It's Windows XP, so it uses the default temp folder, like so:
G:\Documents and Settings\Dave\Local Settings\temp
This was the location where the files were originally identified, not in an archive (7z,zip)
but regular files (.exe, .dll) in a sub folder.
The 7z file was created by myself in order to explore how/when avast! detected the bad file(s).
I did just about everything I could think of except actually run the exe.
Would a PUP be detected by the webshield, assuming this download was the result of some
java script from a web page?