS9EMJMO\win32[1].exe";"Virus identified I-Worm/Nuwar.N";"Moved to Virus Vault" "C:\Program Files\BraveSentry\BraveSentry0.dll";"Trojan horse Generic4.HDH";"Moved to Virus Vault" "C:\Program Files\BraveSentry\BraveSentry2.dll";"Trojan horse Generic4.IZC";"Moved to Virus Vault" "C:\Program Files\BraveSentry\BraveSentry3.dll";"Trojan horse Generic3.QIJ";"Moved to Virus Vault" "C:\RECYCLER\S-1-5-21-1214440339-1454471165-682003330-1003\Dc7.zip:\DiagHelp\FilesInfoCmd.exe";"Trojan horse BackDoor.VB.AEV";"Moved to Virus Vault" "C:\RECYCLER\S-1-5-21-1214440339-1454471165-682003330-1003\Dc7.zip";"Trojan horse BackDoor.VB.AEV";"Moved to Virus Vault" "C:\WINDOWS\b148.exe";"Trojan horse Downloader.Generic7.ORJ";"Moved to Virus Vault" "C:\WINDOWS\desktop.html";"Virus found SpySheriff";"Moved to Virus Vault" "C:\WINDOWS\herjek.exe";"Virus identified I-Worm/Nuwar.R";"Moved to Virus Vault" "C:\WINDOWS\mrofinu27.exe";"Trojan horse Downloader.Generic7.PGZ";"Moved to Virus Vault" "C:\WINDOWS\system32\dllgh8jkd1q2.exe";"Trojan horse Downloader.Tibs.9.Q";"Moved to Virus Vault" "C:\WINDOWS\system32\dllgh8jkd1q5.exe";"Virus identified I-Worm/Nuwar.N";"Moved to Virus Vault" "C:\WINDOWS\system32\dllgh8jkd1q6.exe";"Virus identified I-Worm/Nuwar.N";"Moved to Virus Vault" "C:\WINDOWS\system32\dllgh8jkd1q7.exe";"Virus identified I-Worm/Nuwar.N";"Moved to Virus Vault" "C:\WINDOWS\system32\drivers\cbL88.sys";"Trojan horse Scagent.T";"Moved to Virus Vault" "C:\WINDOWS\system32\drivers\spools.exe";"Trojan horse BackDoor.Generic9.AQXG";"Reboot is required to finish the action" "C:\WINDOWS\system32\drivers\Uxh08.sys";"Trojan horse Scagent.T";"Moved to Virus Vault" "C:\WINDOWS\system32\found.exe.exe";"Virus identified I-Worm/Nuwar.R";"Moved to Virus Vault" "C:\WINDOWS\system32\maxpaynow1.exe";"Virus identified I-Worm/Nuwar.N";"Moved to Virus Vault" "C:\WINDOWS\system32\maxpaynowti1.exe";"Virus identified I-Worm/Nuwar.N";"Moved to Virus Vault" "C:\WINDOWS\system32\msdefender.exe";"Trojan horse SHeur.BLYS";"Reboot is required to finish the action" "C:\WINDOWS\system32\vedxg4am1et2.exe";"Trojan horse Downloader.Tibs.9.N";"Moved to Virus Vault" "C:\WINDOWS\system32\vedxg6ame4.exe";"Trojan horse Downloader.Tibs.9.R";"Moved to Virus Vault" "C:\WINDOWS\system32\vedxga1me4t1.exe";"Virus identified I-Worm/Nuwar.N";"Moved to Virus Vault" "C:\WINDOWS\system32\vedxga3me2.exe";"Trojan horse Generic10.ACUX";"Moved to Virus Vault" "C:\WINDOWS\system32\vedxga4me1.exe";"Trojan horse Downloader.Generic.QUS";"Moved to Virus Vault" "C:\WINDOWS\system32\vedxga5me3.exe";"Trojan horse Downloader.Generic7.PHC";"Moved to Virus Vault" "C:\WINDOWS\system32\WinCtrl32.dll";"Virus found Win32/Agent";"Reboot is required to finish the action" "C:\WINDOWS\system32\wind32.exe";"Virus identified I-Worm/Nuwar.N";"Moved to Virus Vault" "C:\WINDOWS\taskmon.exe";"Virus found Win32/Heur";"Moved to Virus Vault" "C:\WINDOWS\xpupdate.exe";"Trojan horse Downloader.Tibs.9.Q";"Moved to Virus Vault" "Spyware" "File";"Infection";"Result" "C:\Program Files\QdrPack\QdrPack16.exe";"Adware Generic3.EGE";"Reboot is required to finish the action" "C:\Program Files\QdrPack\QdrPack16.exe (2072)";"Adware Generic3.EGE";"Reboot is required to finish the action" "C:\Program Files\QdrPack\QdrPack16.exe";"Adware Generic3.EGE";"Reboot is required to finish the action" "HKU\S-1-5-21-1214440339-1454471165-682003330-1003\Software\Microsoft\Windows\CurrentVersion\Run\\QdrPack16";"Found registry key with reference to infected file C:\Program Files\QdrPack\QdrPack16.exe";"Moved to Virus Vault" "C:\Program Files\BraveSentry\BraveSentry.exe";"Adware Generic3.ABG";"Moved to Virus Vault" "C:\Program Files\BraveSentry\Uninstall.exe";"Adware Generic3.MG";"Moved to Virus Vault" "C:\Program Files\QdrPack\QdrPack16.exe";"Adware Generic3.EGE";"Reboot is required to finish the action" "C:\WINDOWS\system32\maxpaynowti.exe";"Potentially harmful program Dialer.DNA";"Moved to Virus Vault" "Warnings" "File";"Infection";"Result" "HKCR\exefile\shell\open\command\\";"Found registry key with reference to file C:\WINDOWS\system32\drivers\spools.exe";"Potentially dangerous object" "HKLM\SOFTWARE\Classes\WR";"Found Adware.Generic";"Potentially dangerous object" "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Brave-Sentry";"Found Adware.RogueSuspect";"Potentially dangerous object" "HKU\S-1-5-21-1214440339-1454471165-682003330-1003\Software\Brave-Sentry";"Found Adware.RogueSuspect";"Potentially dangerous object" "HKU\S-1-5-21-1214440339-1454471165-682003330-1003\Software\BraveSentry";"Found Adware.Bravesentry";"Potentially dangerous object" "C:\Documents and Settings\Malekal_morte\Cookies\malekal_morte@2o7[2].txt:\2o7.net.92b4d8ae";"Found Tracking cookie.2o7";"Potentially dangerous object" "C:\Documents and Settings\Malekal_morte\Cookies\malekal_morte@2o7[2].txt";"Found Tracking cookie.2o7";"Potentially dangerous object" "C:\Documents and Settings\Malekal_morte\Cookies\malekal_morte@bluestreak[1].txt:\bluestreak.com.bf396750";"Found Tracking cookie.Bluestreak";"Potentially dangerous object" "C:\Documents and Settings\Malekal_morte\Cookies\malekal_morte@bluestreak[1].txt";"Found Tracking cookie.Bluestreak";"Potentially dangerous object" "C:\Documents and Settings\Malekal_morte\Cookies\malekal_morte@revsci[2].txt:\revsci.net.44927ec";"Found Tracking cookie.Revsci";"Potentially dangerous object" "C:\Documents and Settings\Malekal_morte\Cookies\malekal_morte@revsci[2].txt:\revsci.net.55564293";"Found Tracking cookie.Revsci";"Potentially dangerous object" "C:\Documents and Settings\Malekal_morte\Cookies\malekal_morte@revsci[2].txt:\revsci.net.e9dbeb91";"Found Tracking cookie.Revsci";"Potentially dangerous object" "C:\Documents and Settings\Malekal_morte\Cookies\malekal_morte@revsci[2].txt:\revsci.net.2df99d79";"Found Tracking cookie.Revsci";"Potentially dangerous object" "C:\Documents and Settings\Malekal_morte\Cookies\malekal_morte@revsci[2].txt";"Found Tracking cookie.Revsci";"Potentially dangerous object" "C:\Documents and Settings\Malekal_morte\Cookies\malekal_morte@smartadserver[1].txt:\smartadserver.com.c5827141";"Found Tracking cookie.Smartadserver";"Potentially dangerous object" "C:\Documents and Settings\Malekal_morte\Cookies\malekal_morte@smartadserver[1].txt:\smartadserver.com.321a5cf8";"Found Tracking cookie.Smartadserver";"Potentially dangerous object" "C:\Documents and Settings\Malekal_morte\Cookies\malekal_morte@smartadserver[1].txt:\smartadserver.com.5550c4ed";"Found Tracking cookie.Smartadserver";"Potentially dangerous object" "C:\Documents and Settings\Malekal_morte\Cookies\malekal_morte@smartadserver[1].txt:\smartadserver.com.3e749ab9";"Found Tracking cookie.Smartadserver";"Potentially dangerous object" "C:\Documents and Settings\Malekal_morte\Cookies\malekal_morte@smartadserver[1].txt";"Found Tracking cookie.Smartadserver";"Potentially dangerous object" "C:\Documents and Settings\Malekal_morte\Cookies\malekal_morte@statcounter[2].txt:\statcounter.com.5d249c51";"Found Tracking cookie.Statcounter";"Potentially dangerous object" "C:\Documents and Settings\Malekal_morte\Cookies\malekal_morte@statcounter[2].txt:\statcounter.com.7b9083c6";"Found Tracking cookie.Statcounter";"Potentially dangerous object" "C:\Documents and Settings\Malekal_morte\Cookies\malekal_morte@statcounter[2].txt";"Found Tracking cookie.Statcounter";"Potentially dangerous object" "C:\Documents and Settings\Malekal_morte\Cookies\malekal_morte@weborama[1].txt:\weborama.fr.30104bcb";"Found Tracking cookie.Weborama";"Potentially dangerous object" "C:\Documents and Settings\Malekal_morte\Cookies\malekal_morte@weborama[1].txt";"Found Tracking cookie.Weborama";"Potentially dangerous object"