The remote host is infected by a virus

Summary
This script checks for the presence of different virii on the remote host, by using the SMB credentials you provide OVS with. - W32/Badtrans-B - JS_GIGGER.A@mm - W32/Vote-A - W32/Vote-B - CodeRed - W32.Sircam.Worm@mm - W32.HLLW.Fizzer@mm - W32.Sobig.B@mm - W32.Sobig.E@mm - W32.Sobig.F@mm - W32.Sobig.C@mm - W32.Yaha.J@mm - W32.mimail.a@mm - W32.mimail.c@mm - W32.mimail.e@mm - W32.mimail.l@mm - W32.mimail.p@mm - W32.Welchia.Worm - W32.Randex.Worm - W32.Beagle.A - W32.Novarg.A - Vesser - NetSky.C - Doomran.a - Beagle.m - Beagle.j - Agobot.FO - NetSky.W - Sasser - W32.Wallon.A - W32.MyDoom.M - W32.MyDoom.AI - W32.MyDoom.AX - W32.Aimdes.B - W32.Aimdes.C - W32.ahker.D - Hackarmy.i - W32.Erkez.D/Zafi.d - Winser-A - Berbew.K - Hotword.b - W32.Backdoor.Ginwui.B - W32.Wargbot - W32.Randex.GEL - W32.Fujacks.B
Solution
See the URLs which will appear in the report