Votre question

Fenetres publicitaires

Tags :
  • Sécurité
Dernière réponse : dans Sécurité et virus
5 Janvier 2008 18:56:49

Bonjour !
Des fenetres publicitaires ne cessent de s'ouvrir quand je suis sur intenet je ne m'en sors pas.
J'ai installé ccleaner, avg antispyware, rien n'rrive à es supprimer
Merci de m'aider
Adri

Autres pages sur : fenetres publicitaires

5 Janvier 2008 19:07:23

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 19:06:19, on 05/01/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16574)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\ehome\ehtray.exe
C:\Program Files\hpq\HP Wireless Assistant\HP Wireless Assistant.exe
C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\HP\QuickPlay\QPService.exe
C:\Program Files\Hp\HP Software Update\HPWuSchd2.exe
C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\Program Files\Neuf\Kit\WiFi\9wifi.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Hewlett-Packard\HP Pavilion Webcam\HPWebcam.exe
C:\Program Files\SAGEM WiFi manager\WLANUTL.exe
C:\Program Files\HP\Digital Imaging\bin\hpqimzone.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\mqsvc.exe
C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe
C:\WINDOWS\system32\mqtgsvc.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\eHome\ehmsas.exe
C:\WINDOWS\system32\dllhost.exe
C:\Program Files\MSN Messenger\msnmsgr.exe
C:\Program Files\MSN Messenger\usnsvc.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WLLoginProxy.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.fr/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O4 - HKLM\..\Run: [ehTray] C:\WINDOWS\ehome\ehtray.exe
O4 - HKLM\..\Run: [hpWirelessAssistant] C:\Program Files\hpq\HP Wireless Assistant\HP Wireless Assistant.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet /nodetect
O4 - HKLM\..\Run: [MsmqIntCert] regsvr32 /s mqrt.dll
O4 - HKLM\..\Run: [High Definition Audio Property Page Shortcut] CHDAudPropShortcut.exe
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [QPService] "C:\Program Files\HP\QuickPlay\QPService.exe"
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\Hp\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [QlbCtrl] %ProgramFiles%\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe /Start
O4 - HKLM\..\Run: [Cpqset] C:\Program Files\Hewlett-Packard\Default Settings\cpqset.exe
O4 - HKLM\..\Run: [RecGuard] C:\Windows\SMINST\RecGuard.exe
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [Autoconfigurateur WiFi Neuf] "C:\Program Files\Neuf\Kit\WiFi\9wifi.exe"
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Démarrage rapide de HP Photosmart Premier.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqthb08.exe
O4 - Global Startup: HP Pavilion Webcam Tray Icon.lnk = C:\Program Files\Hewlett-Packard\HP Pavilion Webcam\HPWebcam.exe
O4 - Global Startup: Lancement rapide d'Adobe Reader.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Utilitaire réseau pour SAGEM Wi-Fi 11g USB adapter.lnk = ?
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&loca...
O23 - Service: AddFiltr - Hewlett-Packard Development Company, L.P. - C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\AddFiltr.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: hpqwmiex - Hewlett-Packard Development Company, L.P. - C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - c:\Program Files\Fichiers communs\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe

--
End of file - 8005 bytes
Contenus similaires
a b 8 Sécurité
5 Janvier 2008 19:12:57

Re,

Télécharge Gmer.
Dézippe le dans un dossier ou sur ton bureau.

Déconnecte toi d'Internet puis et ferme tous les programmes.
Double-clique sur Gmer.exe.

IMPORTANT: Si une alerte de ton antivirus apparaît pour le fichier gmer.sys ou gmer.exe, laisse le s'executer.

Clique sur l'onglet rootkit.
A droite, coche Files et Services.
Clique maintenant sur Scan.

Lorsque le scan est terminé, clique sur Copy.

Ouvre le Bloc-notes puis clique sur le Menu Edition / Coller.
Le rapport doit alors apparaître.
Enregistre le fichier sur ton bureau et copie/colle le contenu ici.
5 Janvier 2008 20:50:46

GMER 1.0.13.12551 - http://www.gmer.net
Rootkit scan 2008-01-05 20:49:26
Windows 5.1.2600 Service Pack 2


---- Files - GMER 1.0.13 ----

File C:\Documents and Settings\Adrien\Local Settings\Application Data\ehrclvgoyj.dat
File C:\Documents and Settings\Adrien\Local Settings\Application Data\ehrclvgoyj.exe
File C:\Documents and Settings\Adrien\Local Settings\Application Data\ehrclvgoyj_nav.dat
File C:\Documents and Settings\Adrien\Local Settings\Application Data\ehrclvgoyj_navps.dat
File C:\WINDOWS\Prefetch\EHRCLVGOYJ.EXE-0B9BCCD2.pf

---- EOF - GMER 1.0.13 ----
a b 8 Sécurité
6 Janvier 2008 13:47:41

Re,

Télécharge Navilog1.exe (IL-MAFIOSO)
Enregistre-le sur ton Bureau.
Lance l'installation en double cliquant sur navilog.exe.
Une fois l'installation terminée, l'utilitaire s'exécutera automatiquement.
(Si ce n'est pas le cas, double clique sur le raccourci présent sur le Bureau)

Laisse-toi guider par l'utilitaire. Choisis l'option 1 puis valide.
[#ff0000]! N'utilise pas l'option 2, 3 et 4 sans notre accord ![/#f]
Patiente jusqu'à l'apparition de ce message :
"*** Analyse Termine le ..... ***"
Appuie sur une touche comme demandé. Le Bloc-notes va s'ouvrir. Poste-nous son contenu de cette manière :

-> Edition / Sélectionner tout
-> Edition / Copier
-> Clique-Droit / Coller dans ta réponse


NOTE : Le rapport se trouve également ici : C:\fixnavi.txt
6 Janvier 2008 14:09:04

Search Navipromo version 3.3.8 commencé le 06/01/2008 à 14:02:15,40

!!! Attention,ce rapport peut indiquer des fichiers/programmes légitimes!!!
!!! Postez ce rapport sur le forum pour le faire analyser !!!
!!! Ne lancez pas la partie désinfection sans l'avis d'un spécialiste !!!

Outil exécuté depuis C:\Program Files\navilog1
Mise à jour le 11.12.2007 à 18h00 par IL-MAFIOSO


Microsoft Windows XP [version 5.1.2600]
Internet Explorer : 7.0.5730.13
Système de fichiers : NTFS

Executé en mode normal

*** Recherche Programmes installés ***




*** Recherche dossiers dans C:\WINDOWS ***



*** Recherche dossiers dans C:\Program Files ***



*** Recherche dossiers dans C:\DOCUME~1\ALLUSE~1\APPLIC~1 ***




*** Recherche dossiers dans "C:\Documents and Settings\Adrien Blondet\application data" ***


*** Recherche dossiers dans C:\DOCUME~1\ALLUSE~1\MENUDM~1\PROGRA~1 ***


*** Recherche avec Catchme-rootkit/stealth malware detector par gmer ***
pour + d'infos : http://www.gmer.net

Fichier(s) caché(s) :

C:\Documents and Settings\Adrien\Local Settings\Application Data\ehrclvgoyj.dat
C:\Documents and Settings\Adrien\Local Settings\Application Data\ehrclvgoyj.exe
C:\Documents and Settings\Adrien\Local Settings\Application Data\ehrclvgoyj_nav.dat
C:\Documents and Settings\Adrien \Local Settings\Application Data\ehrclvgoyj_navps.dat



*** Recherche avec GenericNaviSearch ***
!!! Tous ces résultats peuvent révéler des fichiers légitimes !!!
!!! A vérifier impérativement avant toute suppression manuelle !!!

* Recherche dans C:\WINDOWS\system32 *

* Recherche dans "C:\Documents and Settings\Adrien Blondet\local settings\application data" *

Fichiers trouvés :

ehrclvgoyj.exe trouvé !



*** Recherche fichiers ***


C:\WINDOWS\system32\nvs2.inf trouvé !


*** Recherche clés spécifiques dans le Registre ***

HKEY_CURRENT_USER\Software\Lanconfig trouvé !

*** Module de Recherche complémentaire ***
(Recherche fichiers spécifiques)

1)Recherche nouveaux fichiers Instant Access :


2)Recherche Heuristique :

* Dans C:\WINDOWS\system32 :


* Dans "C:\Documents and Settings\Adrien\local settings\application data" :


3)Recherche Certificats :

Certificat Egroup trouvé !

4)Recherche fichiers connus :



*** Analyse terminée le 06/01/2008 à 14:06:19,95 ***
6 Janvier 2008 14:12:00

Euh lannecien c mon frère ! Donc le rapport est bon ;) 
a b 8 Sécurité
6 Janvier 2008 14:14:15

Quoi ? :heink: 

Double clique sur le raccourci de Navilog1 présent sur ton Bureau.
Suis les instructions. Choisis ensuite l'option 2 puis valide.
Laisse toi guider et réponds aux questions éventuelles.

L'utilitaire va t'informer qu'il va redémarrer l'ordinateur.
[#ff0000]**Ferme toutes les fenêtres ouvertes et enregistre tes documents personnels ouverts**[/#f]
Appuie maintenant sur une touche, comme demandé.
(si ton PC ne redémarre pas automatiquement, fais-le manuellement)

Patiente jusqu'à l'apparition de ce message :
"*** Nettoyage Termine le ..... ***"

Le Bloc-notes va s'ouvrir.
Sauvegarde le rapport de manière à le retrouver.
Referme le Bloc-notes. Ton bureau va maintenant réapparaître.

NOTE : Si ton Bureau ne réapparait pas, appuie simultanément sur Ctrl+Alt+Suppr pour ouvrir le Gestionnaire des tâches.
Rends-toi sur l'onglet "Processus". Clique en haut à gauche sur Fichier et choisis "Exécuter..."
Tape explorer puis valide.

Poste le rapport sauvegardé auparavant (C:\cleannavi.txt)
Ainsi qu'un nouveau rapport Hijackthis.
6 Janvier 2008 14:27:54

Clean Navipromo version 3.3.8 commencé le 06/01/2008 à 14:22:17,75

Outil exécuté depuis C:\Program Files\navilog1
Mise à jour le 11.12.2007 à 18h00 par IL-MAFIOSO


Microsoft Windows XP [version 5.1.2600]
Internet Explorer : 7.0.5730.13
Système de fichiers : NTFS

Mode suppression automatique


*** Creation backups fichiers trouvés par Catchme ***

Copie vers "C:\Program Files\navilog1\Backupnavi"

Copie C:\Documents and Settings\Adrien Blondet\Local Settings\Application Data\ehrclvgoyj.dat réalisée avec succès !
Copie C:\Documents and Settings\Adrien Blondet\Local Settings\Application Data\ehrclvgoyj.exe réalisée avec succès !
Copie C:\Documents and Settings\Adrien Blondet\Local Settings\Application Data\ehrclvgoyj_nav.dat réalisée avec succès !
Copie C:\Documents and Settings\Adrien Blondet\Local Settings\Application Data\ehrclvgoyj_navps.dat réalisée avec succès !

*** Suppression des fichiers trouvés avec Catchme ***

C:\Documents and Settings\Adrien Blondet\Local Settings\Application Data\ehrclvgoyj.dat supprimé !
C:\Documents and Settings\Adrien Blondet\Local Settings\Application Data\ehrclvgoyj.exe supprimé !
C:\Documents and Settings\Adrien Blondet\Local Settings\Application Data\ehrclvgoyj_nav.dat supprimé !
C:\Documents and Settings\Adrien Blondet\Local Settings\Application Data\ehrclvgoyj_navps.dat supprimé !

** 2ème passage avec résultats Catchme **

* Dans C:\WINDOWS\system32 *


C:\WINDOWS\prefetch\ehrclvgoyj*.pf trouvé !
Copie C:\WINDOWS\prefetch\ehrclvgoyj*.pf réalisée avec succès !
C:\WINDOWS\prefetch\ehrclvgoyj*.pf supprimé !

* Dans "C:\Documents and Settings\Adrien Blondet\local settings\application data" *


*** Suppression avec sauvegardes résultats GenericNaviSearch ***

* Suppression dans C:\WINDOWS\System32 *


* Suppression dans "C:\Documents and Settings\Adrien Blondet\local settings\application data" *



*** Suppression dossiers dans C:\WINDOWS ***


*** Suppression dossiers dans C:\Program Files ***


*** Suppression dossiers dans C:\DOCUME~1\ALLUSE~1\APPLIC~1 ***


*** Suppression dossiers dans "C:\Documents and Settings\Adrien Blondet\application data" ***


*** Suppression dossiers dans C:\DOCUME~1\ALLUSE~1\MENUDM~1\PROGRA~1 ***



*** Suppression fichiers ***

C:\WINDOWS\system32\nvs2.inf supprimé !

*** Suppression fichiers temporaires ***

Nettoyage contenu C:\WINDOWS\Temp effectué !
Nettoyage contenu C:\Documents and Settings\Adrien Blondet\local settings\Temp effectué !

*** Traitement Recherche complémentaire ***
(Recherche fichiers spécifiques)

1)Suppression avec sauvegardes nouveaux fichiers Instant Access :

2)Recherche, création sauvegardes et suppression Heuristique :


* Dans C:\WINDOWS\system32 *


* Dans "C:\Documents and Settings\Adrien Blondet\local settings\application data" *


*** Sauvegarde du Registre vers dossier Backupnavi ***

sauvegarde du Registre réalisée avec succès !

*** Nettoyage Registre ***

Nettoyage Registre Ok


*** Certificats ***

Certificat Egroup supprimé !

*** Nettoyage terminé le 06/01/2008 à 14:25:49,82 ***

6 Janvier 2008 14:28:34

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 14:28:08, on 06/01/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16574)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\mqsvc.exe
C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe
C:\WINDOWS\system32\mqtgsvc.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\NOTEPAD.EXE
C:\WINDOWS\ehome\ehtray.exe
C:\Program Files\hpq\HP Wireless Assistant\HP Wireless Assistant.exe
C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\WINDOWS\eHome\ehmsas.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\HP\QuickPlay\QPService.exe
C:\Program Files\Hp\HP Software Update\HPWuSchd2.exe
C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\Program Files\Neuf\Kit\WiFi\9wifi.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Hewlett-Packard\HP Pavilion Webcam\HPWebcam.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
C:\Program Files\SAGEM WiFi manager\WLANUTL.exe
C:\Program Files\HP\Digital Imaging\bin\hpqimzone.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WLLoginProxy.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.fr/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O4 - HKLM\..\Run: [ehTray] C:\WINDOWS\ehome\ehtray.exe
O4 - HKLM\..\Run: [hpWirelessAssistant] C:\Program Files\hpq\HP Wireless Assistant\HP Wireless Assistant.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet /nodetect
O4 - HKLM\..\Run: [MsmqIntCert] regsvr32 /s mqrt.dll
O4 - HKLM\..\Run: [High Definition Audio Property Page Shortcut] CHDAudPropShortcut.exe
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [QPService] "C:\Program Files\HP\QuickPlay\QPService.exe"
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\Hp\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [QlbCtrl] %ProgramFiles%\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe /Start
O4 - HKLM\..\Run: [Cpqset] C:\Program Files\Hewlett-Packard\Default Settings\cpqset.exe
O4 - HKLM\..\Run: [RecGuard] C:\Windows\SMINST\RecGuard.exe
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [Autoconfigurateur WiFi Neuf] "C:\Program Files\Neuf\Kit\WiFi\9wifi.exe"
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Démarrage rapide de HP Photosmart Premier.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqthb08.exe
O4 - Global Startup: HP Pavilion Webcam Tray Icon.lnk = C:\Program Files\Hewlett-Packard\HP Pavilion Webcam\HPWebcam.exe
O4 - Global Startup: Lancement rapide d'Adobe Reader.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Utilitaire réseau pour SAGEM Wi-Fi 11g USB adapter.lnk = ?
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&loca...
O23 - Service: AddFiltr - Hewlett-Packard Development Company, L.P. - C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\AddFiltr.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: hpqwmiex - Hewlett-Packard Development Company, L.P. - C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - c:\Program Files\Fichiers communs\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe

--
End of file - 8032 bytes
6 Janvier 2008 16:50:20



AntiVir PersonalEdition Classic
Report file date: dimanche 6 janvier 2008 16:06

Scanning for 1000802 virus strains and unwanted programs.

Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Username: SYSTEM
Computer name: PC257717060168

Version information:
BUILD.DAT : 270 15603 Bytes 19/09/2007 13:32:00
AVSCAN.EXE : 7.0.6.1 290856 Bytes 23/08/2007 13:16:29
AVSCAN.DLL : 7.0.6.0 49192 Bytes 16/08/2007 12:23:51
LUKE.DLL : 7.0.5.3 147496 Bytes 14/08/2007 15:32:47
LUKERES.DLL : 7.0.6.1 10280 Bytes 21/08/2007 12:35:20
ANTIVIR0.VDF : 6.40.0.0 11030528 Bytes 18/07/2007 15:05:35
ANTIVIR1.VDF : 7.0.1.95 3367424 Bytes 14/12/2007 15:05:35
ANTIVIR2.VDF : 7.0.1.170 311296 Bytes 28/12/2007 15:05:35
ANTIVIR3.VDF : 7.0.1.194 93696 Bytes 04/01/2008 15:05:35
AVEWIN32.DLL : 7.6.0.46 3084800 Bytes 06/01/2008 15:05:36
AVWINLL.DLL : 1.0.0.7 14376 Bytes 26/02/2007 10:36:26
AVPREF.DLL : 7.0.2.2 25640 Bytes 18/07/2007 07:39:17
AVREP.DLL : 7.0.0.1 155688 Bytes 16/04/2007 13:16:24
AVPACK32.DLL : 7.6.0.2 360488 Bytes 06/01/2008 15:05:36
AVREG.DLL : 7.0.1.6 30760 Bytes 18/07/2007 07:17:06
AVARKT.DLL : 1.0.0.20 278568 Bytes 28/08/2007 12:26:33
AVEVTLOG.DLL : 7.0.0.20 86056 Bytes 18/07/2007 07:10:18
NETNT.DLL : 7.0.0.0 7720 Bytes 08/03/2007 11:09:42
RCIMAGE.DLL : 7.0.1.30 2342952 Bytes 07/08/2007 12:38:13
RCTEXT.DLL : 7.0.62.0 86056 Bytes 21/08/2007 12:50:37
SQLITE3.DLL : 3.3.17.1 339968 Bytes 23/07/2007 09:37:21

Configuration settings for the scan:
Jobname..........................: Complete system scan
Configuration file...............: c:\program files\avira\antivir personaledition classic\sysscan.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: off
Scan boot sector.................: on
Boot sectors.....................: D:,
Scan memory......................: on
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: off
Scan all files...................: Intelligent file selection
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: medium

Start of the scan: dimanche 6 janvier 2008 16:06

The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'WLLoginProxy.exe' - '1' Module(s) have been scanned
Scan process 'iexplore.exe' - '1' Module(s) have been scanned
Scan process 'ehmsas.exe' - '1' Module(s) have been scanned
Scan process 'alg.exe' - '1' Module(s) have been scanned
Scan process 'wmiprvse.exe' - '1' Module(s) have been scanned
Scan process 'dllhost.exe' - '1' Module(s) have been scanned
Scan process 'mqtgsvc.exe' - '1' Module(s) have been scanned
Scan process 'hpqwmiex.exe' - '1' Module(s) have been scanned
Scan process 'mqsvc.exe' - '1' Module(s) have been scanned
Scan process 'mcrdsvc.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'nvsvc32.exe' - '1' Module(s) have been scanned
Scan process 'LSSrvc.exe' - '1' Module(s) have been scanned
Scan process 'ehSched.exe' - '1' Module(s) have been scanned
Scan process 'ehrecvr.exe' - '1' Module(s) have been scanned
Scan process 'guard.exe' - '1' Module(s) have been scanned
Scan process 'msdtc.exe' - '1' Module(s) have been scanned
Scan process 'hpqimzone.exe' - '1' Module(s) have been scanned
Scan process 'WLANUTL.EXE' - '1' Module(s) have been scanned
Scan process 'HPWebcam.exe' - '1' Module(s) have been scanned
Scan process 'ctfmon.exe' - '1' Module(s) have been scanned
Scan process 'avgas.exe' - '1' Module(s) have been scanned
Scan process '9wifi.exe' - '1' Module(s) have been scanned
Scan process 'QLBCTRL.exe' - '1' Module(s) have been scanned
Scan process 'hpwuSchd2.exe' - '1' Module(s) have been scanned
Scan process 'QPService.exe' - '1' Module(s) have been scanned
Scan process 'SynTPEnh.exe' - '1' Module(s) have been scanned
Scan process 'rundll32.exe' - '1' Module(s) have been scanned
Scan process 'jusched.exe' - '1' Module(s) have been scanned
Scan process 'HP Wireless Assistant.exe' - '1' Module(s) have been scanned
Scan process 'ehtray.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'spoolsv.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
49 processes with 49 modules were scanned

Start scanning boot sectors:
Boot sector 'C:\'
[NOTE] No virus was found!
Boot sector 'D:\'
[NOTE] No virus was found!

Starting to scan the registry.
The registry was scanned ( '39' files ).


Starting the file scan:

Begin scan in 'C:\'
C:\hiberfil.sys
[WARNING] The file could not be opened!
C:\pagefile.sys
[WARNING] The file could not be opened!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP63\A0013180.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f64e.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP63\A0013189.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f651.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP63\A0013204.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f655.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP63\A0013218.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f65b.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP64\A0013226.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f660.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP64\A0013255.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f661.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP64\A0013267.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9752.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP64\A0013281.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f663.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP65\A0013289.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f662.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP65\A0013300.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9754.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP65\A0013313.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f665.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP65\A0013327.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9756.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP65\A0013344.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f664.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP65\A0013358.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9755.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP65\A0013380.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f667.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP65\A0013395.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9758.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP65\A0013423.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f666.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP65\A0013435.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9757.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP66\A0013443.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f669.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP66\A0013454.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce975a.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP66\A0013471.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f668.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP66\A0013500.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9759.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP66\A0013525.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f66b.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP66\A0013542.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce975c.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP66\A0013560.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f66a.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP67\A0013571.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f66d.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP67\A0013581.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce975e.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP67\A0013598.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f66c.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP67\A0013613.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce975d.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP67\A0013627.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f66e.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP67\A0013668.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f66f.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP68\A0013677.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce975f.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP68\A0013705.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9740.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP68\A0013718.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f671.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP69\A0013813.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f673.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP69\A0013825.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9744.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP69\A0013845.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f674.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP69\A0013860.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9745.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP70\A0013870.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f675.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP70\A0013881.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f676.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP70\A0013916.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f677.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP71\A0013982.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f67a.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP71\A0014149.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f681.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP75\A0014214.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f688.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP75\A0014242.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce97b9.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP76\A0014417.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f691.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP76\A0014434.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f692.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP76\A0014469.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce97a3.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP76\A0014485.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f693.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP76\A0014498.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce97a4.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP76\A0014511.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f695.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP77\A0014519.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce97a6.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP77\A0014530.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f697.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP77\A0014543.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f696.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP77\A0014559.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce97a7.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP77\A0014572.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f698.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP77\A0015572.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce97a8.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP78\A0015586.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce97a9.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP78\A0015604.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f69a.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP78\A0015620.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f699.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP78\A0015632.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce97aa.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP78\A0015661.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce97ab.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP78\A0015678.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f69c.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP79\A0015690.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f69b.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP79\A0015700.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce97ad.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP79\A0015715.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f69e.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP79\A0015740.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f69d.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP79\A0015753.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce97ae.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP79\A0015767.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f69f.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP80\A0015776.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9790.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP80\A0015786.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6a1.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP80\A0015800.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6a0.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP81\A0015806.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9792.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP81\A0015817.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6a3.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP81\A0015828.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9794.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP81\A0015842.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6a2.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP81\A0015855.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9793.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP82\A0015874.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6a4.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP82\A0015889.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9795.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP83\A0015896.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6a5.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP83\A0015929.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6a6.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP84\A0016017.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6aa.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP84\A0016027.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce979b.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP84\A0016071.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6ab.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP85\A0016090.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6ad.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP85\A0016105.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce979e.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP85\A0016137.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6af.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP85\A0016167.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6ae.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP85\A0016190.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce979f.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP85\A0016207.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9780.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP85\A0016227.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6b1.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP85\A0016238.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9782.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP86\A0016254.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6b3.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP86\A0016268.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9784.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP86\A0016280.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6b2.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP86\A0016307.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9783.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP86\A0016340.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6b5.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP86\A0016354.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9786.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP86\A0016372.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6b7.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP86\A0016412.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6b4.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP87\A0016463.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6b8.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP87\A0016525.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6ba.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP87\A0016538.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce978b.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP87\A0016552.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6bb.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP88\A0016560.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6bc.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP88\A0016571.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce978d.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP89\A0016594.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6be.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP89\A0016606.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce978f.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP89\A0016620.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9791.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP89\A0016632.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6bf.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP89\A0016644.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce97f0.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP89\A0016659.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6c1.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP89\A0016672.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6c0.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP89\A0016686.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce97f1.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP89\A0016697.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6c2.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP89\A0016711.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce97f2.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP90\A0016722.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6c3.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP90\A0016735.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce97f4.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP90\A0016750.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6c5.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP90\A0016767.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6c4.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP90\A0016779.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce97f5.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP90\A0016803.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce97f6.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP91\A0016812.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6c7.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP91\A0016834.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce97f8.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP91\A0016851.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6c9.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP91\A0016863.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6c8.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP91\A0016876.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce97f9.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP91\A0016890.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6ca.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP91\A0016906.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce97fa.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP92\A0016938.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6cb.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP92\A0016951.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6cc.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP93\A0016960.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6cd.qua'!
C:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP93\A0017144.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f6d3.qua'!
Begin scan in 'D:\' <HP_RECOVERY>
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP66\A0013445.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f898.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP66\A0013456.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce99a9.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP66\A0013473.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f899.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP66\A0013503.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce99aa.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP66\A0013528.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f89b.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP66\A0013544.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce99ac.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP66\A0013563.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f89a.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP67\A0013573.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce99ab.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP67\A0013584.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f89c.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP67\A0013600.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce99ad.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP67\A0013615.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f89d.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP67\A0013630.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce99ae.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP67\A0013670.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f89f.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP68\A0013679.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9990.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP68\A0013707.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f89e.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP68\A0013720.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce99af.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP69\A0013815.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f880.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP69\A0013828.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce99b1.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP69\A0013847.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f882.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP69\A0013862.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8a1.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP70\A0013872.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9992.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP70\A0013883.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8a3.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP70\A0013918.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9994.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP71\A0013984.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce99b3.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP71\A0014151.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f884.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP75\A0014216.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce99b5.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP75\A0014244.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f886.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP76\A0014420.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8a5.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP76\A0014437.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9996.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP76\A0014472.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8a7.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP76\A0014488.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9998.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP76\A0014500.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8a0.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP76\A0014513.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9991.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP77\A0014521.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8a2.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP77\A0014532.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9993.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP77\A0014545.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8a9.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP77\A0014561.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce999a.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP77\A0014574.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8ab.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP77\A0015575.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce999c.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP78\A0015588.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8ad.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP78\A0015606.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8a4.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP78\A0015622.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9995.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP78\A0015635.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8a6.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP78\A0015663.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9997.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP78\A0015681.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce999e.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP79\A0015692.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8af.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP79\A0015702.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9980.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP79\A0015718.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8b1.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP79\A0015742.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8a8.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP79\A0015756.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9999.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP79\A0015769.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8aa.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP80\A0015778.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce999b.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP80\A0015789.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9982.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP80\A0015802.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8b3.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP81\A0015808.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9984.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP81\A0015819.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8b5.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP81\A0015832.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8ac.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP81\A0015845.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce999d.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP81\A0015858.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8ae.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP82\A0015876.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce999f.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP82\A0015891.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f890.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP83\A0015898.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9986.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP83\A0015931.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8b7.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP84\A0016019.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce9988.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP84\A0016029.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8b9.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP84\A0016073.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce99a1.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP85\A0016092.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f892.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP85\A0016108.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce99a3.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP85\A0016140.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f894.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP85\A0016170.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce998a.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP85\A0016192.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8bb.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP85\A0016209.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce998c.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP85\A0016230.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8bd.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP85\A0016241.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce99a5.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP86\A0016256.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f896.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP86\A0016270.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce99a7.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP86\A0016282.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce99b7.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP86\A0016309.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce998e.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP86\A0016343.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8bf.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP86\A0016357.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce99f0.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP86\A0016375.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8c1.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP86\A0016414.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f888.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP87\A0016465.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce99b9.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP87\A0016527.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f88a.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP87\A0016541.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce99bb.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP87\A0016554.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce99f2.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP88\A0016562.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8c3.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP88\A0016573.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce99f4.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP89\A0016596.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8c5.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP89\A0016608.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce99f6.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP89\A0016622.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f88c.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP89\A0016634.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce99bd.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP89\A0016646.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f88e.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP89\A0016661.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce99bf.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP89\A0016675.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8c7.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP89\A0016688.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46ce99f8.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP89\A0016700.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8c9.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP89\A0016714.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46cea1b0.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP90\A0016724.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8b0.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP90\A0016738.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46cea1b1.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP90\A0016753.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8b2.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP90\A0016770.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46cea1b3.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP90\A0016782.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46cea1b2.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP90\A0016806.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46cea1b4.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP91\A0016814.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46cea1b6.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP91\A0016836.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46cea1b8.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP91\A0016854.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8b4.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP91\A0016866.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46cea1b5.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP91\A0016879.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8b6.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP91\A0016893.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46cea1b7.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP91\A0016909.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8b8.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP92\A0016940.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46cea1ba.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP92\A0016954.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46cea1bc.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP93\A0016962.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46cea1be.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP93\A0017146.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46cea1c0.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP63\A0013182.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46cea1b9.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP63\A0013192.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '47b0f8ba.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-213EF381532E}\RP63\A0013207.inf
[DETECTION] Contains detection pattern of the VBS script virus VBS/IETitle.A
[INFO] The file was moved to '46cea1bb.qua'!
D:\System Volume Information\_restore{206D5C9A-566B-437B-A762-21
a b 8 Sécurité
6 Janvier 2008 17:25:39

Reposte un rapport Hijackthis.
Tom's guide dans le monde
  • Allemagne
  • Italie
  • Irlande
  • Royaume Uni
  • Etats Unis
Suivre Tom's Guide
Inscrivez-vous à la Newsletter
  • ajouter à twitter
  • ajouter à facebook
  • ajouter un flux RSS