Здраствуйте. При включении ПК не запускался explorer.exe (была видна только обоина). Прошелся нодом - теперь запускается, но тормозит комп. Подозрение что не все вирусы удалил.
Printable View
Здраствуйте. При включении ПК не запускался explorer.exe (была видна только обоина). Прошелся нодом - теперь запускается, но тормозит комп. Подозрение что не все вирусы удалил.
Уважаемый(ая) [B]Ipkis[/B], спасибо за обращение на наш форум!
Удаление вирусов - абсолютно бесплатная услуга на VirusInfo.Info. Хелперы, в самое ближайшее время, ответят на Ваш запрос. Для оказания помощи необходимо предоставить логи сканирования утилитами АВЗ и HiJackThis, подробнее можно прочитать в [URL="http://virusinfo.info/pravila.html"] правилах оформления запроса о помощи[/URL].
Если наш сайт окажется полезен Вам и у Вас будет такая возможность - пожалуйста [URL="http://virusinfo.info/content.php?r=113-virusinfo.info-donate"]поддержите проект[/URL].
avz.exe запакуйте с паролем virus и пришлите по красной ссылке [COLOR="Red"][U][B]Прислать запрошенный карантин[/B][/U][/COLOR] вверху темы
Выполните скрипт в AVZ
[code]begin
ShowMessage('Внимание! Перед выполнением скрипта AVZ автоматически закроет все сетевые подключения.' + #13#10 + 'После перезагрузки компьютера подключения к сети будут восстановлены в автоматическом режиме.');
ExecuteFile('net.exe', 'stop tcpip /y', 0, 15000, true);
SearchRootkit(true, true);
SetAVZGuardStatus(True);
QuarantineFile('C:\Documents and Settings\Admin\Application Data\FAA.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\F8.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\E8.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\E3.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\D0.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\CA.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\C0.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\AB.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\A0.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\9E.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\9D.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\9C.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\9B.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\94.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\83.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\7E.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\77.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\70.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\6D.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\64.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\63.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\56.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\54.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\48.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\47D.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\47.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\44.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\43.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\42.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\3D.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\3C.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\3B.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\34.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\2EDB.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\2D.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\2B1.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\2AE.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\21A.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\207.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\1B5.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\1A2.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\19E.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\1968.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\171.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\14B.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\147.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\145.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\129.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\123.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\122.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\119.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\108.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\1071.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\100C.exe','');
QuarantineFile('C:\Program Files\btljfysv\jadvoqal.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\regsrv32.exe','');
QuarantineFile('C:\Documents and Settings\Admin\Application Data\Zqemel.exe','');
DeleteFile('C:\Documents and Settings\Admin\Application Data\Zqemel.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\regsrv32.exe');
DeleteFile('C:\Program Files\btljfysv\jadvoqal.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\100C.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\1071.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\108.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\119.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\122.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\123.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\129.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\145.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\147.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\14B.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\171.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\1968.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\19E.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\1A2.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\1B5.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\207.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\21A.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\2AE.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\2B1.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\2D.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\2EDB.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\34.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\3B.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\3C.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\3D.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\42.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\43.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\44.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\47.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\47D.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\48.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\54.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\56.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\63.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\64.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\6D.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\70.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\77.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\7E.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\83.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\94.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\9B.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\9C.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\9D.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\9E.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\A0.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\AB.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\C0.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\CA.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\D0.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\E3.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\E8.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\F8.exe');
DeleteFile('C:\Documents and Settings\Admin\Application Data\FAA.exe');
BC_ImportAll;
ExecuteSysClean;
BC_Activate;
RebootWindows(true);
end. [/code]Компьютер перезагрузится.
Пришлите карантин согласно [B]Приложения 3[/B] правил по красной ссылке [COLOR="Red"][U][B]Прислать запрошенный карантин[/B][/U][/COLOR] вверху темы
Сделайте новые логи
готово сделал
Товарищи, проверьте может я чтото не так сделал? или уже всё?
Сделайте лог [url="http://virusinfo.info/showpost.php?p=457118&postcount=1"]полного сканирования МВАМ[/url]
Статистика проведенного лечения:
[LIST][*]Получено карантинов: [B]2[/B][*]Обработано файлов: [B]169[/B][*]В ходе лечения обнаружены вредоносные программы:
[LIST=1][*] c:\\documents and settings\\admin\\application data\\ab.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\a0.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\ca.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\c0.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\d0.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\e3.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\e8.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\faa.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\f8.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\1a2.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\1b5.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\100c.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\1071.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\108.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\119.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\122.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\123.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\129.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\14b.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\145.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\147.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\171.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\19e.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\1968.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\2ae.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\2b1.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\2d.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\2edb.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\207.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\21a.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\3b.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\3c.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\3d.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\34.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\42.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\43.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\44.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\47d.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\47.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\48.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\54.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\56.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\6d.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\63.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\64.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\7e.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\70.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\77.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\83.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\9b.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\9c.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\9d.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\9e.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[*] c:\\documents and settings\\admin\\application data\\94.exe - [B]Trojan.BAT.Miner.i[/B] ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )[/LIST][/LIST]