|
Plagegeister aller Art und deren Bekämpfung: Windows-7-PC langsam, Avira findet Adware ohne EndeWindows 7 Wenn Du nicht sicher bist, ob Du dir Malware oder Trojaner eingefangen hast, erstelle hier ein Thema. Ein Experte wird sich mit weiteren Anweisungen melden und Dir helfen die Malware zu entfernen oder Unerwünschte Software zu deinstallieren bzw. zu löschen. Bitte schildere dein Problem so genau wie möglich. Sollte es ein Trojaner oder Viren Problem sein wird ein Experte Dir bei der Beseitigug der Infektion helfen. |
18.04.2017, 23:40 | #1 |
| Windows-7-PC langsam, Avira findet Adware ohne Ende Hallo zusammen, mein PC (mit Windows 7 64-bit) ist im Laufe der letzten Monate sehr langsam geworden. So langsam, dass ich heute aus Verdacht mal Antivirus-Scans hab laufen lassen. Als erstes Malwarebytes, ist auch direkt fündig geworden. Hier das Malwarebytes-Log (kopiert aus einer .xml-Datei): Code:
ATTFilter <?xml version="1.0" encoding="UTF-16"?> -<mbam-log> -<header> <date>2017/04/18 13:58:16 +0100</date> <logfile>mbam-log-2017-04-18 (13-58-15).xml</logfile> <isadmin>yes</isadmin> </header> -<engine> <version>2.00.4.1028</version> <malware-database>v2017.04.18.03</malware-database> <rootkit-database>v2017.04.02.01</rootkit-database> <license>free</license> <file-protection>disabled</file-protection> <web-protection>disabled</web-protection> <self-protection>disabled</self-protection> </engine> -<system> <osversion>Windows 7 Service Pack 1</osversion> <arch>x64</arch> <username>Philipp</username> <filesys>NTFS</filesys> </system> -<summary> <type>threat</type> <result>completed</result> <objects>289202</objects> <time>2105</time> <processes>0</processes> <modules>0</modules> <keys>9</keys> <values>1</values> <datas>0</datas> <folders>9</folders> <files>5</files> <sectors>0</sectors> </summary> -<options> <memory>enabled</memory> <startup>enabled</startup> <filesystem>enabled</filesystem> <archives>enabled</archives> <rootkits>enabled</rootkits> <deeprootkit>disabled</deeprootkit> <heuristics>enabled</heuristics> <pup>warn</pup> <pum>enabled</pum> </options> -<items> -<key> <path>HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\ICQ</path> <vendor>PUP.Optional.Sputnik</vendor> <action>delete-on-reboot</action> <hash>8cbde00c4563989e6d13a323a55b5ba5</hash> </key> -<key> <path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Express Files Updater</path> <vendor>PUP.Optional.ExpressFiles</vendor> <action>delete-on-reboot</action> <hash>0643bf2d7038af87fbfb90acf70955ab</hash> </key> -<key> <path>HKLM\SOFTWARE\WOW6432NODE\ExpressFiles</path> <vendor>PUP.Optional.ExpressFiles</vendor> <action>success</action> <hash>c485b13bfaae67cfcd0158126799649c</hash> </key> -<key> <path>HKLM\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\mmiopbgcekanlhpjkonogoljpfmhpkhf</path> <vendor>PUP.Optional.Reviser</vendor> <action>success</action> <hash>d574b735426657df025bc84810f0728e</hash> </key> -<key> <path>HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\ExpressFiles</path> <vendor>PUP.Optional.ExpressFiles</vendor> <action>delete-on-reboot</action> <hash>d871905cbfe96bcb72437deb33cd2bd5</hash> </key> -<key> <path>HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\Mail.Ru</path> <vendor>PUP.Optional.MailRu</vendor> <action>delete-on-reboot</action> <hash>54f578748e1aed491873c7e2a45df10f</hash> </key> -<key> <path>HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\APPDATALOW\SOFTWARE\Mail.Ru</path> <vendor>PUP.Optional.MailRu</vendor> <action>delete-on-reboot</action> <hash>0742c22a792f64d20061f5c232cfc13f</hash> </key> -<key> <path>HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\ESUPPORT.COM\NTFSUndelete</path> <vendor>PUP.Optional.eSupportNTFSUndelete</vendor> <action>delete-on-reboot</action> <hash>a8a1c527b4f490a6675c2b75a35dff01</hash> </key> -<key> <path>HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{3c471948-f874-49f5-b338-4f214a2ee0b1}</path> <vendor>PUP.Optional.ConduitTB.Gen</vendor> <action>success</action> <hash>7acfdb112e7aaf8728178f7aba48cd33</hash> </key> -<value> <path>HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MOZILLA\FIREFOX\EXTENSIONS</path> <valuename>{9309FA47-1B48-4768-AFA4-9E0556F5DC81}</valuename> <vendor>PUP.Optional.AdLyrics</vendor> <action>delete-on-reboot</action> <valuedata>C:\Program Files (x86)\LyricsPal\128.xpi</valuedata> <hash>5dec1ad2505841f5bc22f897b15103fd</hash> </value> -<folder> <path>C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\9s0hc6sl.default-1430862582424\extensions\youtubeunblocker__web@unblocker.yt\resources\unblocker-web\data</path> <vendor>PUP.Optional.YoutubeUnblocker</vendor> <action>none</action> <hash>5ced8d5fbdeb42f4afeef02f7d85a25e</hash> </folder> -<folder> <path>C:\Program Files (x86)\Conduit\Community Alerts</path> <vendor>PUP.Optional.ConduitTB.Gen</vendor> <action>success</action> <hash>7acfdb112e7aaf8728178f7aba48cd33</hash> </folder> -<folder> <path>C:\Users\Philipp\AppData\Local\Conduit</path> <vendor>PUP.Optional.Conduit</vendor> <action>success</action> <hash>61e8509c9612a78f014c0d1171918878</hash> </folder> -<folder> <path>C:\Users\Philipp\AppData\LocalLow\Conduit</path> <vendor>PUP.Optional.Conduit</vendor> <action>success</action> <hash>014898545058270f430ba07eb84ac53b</hash> </folder> -<folder> <path>C:\Users\Philipp\AppData\LocalLow\Conduit\Community Alerts</path> <vendor>PUP.Optional.Conduit</vendor> <action>success</action> <hash>014898545058270f430ba07eb84ac53b</hash> </folder> -<folder> <path>C:\Users\Philipp\AppData\LocalLow\Conduit\Community Alerts\Log</path> <vendor>PUP.Optional.Conduit</vendor> <action>success</action> <hash>014898545058270f430ba07eb84ac53b</hash> </folder> -<folder> <path>C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\9s0hc6sl.default-1430862582424\extensions\youtubeunblocker__web@unblocker.yt</path> <vendor>PUP.Optional.YoutubeUnblocker</vendor> <action>success</action> <hash>5ced8d5fbdeb42f4afeef02f7d85a25e</hash> </folder> -<folder> <path>C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\9s0hc6sl.default-1430862582424\extensions\youtubeunblocker__web@unblocker.yt\resources</path> <vendor>PUP.Optional.YoutubeUnblocker</vendor> <action>success</action> <hash>5ced8d5fbdeb42f4afeef02f7d85a25e</hash> </folder> -<folder> <path>C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\9s0hc6sl.default-1430862582424\extensions\youtubeunblocker__web@unblocker.yt\resources\unblocker-web</path> <vendor>PUP.Optional.YoutubeUnblocker</vendor> <action>success</action> <hash>5ced8d5fbdeb42f4afeef02f7d85a25e</hash> </folder> -<file> <path>C:\Users\Philipp\Documents\Downloads\11CT2776682_BrotherSoft_Extreme.exe</path> <vendor>PUP.Optional.Conduit</vendor> <action>success</action> <hash>68e16983693feb4b1b78d50812ef37c9</hash> </file> -<file> <path>C:\Users\Philipp\AppData\Roaming\ICQM\icqsetup.exe</path> <vendor>PUP.Optional.Sputnik</vendor> <action>success</action> <hash>8cbde00c4563989e6d13a323a55b5ba5</hash> </file> -<file> <path>C:\Users\Philipp\AppData\Roaming\ICQM\ICQ\dll\mailrusputnik.exe</path> <vendor>PUP.Optional.Sputnik</vendor> <action>success</action> <hash>7dccdf0dd9cf68ce235df3d3748ce917</hash> </file> -<file> <path>C:\Windows\System32\Tasks\Express Files Updater</path> <vendor>PUP.Optional.ExpressFiles</vendor> <action>success</action> <hash>f851c22a495f88ae0979a59a43bde11f</hash> </file> -<file> <path>C:\Program Files (x86)\Conduit\Community Alerts\Alert.dll</path> <vendor>PUP.Optional.ConduitTB.Gen</vendor> <action>success</action> <hash>7acfdb112e7aaf8728178f7aba48cd33</hash> </file> </items> </mbam-log> Habe versucht, die Funde in Quarantäne zu verschieben, wobei dann allerdings Avira gemeldet hat, dass es einen Eingriff in die Registry verhindert hat. Ich war dann deswegen nicht sicher, ob tatsächlich alles in der Quarantäne gelandet ist, was da rein sollte, also hab ich auch noch einen Avira-Scan laufen lassen. Ich lasse routinemäßig immer wieder einen Schnellsuchlauf machen, hat noch nie angeschlagen, aber jetzt beim Vollscan direkt mal 1404 Treffer, davon allerdings kein einziger als "suspicious" eingestuft. 98 Dateien wurden in die Quarantäne verschoben. Das Logfile ist deutlich zu lang zum Kopieren, daher als Anhang hochgeladen. Was haltet ihr von alldem? Liebe Grüße, - Melione |
19.04.2017, 12:27 | #2 |
/// Winkelfunktion /// TB-Süch-Tiger™ | Windows-7-PC langsam, Avira findet Adware ohne Ende Log bitte NICHT im XML Format posten, das ist fast unlesbar, MBAM bietet extra den Export als TXT an. Auerßdem sind alle Logs vollständig in CODE-Tags zu posten.
__________________Lesestoff: Posten in CODE-Tags Die Logfiles anzuhängen oder sogar vorher in ein ZIP, RAR oder 7Z-Archiv zu packen erschwert mir massiv die Arbeit. Auch wenn die Logs für einen Beitrag zu groß sein sollten, bitte ich dich die Logs direkt und notfalls über mehrere Beiträge verteilt zu posten. Um die Logfiles in eine CODE-Box zu stellen gehe so vor:
__________________ |
19.04.2017, 13:19 | #3 |
| Windows-7-PC langsam, Avira findet Adware ohne Ende Die Forenrichtlinien sollten mal geupdatet werden; da steht drin, wenn Log zu lang für einen Post, dann als Anhang dranmachen.
__________________Malwarebytes: Code:
ATTFilter Malwarebytes Anti-Malware www.malwarebytes.org Suchlauf Datum: 18.04.2017 Suchlauf-Zeit: 13:58:16 Logdatei: mbam-log-2017-04-18 (13-58-15).txt Administrator: Ja Version: 2.00.4.1028 Malware Datenbank: v2017.04.18.03 Rootkit Datenbank: v2017.04.02.01 Lizenz: Kostenlos Malware Schutz: Deaktiviert Bösartiger Webseiten Schutz: Deaktiviert Selbstschutz: Deaktiviert Betriebssystem: Windows 7 Service Pack 1 CPU: x64 Dateisystem: NTFS Benutzer: Philipp Suchlauf-Art: Bedrohungs-Suchlauf Ergebnis: Abgeschlossen Durchsuchte Objekte: 289202 Verstrichene Zeit: 35 Min, 5 Sek Speicher: Aktiviert Autostart: Aktiviert Dateisystem: Aktiviert Archive: Aktiviert Rootkits: Aktiviert Heuristik: Aktiviert PUP: Warnen PUM: Aktiviert Prozesse: 0 (Keine schädliche Elemente erkannt) Module: 0 (Keine schädliche Elemente erkannt) Registrierungsschlüssel: 9 PUP.Optional.Sputnik, HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\ICQ, Löschen bei Neustart, [8cbde00c4563989e6d13a323a55b5ba5], PUP.Optional.ExpressFiles, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Express Files Updater, Löschen bei Neustart, [0643bf2d7038af87fbfb90acf70955ab], PUP.Optional.ExpressFiles, HKLM\SOFTWARE\WOW6432NODE\ExpressFiles, In Quarantäne, [c485b13bfaae67cfcd0158126799649c], PUP.Optional.Reviser, HKLM\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\mmiopbgcekanlhpjkonogoljpfmhpkhf, In Quarantäne, [d574b735426657df025bc84810f0728e], PUP.Optional.ExpressFiles, HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\ExpressFiles, Löschen bei Neustart, [d871905cbfe96bcb72437deb33cd2bd5], PUP.Optional.MailRu, HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\Mail.Ru, Löschen bei Neustart, [54f578748e1aed491873c7e2a45df10f], PUP.Optional.MailRu, HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\APPDATALOW\SOFTWARE\Mail.Ru, Löschen bei Neustart, [0742c22a792f64d20061f5c232cfc13f], PUP.Optional.eSupportNTFSUndelete, HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\ESUPPORT.COM\NTFSUndelete, Löschen bei Neustart, [a8a1c527b4f490a6675c2b75a35dff01], PUP.Optional.ConduitTB.Gen, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{3c471948-f874-49f5-b338-4f214a2ee0b1}, In Quarantäne, [7acfdb112e7aaf8728178f7aba48cd33], Registrierungswerte: 1 PUP.Optional.AdLyrics, HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MOZILLA\FIREFOX\EXTENSIONS|{9309FA47-1B48-4768-AFA4-9E0556F5DC81}, C:\Program Files (x86)\LyricsPal\128.xpi, Löschen bei Neustart, [5dec1ad2505841f5bc22f897b15103fd] Registrierungsdaten: 0 (Keine schädliche Elemente erkannt) Ordner: 9 PUP.Optional.YoutubeUnblocker, C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\9s0hc6sl.default-1430862582424\extensions\youtubeunblocker__web@unblocker.yt\resources\unblocker-web\data, Keine Aktion durch Benutzer, [5ced8d5fbdeb42f4afeef02f7d85a25e], PUP.Optional.ConduitTB.Gen, C:\Program Files (x86)\Conduit\Community Alerts, In Quarantäne, [7acfdb112e7aaf8728178f7aba48cd33], PUP.Optional.Conduit, C:\Users\Philipp\AppData\Local\Conduit, In Quarantäne, [61e8509c9612a78f014c0d1171918878], PUP.Optional.Conduit, C:\Users\Philipp\AppData\LocalLow\Conduit, In Quarantäne, [014898545058270f430ba07eb84ac53b], PUP.Optional.Conduit, C:\Users\Philipp\AppData\LocalLow\Conduit\Community Alerts, In Quarantäne, [014898545058270f430ba07eb84ac53b], PUP.Optional.Conduit, C:\Users\Philipp\AppData\LocalLow\Conduit\Community Alerts\Log, In Quarantäne, [014898545058270f430ba07eb84ac53b], PUP.Optional.YoutubeUnblocker, C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\9s0hc6sl.default-1430862582424\extensions\youtubeunblocker__web@unblocker.yt, In Quarantäne, [5ced8d5fbdeb42f4afeef02f7d85a25e], PUP.Optional.YoutubeUnblocker, C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\9s0hc6sl.default-1430862582424\extensions\youtubeunblocker__web@unblocker.yt\resources, In Quarantäne, [5ced8d5fbdeb42f4afeef02f7d85a25e], PUP.Optional.YoutubeUnblocker, C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\9s0hc6sl.default-1430862582424\extensions\youtubeunblocker__web@unblocker.yt\resources\unblocker-web, In Quarantäne, [5ced8d5fbdeb42f4afeef02f7d85a25e], Dateien: 5 PUP.Optional.Conduit, C:\Users\Philipp\Documents\Downloads\11CT2776682_BrotherSoft_Extreme.exe, In Quarantäne, [68e16983693feb4b1b78d50812ef37c9], PUP.Optional.Sputnik, C:\Users\Philipp\AppData\Roaming\ICQM\icqsetup.exe, In Quarantäne, [8cbde00c4563989e6d13a323a55b5ba5], PUP.Optional.Sputnik, C:\Users\Philipp\AppData\Roaming\ICQM\ICQ\dll\mailrusputnik.exe, In Quarantäne, [7dccdf0dd9cf68ce235df3d3748ce917], PUP.Optional.ExpressFiles, C:\Windows\System32\Tasks\Express Files Updater, In Quarantäne, [f851c22a495f88ae0979a59a43bde11f], PUP.Optional.ConduitTB.Gen, C:\Program Files (x86)\Conduit\Community Alerts\Alert.dll, In Quarantäne, [7acfdb112e7aaf8728178f7aba48cd33], Physische Sektoren: 0 (Keine schädliche Elemente erkannt) (end) Avira, Teil 1: Code:
ATTFilter Free Antivirus Report file date: Dienstag, 18. April 2017 14:40 The program is running as an unrestricted full version. Online services are available. Licensee : Free Serial number : 0000149996-AVHOE-0000001 Platform : Windows 7 Home Premium Windows version : (Service Pack 1) [6.1.7601] Boot mode : Normally booted Username : Philipp Computer name : PHILIPP-PC Version information: build.dat : 15.0.25.172 92770 Bytes 21.03.2017 13:01:00 AVSCAN.EXE : 15.0.25.170 1526936 Bytes 22.03.2017 11:38:40 AVSCANRC.DLL : 15.0.25.102 64552 Bytes 22.03.2017 11:38:40 LUKE.DLL : 15.0.25.161 81120 Bytes 22.03.2017 11:39:01 AVSCPLR.DLL : 15.0.25.170 152840 Bytes 22.03.2017 11:38:41 REPAIR.DLL : 15.0.25.170 705648 Bytes 22.03.2017 11:38:38 repair.rdf : 1.0.26.78 1963035 Bytes 18.04.2017 11:02:15 AVREG.DLL : 15.0.25.170 447360 Bytes 22.03.2017 11:38:38 avlode.dll : 15.0.25.170 835000 Bytes 22.03.2017 11:38:37 avlode.rdf : 14.0.5.98 167944 Bytes 23.03.2017 17:34:23 XBV00014.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17 XBV00015.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17 XBV00016.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17 XBV00017.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17 XBV00018.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17 XBV00019.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17 XBV00020.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17 XBV00021.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17 XBV00022.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17 XBV00023.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17 XBV00024.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17 XBV00025.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17 XBV00026.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17 XBV00027.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17 XBV00028.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17 XBV00029.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17 XBV00030.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17 XBV00031.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17 XBV00032.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:18 XBV00033.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:18 XBV00034.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:18 XBV00035.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:18 XBV00036.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:18 XBV00037.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:18 XBV00038.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:18 XBV00039.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:18 XBV00040.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:18 XBV00041.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:18 XBV00174.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29 XBV00175.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29 XBV00176.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29 XBV00177.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29 XBV00178.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29 XBV00179.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29 XBV00180.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29 XBV00181.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29 XBV00182.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29 XBV00183.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29 XBV00184.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29 XBV00185.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29 XBV00186.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29 XBV00187.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29 XBV00188.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29 XBV00189.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29 XBV00190.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29 XBV00191.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00192.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00193.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00194.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00195.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00196.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00197.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00198.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00199.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00200.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00201.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00202.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00203.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00204.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00205.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00206.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00207.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00208.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00209.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00210.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00211.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00212.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00213.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00214.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00215.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00216.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00217.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00218.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00219.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00220.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00221.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00222.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30 XBV00223.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00224.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00225.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00226.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00227.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00228.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00229.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00230.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00231.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00232.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00233.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00234.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00235.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00236.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00237.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00238.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00239.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00240.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00241.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00242.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00243.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00244.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00245.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00246.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00247.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00248.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00249.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00250.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00251.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00252.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00253.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31 XBV00254.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:32 XBV00255.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:32 XBV00000.VDF : 7.11.70.0 66736640 Bytes 04.04.2013 12:02:04 XBV00001.VDF : 7.11.237.0 48041984 Bytes 02.06.2015 13:33:00 XBV00002.VDF : 7.12.106.228 44941312 Bytes 27.07.2016 14:05:16 XBV00003.VDF : 8.12.113.174 5299200 Bytes 22.08.2016 14:02:05 XBV00004.VDF : 8.12.118.140 3998720 Bytes 15.09.2016 18:30:38 XBV00005.VDF : 8.12.125.14 6024704 Bytes 11.10.2016 14:01:46 XBV00006.VDF : 8.12.132.226 5180928 Bytes 09.11.2016 15:03:07 XBV00007.VDF : 8.12.133.244 1884672 Bytes 16.11.2016 14:52:02 XBV00008.VDF : 8.12.137.174 2475008 Bytes 26.11.2016 10:27:20 XBV00009.VDF : 8.12.143.24 5520384 Bytes 25.12.2016 09:30:30 XBV00010.VDF : 8.12.149.62 6635008 Bytes 21.01.2017 14:28:20 XBV00011.VDF : 8.12.155.56 4918784 Bytes 16.02.2017 06:31:44 XBV00012.VDF : 8.12.158.250 3436544 Bytes 11.03.2017 16:28:23 XBV00013.VDF : 8.12.162.26 5479424 Bytes 03.04.2017 09:23:25 XBV00042.VDF : 8.12.162.40 41984 Bytes 03.04.2017 17:23:59 XBV00043.VDF : 8.12.162.42 24576 Bytes 03.04.2017 17:23:59 XBV00044.VDF : 8.12.162.44 14848 Bytes 03.04.2017 19:23:50 XBV00045.VDF : 8.12.162.46 10240 Bytes 03.04.2017 21:23:35 XBV00046.VDF : 8.12.162.50 77824 Bytes 04.04.2017 08:05:47 XBV00047.VDF : 8.12.162.52 9728 Bytes 04.04.2017 08:05:47 XBV00048.VDF : 8.12.162.54 9728 Bytes 04.04.2017 08:05:47 XBV00049.VDF : 8.12.162.58 10752 Bytes 04.04.2017 12:04:48 XBV00050.VDF : 8.12.162.60 18944 Bytes 04.04.2017 12:04:48 XBV00051.VDF : 8.12.162.62 23040 Bytes 04.04.2017 12:04:48 XBV00052.VDF : 8.12.162.64 2560 Bytes 04.04.2017 14:05:15 XBV00053.VDF : 8.12.162.66 28672 Bytes 04.04.2017 20:34:45 XBV00054.VDF : 8.12.162.68 14848 Bytes 04.04.2017 20:34:45 XBV00055.VDF : 8.12.162.70 9728 Bytes 04.04.2017 20:34:45 XBV00056.VDF : 8.12.162.72 33280 Bytes 04.04.2017 07:34:38 XBV00057.VDF : 8.12.162.76 77312 Bytes 05.04.2017 07:34:38 XBV00058.VDF : 8.12.162.84 52736 Bytes 05.04.2017 13:33:58 XBV00059.VDF : 8.12.162.90 9216 Bytes 05.04.2017 13:33:58 XBV00060.VDF : 8.12.162.96 15872 Bytes 05.04.2017 13:33:58 XBV00061.VDF : 8.12.162.102 13824 Bytes 05.04.2017 17:33:36 XBV00062.VDF : 8.12.162.108 11264 Bytes 05.04.2017 17:33:36 XBV00063.VDF : 8.12.162.114 20992 Bytes 05.04.2017 17:33:36 XBV00064.VDF : 8.12.162.120 19968 Bytes 05.04.2017 19:34:12 XBV00065.VDF : 8.12.162.122 7168 Bytes 05.04.2017 19:34:12 XBV00066.VDF : 8.12.162.126 93696 Bytes 06.04.2017 07:16:06 XBV00067.VDF : 8.12.162.128 11776 Bytes 06.04.2017 07:16:06 XBV00068.VDF : 8.12.162.130 32256 Bytes 06.04.2017 11:15:15 XBV00069.VDF : 8.12.162.132 15872 Bytes 06.04.2017 13:15:17 XBV00070.VDF : 8.12.162.134 8704 Bytes 06.04.2017 13:15:17 XBV00071.VDF : 8.12.162.136 13824 Bytes 06.04.2017 15:15:42 XBV00072.VDF : 8.12.162.138 8192 Bytes 06.04.2017 15:15:42 XBV00073.VDF : 8.12.162.140 13824 Bytes 06.04.2017 17:15:56 XBV00074.VDF : 8.12.162.142 17408 Bytes 06.04.2017 19:16:48 XBV00075.VDF : 8.12.162.144 9216 Bytes 06.04.2017 21:15:27 XBV00076.VDF : 8.12.162.146 11264 Bytes 06.04.2017 21:15:27 XBV00077.VDF : 8.12.162.150 98816 Bytes 07.04.2017 08:17:56 XBV00078.VDF : 8.12.162.152 12800 Bytes 07.04.2017 08:17:56 XBV00079.VDF : 8.12.162.158 5120 Bytes 07.04.2017 08:17:56 XBV00080.VDF : 8.12.162.162 9216 Bytes 07.04.2017 10:17:22 XBV00081.VDF : 8.12.162.166 12800 Bytes 07.04.2017 12:17:29 XBV00082.VDF : 8.12.162.170 21504 Bytes 07.04.2017 14:17:26 XBV00083.VDF : 8.12.162.174 27648 Bytes 07.04.2017 16:17:56 XBV00084.VDF : 8.12.162.176 6144 Bytes 07.04.2017 16:17:56 XBV00085.VDF : 8.12.162.178 14336 Bytes 07.04.2017 23:36:15 XBV00086.VDF : 8.12.162.180 24064 Bytes 07.04.2017 23:36:15 XBV00087.VDF : 8.12.162.182 10240 Bytes 07.04.2017 23:36:15 XBV00088.VDF : 8.12.162.184 13312 Bytes 07.04.2017 23:36:15 XBV00089.VDF : 8.12.162.188 101888 Bytes 08.04.2017 08:45:06 XBV00090.VDF : 8.12.162.190 11264 Bytes 08.04.2017 10:44:49 XBV00091.VDF : 8.12.162.192 26112 Bytes 08.04.2017 12:44:45 XBV00092.VDF : 8.12.162.194 16384 Bytes 08.04.2017 14:44:36 XBV00093.VDF : 8.12.162.196 26112 Bytes 08.04.2017 16:44:46 XBV00094.VDF : 8.12.162.198 109056 Bytes 09.04.2017 10:33:18 XBV00095.VDF : 8.12.162.202 13312 Bytes 09.04.2017 10:33:18 XBV00096.VDF : 8.12.162.206 3584 Bytes 09.04.2017 10:33:18 XBV00097.VDF : 8.12.162.210 7680 Bytes 09.04.2017 12:33:12 XBV00098.VDF : 8.12.162.214 5120 Bytes 09.04.2017 12:33:12 XBV00099.VDF : 8.12.162.218 14336 Bytes 09.04.2017 07:36:18 XBV00100.VDF : 8.12.162.222 122880 Bytes 10.04.2017 07:36:22 XBV00101.VDF : 8.12.162.224 11264 Bytes 10.04.2017 07:36:22 XBV00102.VDF : 8.12.162.226 6656 Bytes 10.04.2017 09:37:02 XBV00103.VDF : 8.12.162.228 7680 Bytes 10.04.2017 11:36:17 XBV00104.VDF : 8.12.162.230 4096 Bytes 10.04.2017 11:36:17 XBV00105.VDF : 8.12.162.232 16896 Bytes 10.04.2017 13:36:28 XBV00106.VDF : 8.12.162.242 2560 Bytes 10.04.2017 13:36:28 XBV00107.VDF : 8.12.162.252 24576 Bytes 10.04.2017 15:36:19 XBV00108.VDF : 8.12.163.6 9216 Bytes 10.04.2017 15:36:19 XBV00109.VDF : 8.12.163.16 19456 Bytes 10.04.2017 17:36:33 XBV00110.VDF : 8.12.163.18 11264 Bytes 10.04.2017 19:36:20 XBV00111.VDF : 8.12.163.20 13824 Bytes 10.04.2017 19:36:20 XBV00112.VDF : 8.12.163.22 7680 Bytes 10.04.2017 23:36:31 XBV00113.VDF : 8.12.163.28 81408 Bytes 11.04.2017 18:32:35 XBV00114.VDF : 8.12.163.30 9216 Bytes 11.04.2017 18:32:35 XBV00115.VDF : 8.12.163.32 9728 Bytes 11.04.2017 18:32:36 XBV00116.VDF : 8.12.163.34 8704 Bytes 11.04.2017 18:32:36 XBV00117.VDF : 8.12.163.36 27648 Bytes 11.04.2017 18:32:36 XBV00118.VDF : 8.12.163.38 10240 Bytes 11.04.2017 18:32:36 XBV00119.VDF : 8.12.163.40 16384 Bytes 11.04.2017 18:32:36 XBV00120.VDF : 8.12.163.42 9216 Bytes 11.04.2017 18:32:36 XBV00121.VDF : 8.12.163.44 8704 Bytes 11.04.2017 18:32:37 XBV00122.VDF : 8.12.163.46 19456 Bytes 11.04.2017 18:32:37 XBV00123.VDF : 8.12.163.48 9728 Bytes 11.04.2017 18:32:37 XBV00124.VDF : 8.12.163.52 80384 Bytes 12.04.2017 18:32:37 XBV00125.VDF : 8.12.163.54 76288 Bytes 12.04.2017 18:32:38 XBV00126.VDF : 8.12.163.64 23040 Bytes 12.04.2017 18:32:38 XBV00127.VDF : 8.12.163.72 15872 Bytes 12.04.2017 18:32:38 XBV00128.VDF : 8.12.163.80 16384 Bytes 12.04.2017 18:32:38 XBV00129.VDF : 8.12.163.88 6144 Bytes 12.04.2017 18:32:38 XBV00130.VDF : 8.12.163.104 43520 Bytes 13.04.2017 18:32:39 XBV00131.VDF : 8.12.163.112 6144 Bytes 13.04.2017 18:32:39 XBV00132.VDF : 8.12.163.120 4096 Bytes 13.04.2017 18:32:39 XBV00133.VDF : 8.12.163.128 60416 Bytes 13.04.2017 18:32:39 XBV00134.VDF : 8.12.163.130 14336 Bytes 13.04.2017 18:32:40 XBV00135.VDF : 8.12.163.132 16384 Bytes 13.04.2017 18:32:40 XBV00136.VDF : 8.12.163.134 13312 Bytes 13.04.2017 18:32:41 XBV00137.VDF : 8.12.163.136 14848 Bytes 13.04.2017 18:32:41 XBV00138.VDF : 8.12.163.138 22016 Bytes 13.04.2017 08:10:24 XBV00139.VDF : 8.12.163.142 81408 Bytes 14.04.2017 08:10:24 XBV00140.VDF : 8.12.163.144 8704 Bytes 14.04.2017 08:10:24 XBV00141.VDF : 8.12.163.146 9728 Bytes 14.04.2017 10:09:21 XBV00142.VDF : 8.12.163.148 3584 Bytes 14.04.2017 12:09:05 XBV00143.VDF : 8.12.163.150 22016 Bytes 14.04.2017 12:09:05 XBV00144.VDF : 8.12.163.152 5632 Bytes 14.04.2017 12:09:06 XBV00145.VDF : 8.12.163.154 28672 Bytes 14.04.2017 14:09:08 XBV00146.VDF : 8.12.163.156 18944 Bytes 14.04.2017 16:09:17 XBV00147.VDF : 8.12.163.158 8704 Bytes 14.04.2017 16:09:17 XBV00148.VDF : 8.12.163.160 10752 Bytes 14.04.2017 01:23:25 XBV00149.VDF : 8.12.163.162 15872 Bytes 14.04.2017 01:23:25 XBV00150.VDF : 8.12.163.164 10240 Bytes 14.04.2017 01:23:25 XBV00151.VDF : 8.12.163.174 73728 Bytes 15.04.2017 08:58:05 XBV00152.VDF : 8.12.163.182 27648 Bytes 15.04.2017 08:58:05 XBV00153.VDF : 8.12.163.190 4608 Bytes 15.04.2017 10:56:53 XBV00154.VDF : 8.12.163.198 9728 Bytes 15.04.2017 12:56:58 XBV00155.VDF : 8.12.163.206 22016 Bytes 15.04.2017 12:56:58 XBV00156.VDF : 8.12.163.208 9216 Bytes 15.04.2017 14:57:01 XBV00157.VDF : 8.12.163.212 113664 Bytes 16.04.2017 09:40:31 XBV00158.VDF : 8.12.163.214 7680 Bytes 16.04.2017 09:40:31 XBV00159.VDF : 8.12.163.216 6144 Bytes 16.04.2017 09:40:31 XBV00160.VDF : 8.12.163.218 7680 Bytes 16.04.2017 11:40:44 XBV00161.VDF : 8.12.163.220 11776 Bytes 16.04.2017 11:40:44 XBV00162.VDF : 8.12.163.222 9728 Bytes 16.04.2017 16:55:53 XBV00163.VDF : 8.12.163.226 110080 Bytes 17.04.2017 12:16:33 XBV00164.VDF : 8.12.163.230 16384 Bytes 17.04.2017 12:16:33 XBV00165.VDF : 8.12.163.232 7680 Bytes 17.04.2017 12:16:33 XBV00166.VDF : 8.12.163.234 10240 Bytes 17.04.2017 14:15:41 XBV00167.VDF : 8.12.163.236 12800 Bytes 17.04.2017 14:15:41 XBV00168.VDF : 8.12.163.240 91136 Bytes 18.04.2017 09:02:35 XBV00169.VDF : 8.12.163.248 8192 Bytes 18.04.2017 09:02:35 XBV00170.VDF : 8.12.163.254 10752 Bytes 18.04.2017 09:02:35 XBV00171.VDF : 8.12.164.4 6144 Bytes 18.04.2017 11:02:13 XBV00172.VDF : 8.12.164.10 12288 Bytes 18.04.2017 13:03:00 XBV00173.VDF : 8.12.164.16 5120 Bytes 18.04.2017 13:03:00 LOCAL000.VDF : 8.12.164.16 216251904 Bytes 18.04.2017 13:04:30 Engine version : 8.3.44.38 AEBB.DLL : 8.1.3.0 59296 Bytes 19.11.2015 16:05:45 AECORE.DLL : 8.3.12.8 262328 Bytes 13.03.2017 13:28:21 AECRYPTO.DLL : 8.2.1.0 129904 Bytes 14.10.2016 12:09:00 AEDROID.DLL : 8.4.3.392 2746280 Bytes 16.11.2016 14:52:11 AEEMU.DLL : 8.1.3.8 404328 Bytes 18.03.2016 12:08:41 AEEXP.DLL : 8.4.4.4 333728 Bytes 20.12.2016 15:18:45 AEGEN.DLL : 8.1.8.322 678648 Bytes 27.02.2017 06:31:56 AEHELP.DLL : 8.3.2.12 284584 Bytes 27.12.2016 13:26:56 AEHEUR.DLL : 8.1.4.2818 11101200 Bytes 13.04.2017 18:33:06 AELIBINF.DLL : 8.2.1.4 68464 Bytes 12.05.2016 09:22:38 AEMOBILE.DLL : 8.1.18.4 346872 Bytes 27.02.2017 06:32:04 AEOFFICE.DLL : 8.3.7.1 614096 Bytes 18.04.2017 11:02:13 AEPACK.DLL : 8.4.2.58 835856 Bytes 22.03.2017 15:38:39 AERDL.DLL : 8.2.1.54 813808 Bytes 27.02.2017 06:32:03 AESBX.DLL : 8.2.22.10 1665568 Bytes 12.03.2017 16:28:39 AESCN.DLL : 8.3.4.8 152768 Bytes 12.03.2017 16:28:37 AESCRIPT.DLL : 8.3.2.128 877416 Bytes 13.04.2017 18:33:09 AEVDF.DLL : 8.3.3.4 142184 Bytes 21.03.2016 12:11:43 AVWINLL.DLL : 15.0.25.161 37448 Bytes 22.03.2017 11:38:32 AVPREF.DLL : 15.0.25.161 63920 Bytes 22.03.2017 11:38:38 AVREP.DLL : 15.0.25.161 233400 Bytes 22.03.2017 11:38:38 AVARKT.DLL : 15.0.25.161 239600 Bytes 22.03.2017 11:38:33 SQLITE3.DLL : 15.0.25.161 473256 Bytes 22.03.2017 11:39:04 AVSMTP.DLL : 15.0.25.161 88904 Bytes 22.03.2017 11:38:41 NETNT.DLL : 15.0.25.161 26568 Bytes 22.03.2017 11:39:01 CommonImageRc.dll: 15.0.25.161 3878048 Bytes 22.03.2017 11:38:33 CommonTextRc.dll: 15.0.25.123 79976 Bytes 22.03.2017 11:38:33 Configuration settings for the scan: Jobname.............................: Full scan Configuration file..................: C:\Program Files (x86)\Avira\AntiVir Desktop\sysscan.avp Reporting...........................: default Primary action......................: Interactive Secondary action....................: Ignore Scan master boot sector.............: on Scan boot sector....................: on Boot sectors........................: C:, F:, G:, Q:, Process scan........................: on Extended process scan...............: on Scan registry.......................: on Search for rootkits.................: on Integrity checking of system files..: off Scan all files......................: All files Scan archives.......................: on Limit recursion depth...............: 20 Smart extensions....................: on Macrovirus heuristic................: on File heuristic......................: extended Skipped files.......................: Start of the scan: Dienstag, 18. April 2017 14:40 Start scanning boot sectors: Boot sector 'HDD0(C:, Q:)' [INFO] No virus was found! Boot sector 'HDD1(F:)' [INFO] No virus was found! Boot sector 'HDD3(G:)' [INFO] No virus was found! Starting search for hidden objects. The scan of running processes will be started: Scan process 'svchost.exe' - '59' Module(s) have been scanned Scan process 'svchost.exe' - '40' Module(s) have been scanned Scan process 'svchost.exe' - '98' Module(s) have been scanned Scan process 'svchost.exe' - '121' Module(s) have been scanned Scan process 'svchost.exe' - '87' Module(s) have been scanned Scan process 'svchost.exe' - '163' Module(s) have been scanned Scan process 'svchost.exe' - '34' Module(s) have been scanned Scan process 'svchost.exe' - '94' Module(s) have been scanned Scan process 'svchost.exe' - '70' Module(s) have been scanned Scan process 'spoolsv.exe' - '85' Module(s) have been scanned Scan process 'sched.exe' - '70' Module(s) have been scanned Scan process 'armsvc.exe' - '28' Module(s) have been scanned Scan process 'avguard.exe' - '115' Module(s) have been scanned Scan process 'Avira.VpnService.exe' - '137' Module(s) have been scanned Scan process 'Dwm.exe' - '28' Module(s) have been scanned Scan process 'taskhost.exe' - '71' Module(s) have been scanned Scan process 'svchost.exe' - '36' Module(s) have been scanned Scan process 'Explorer.EXE' - '165' Module(s) have been scanned Scan process 'mDNSResponder.exe' - '40' Module(s) have been scanned Scan process 'sftvsa.exe' - '32' Module(s) have been scanned Scan process 'svchost.exe' - '32' Module(s) have been scanned Scan process 'ImpWiFiSvc.exe' - '27' Module(s) have been scanned Scan process 'WLIDSVC.EXE' - '56' Module(s) have been scanned Scan process 'WLIDSvcM.exe' - '17' Module(s) have been scanned Scan process 'Avira.ServiceHost.exe' - '127' Module(s) have been scanned Scan process 'igfxpers.exe' - '38' Module(s) have been scanned Scan process 'hkcmd.exe' - '27' Module(s) have been scanned Scan process 'utorrent.exe' - '66' Module(s) have been scanned Scan process 'Proxomitron.exe' - '32' Module(s) have been scanned Scan process 'Telegram.exe' - '77' Module(s) have been scanned Scan process 'avshadow.exe' - '43' Module(s) have been scanned Scan process 'tunmgr.exe' - '62' Module(s) have been scanned Scan process 'sftlist.exe' - '88' Module(s) have been scanned Scan process 'avgnt.exe' - '99' Module(s) have been scanned Scan process 'RIMBBLaunchAgent.exe' - '51' Module(s) have been scanned Scan process 'PeerManager.exe' - '73' Module(s) have been scanned Scan process 'CVHSVC.EXE' - '68' Module(s) have been scanned Scan process 'SearchIndexer.exe' - '54' Module(s) have been scanned Scan process 'BbDevMgr.exe' - '49' Module(s) have been scanned Scan process 'svchost.exe' - '37' Module(s) have been scanned Scan process 'nginx.exe' - '35' Module(s) have been scanned Scan process 'nginx.exe' - '44' Module(s) have been scanned Scan process 'conhost.exe' - '15' Module(s) have been scanned Scan process 'WUDFHost.exe' - '34' Module(s) have been scanned Scan process 'Avira.Systray.exe' - '140' Module(s) have been scanned Scan process 'svchost.exe' - '62' Module(s) have been scanned Scan process 'wmpnetwk.exe' - '118' Module(s) have been scanned Scan process 'svchost.exe' - '59' Module(s) have been scanned Scan process 'NASvc.exe' - '48' Module(s) have been scanned Scan process 'DllHost.exe' - '45' Module(s) have been scanned Scan process 'svchost.exe' - '28' Module(s) have been scanned Scan process 'vivaldi.exe' - '159' Module(s) have been scanned Scan process 'vivaldi.exe' - '29' Module(s) have been scanned Scan process 'vivaldi.exe' - '77' Module(s) have been scanned Scan process 'vivaldi.exe' - '58' Module(s) have been scanned Scan process 'vivaldi.exe' - '58' Module(s) have been scanned Scan process 'vivaldi.exe' - '58' Module(s) have been scanned Scan process 'vivaldi.exe' - '58' Module(s) have been scanned Scan process 'rundll32.exe' - '15' Module(s) have been scanned Scan process 'vivaldi.exe' - '58' Module(s) have been scanned Scan process 'RdrCEF.exe' - '93' Module(s) have been scanned Scan process 'RdrCEF.exe' - '75' Module(s) have been scanned Scan process 'avscan.exe' - '127' Module(s) have been scanned Scan process 'vssvc.exe' - '47' Module(s) have been scanned Scan process 'svchost.exe' - '28' Module(s) have been scanned Scan process 'smss.exe' - '2' Module(s) have been scanned Scan process 'csrss.exe' - '18' Module(s) have been scanned Scan process 'wininit.exe' - '26' Module(s) have been scanned Scan process 'csrss.exe' - '18' Module(s) have been scanned Scan process 'services.exe' - '33' Module(s) have been scanned Scan process 'lsass.exe' - '73' Module(s) have been scanned Scan process 'lsm.exe' - '16' Module(s) have been scanned Scan process 'winlogon.exe' - '31' Module(s) have been scanned Starting to scan executable files (registry): The file 'C:\Program Files (x86)\Image-Line\FL Studio 8\FL.exe' was found in the cache; the Protection Cloud scan was skipped. SHA256 = 7756ECF83040683CB52E02E05D21F166CA337BC9D819781AFF729D06CEED394B The file 'C:\Program Files (x86)\Freeware Games\Giana Worlds 0.83 Preview\GianaSetup.exe' was found in the cache; the Protection Cloud scan was skipped. SHA256 = B4CE0AAF41018D64AE9AD61039A2E183C7E73B2A54FFA0BAFC668E5D4DB096C5 The file 'C:\Program Files (x86)\Freeware Games\Giana Worlds 0.83 Preview\GianaWorlds083.exe' was found in the cache; the Protection Cloud scan was skipped. SHA256 = FEC801DCE929DF4C9394139F69FFCFE9322EAD80D8C89F84542109A8D209257B Successful Cloud SDK initialization and license check. The file 'C:\Program Files (x86)\Power Undelete Wizard Demo\Power Undelete Wizard(Demo).exe' was scanned with the Protection Cloud. SHA256 = DA80C3887CDCD2C31EE53D0AB93482F6DF77039F87FC5E12CC7BE0963FA502C9 The registry was scanned ( '5027' files ). Starting the file scan: Begin scan in 'C:\' <OS> The file 'C:\GOG Games\Tomb Raider 1+2+3\DOSBOX\Glide2x.dll' was scanned with the Protection Cloud. SHA256 = 380E20B9B812E247617CD6B60D898D9ACD97FD2BE141AAD54CC22A647787F7C7 The file 'C:\Program Files (x86)\Freeware Games\Giana Worlds 0.83 Preview\GianaSetup.exe' was found in the cache; the Protection Cloud scan was skipped. SHA256 = B4CE0AAF41018D64AE9AD61039A2E183C7E73B2A54FFA0BAFC668E5D4DB096C5 The file 'C:\Program Files (x86)\Freeware Games\Giana Worlds 0.83 Preview\GianaWorlds083.exe' was found in the cache; the Protection Cloud scan was skipped. SHA256 = FEC801DCE929DF4C9394139F69FFCFE9322EAD80D8C89F84542109A8D209257B The file 'C:\Program Files (x86)\HUAWEI Modem Driver\DriverSetup.exe' was scanned with the Protection Cloud. SHA256 = 4C19BDA809D49FEEDBF95DCA45AC87624AAB3D4FAA91967708E0E9B2E8DB95B2 The file 'C:\Program Files (x86)\Image-Line\FL Studio 8\FL.exe' was found in the cache; the Protection Cloud scan was skipped. SHA256 = 7756ECF83040683CB52E02E05D21F166CA337BC9D819781AFF729D06CEED394B The file 'C:\Program Files (x86)\lamedropXPd3.01-3.98.4\lamedropXPd3.exe' was scanned with the Protection Cloud. SHA256 = 559B84F50AFABE715C5F78C4352AD26A93B970E45119CF488E8A66ACBEDC44AC The file 'C:\Program Files (x86)\o2\Mobile Connection Manager\PCMCIAs\HUAWEI\Setup.exe' was scanned with the Protection Cloud. SHA256 = C24046806EF66DF30A164CF763D22E9829DF79C44B502296D496B95647E3525A The file 'C:\Program Files (x86)\Power Undelete Wizard Demo\Power Undelete Wizard(Demo).exe' was scanned with the Protection Cloud. SHA256 = DA80C3887CDCD2C31EE53D0AB93482F6DF77039F87FC5E12CC7BE0963FA502C9 The file 'C:\Program Files (x86)\Ubi Soft\Rayman3\Register\xmltok.dll' was scanned with the Protection Cloud. SHA256 = 2C33790514383FA508D2EEC3A6A5D11F2017B7E244C852ED8B6C021C06FFF752 C:\Users\Philipp\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\14\458aee8e-50c8aa6d [0] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired C:\Users\Philipp\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\23\690a7d57-633d556d [0] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired C:\Users\Philipp\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\31\5565fadf-5e43bc2a [0] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired C:\Users\Philipp\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\48\6f40e570-1d303383 [0] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired Begin scan in 'F:\' <F:> The file 'F:\Eff\Installers\5-8-igp_xp_gart_25203.exe' was scanned with the Protection Cloud. SHA256 = 4D04440E5EE80CD64E0B24CFDD189FD65D5597A7F3E650A3A7AE8AEF4FD8AC55 F:\Eff\Installers\agsetup183se.exe [0] Archive type: NSIS --> facemoods.exe [1] Archive type: NSIS --> ProgramFilesDir/install.rdf [DETECTION] Contains virus patterns of Adware ADWARE/DealPly.Y [WARNING] Infected files in archives cannot be repaired The file 'F:\Eff\Installers\Firefox Setup 6.0.2.exe' was scanned with the Protection Cloud. SHA256 = 9F27AC5FAF243C9FFB86BE697773FBB84F9CB2CF939D91FF2DFC89E8E2F2E32C Begin scan in 'G:\' <Volume> [0] Archive type: Runtime Packed --> G:\PHILIPP-PC\Backup Set 2012-10-07 190005\Backup Files 2012-10-07 190005\Backup files 2.zip [1] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [2] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/24f3662f-1ab509e5 [2] Archive type: ZIP --> a/javaww.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.215 exploit [WARNING] Infected files in archives cannot be repaired --> a/b.class [DETECTION] Contains recognition pattern of the EXP/2012-0507.CN.3 exploit [WARNING] Infected files in archives cannot be repaired --> a/a.class [DETECTION] Contains recognition pattern of the EXP/2012-0507.CO.3 exploit [WARNING] Infected files in archives cannot be repaired --> b.class [DETECTION] Contains recognition pattern of the JAVA/Dldr.Lamar.CX Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [2] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2012-10-07 190005\Backup Files 2012-10-07 190005\Backup files 2.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2012-10-28 190002\Backup Files 2012-10-28 190002\Backup files 2.zip [1] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [2] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/24f3662f-1ab509e5 [2] Archive type: ZIP --> a/javaww.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.215 exploit [WARNING] Infected files in archives cannot be repaired --> a/b.class [DETECTION] Contains recognition pattern of the EXP/2012-0507.CN.3 exploit [WARNING] Infected files in archives cannot be repaired --> a/a.class [DETECTION] Contains recognition pattern of the EXP/2012-0507.CO.3 exploit [WARNING] Infected files in archives cannot be repaired --> b.class [DETECTION] Contains recognition pattern of the JAVA/Dldr.Lamar.CX Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [2] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2012-10-28 190002\Backup Files 2012-10-28 190002\Backup files 2.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2012-11-18 190005\Backup Files 2012-11-18 190005\Backup files 2.zip [1] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [2] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/24f3662f-1ab509e5 [2] Archive type: ZIP --> a/javaww.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.215 exploit [WARNING] Infected files in archives cannot be repaired --> a/b.class [DETECTION] Contains recognition pattern of the EXP/2012-0507.CN.3 exploit [WARNING] Infected files in archives cannot be repaired --> a/a.class [DETECTION] Contains recognition pattern of the EXP/2012-0507.CO.3 exploit [WARNING] Infected files in archives cannot be repaired --> b.class [DETECTION] Contains recognition pattern of the JAVA/Dldr.Lamar.CX Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [2] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2012-11-18 190005\Backup Files 2012-11-18 190005\Backup files 2.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2012-12-02 210546\Backup Files 2012-12-02 210546\Backup files 2.zip [1] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [2] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/24f3662f-1ab509e5 [2] Archive type: ZIP --> a/javaww.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.215 exploit [WARNING] Infected files in archives cannot be repaired --> a/b.class [DETECTION] Contains recognition pattern of the EXP/2012-0507.CN.3 exploit [WARNING] Infected files in archives cannot be repaired --> a/a.class [DETECTION] Contains recognition pattern of the EXP/2012-0507.CO.3 exploit [WARNING] Infected files in archives cannot be repaired --> b.class [DETECTION] Contains recognition pattern of the JAVA/Dldr.Lamar.CX Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [2] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2012-12-02 210546\Backup Files 2012-12-02 210546\Backup files 2.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2012-12-02 210546\Backup Files 2012-12-10 140340\Backup files 1.zip [1] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2012-12-24 124445\Backup Files 2012-12-24 124445\Backup files 1.zip [2] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2012-12-24 124445\Backup Files 2012-12-24 124445\Backup files 2.zip [3] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [4] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/24f3662f-1ab509e5 [4] Archive type: ZIP --> a/javaww.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.215 exploit [WARNING] Infected files in archives cannot be repaired --> a/b.class [DETECTION] Contains recognition pattern of the EXP/2012-0507.CN.3 exploit [WARNING] Infected files in archives cannot be repaired --> a/a.class [DETECTION] Contains recognition pattern of the EXP/2012-0507.CO.3 exploit [WARNING] Infected files in archives cannot be repaired --> b.class [DETECTION] Contains recognition pattern of the JAVA/Dldr.Lamar.CX Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [4] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2012-12-24 124445\Backup Files 2012-12-24 124445\Backup files 2.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2013-01-13 190004\Backup Files 2013-01-13 190004\Backup files 1.zip [3] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2013-01-13 190004\Backup Files 2013-01-13 190004\Backup files 3.zip [4] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [5] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/24f3662f-1ab509e5 [5] Archive type: ZIP --> a/javaww.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.215 exploit [WARNING] Infected files in archives cannot be repaired --> a/b.class [DETECTION] Contains recognition pattern of the EXP/2012-0507.CN.3 exploit [WARNING] Infected files in archives cannot be repaired --> a/a.class [DETECTION] Contains recognition pattern of the EXP/2012-0507.CO.3 exploit [WARNING] Infected files in archives cannot be repaired --> b.class [DETECTION] Contains recognition pattern of the JAVA/Dldr.Lamar.CX Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [5] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired |
19.04.2017, 13:21 | #4 |
| Windows-7-PC langsam, Avira findet Adware ohne Ende Avira, Teil 2: Code:
ATTFilter G:\PHILIPP-PC\Backup Set 2013-01-13 190004\Backup Files 2013-01-13 190004\Backup files 3.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2013-02-03 190007\Backup Files 2013-02-03 190007\Backup files 1.zip [4] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2013-02-03 190007\Backup Files 2013-02-03 190007\Backup files 3.zip [5] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [6] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/24f3662f-1ab509e5 [6] Archive type: ZIP --> a/javaww.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.215 exploit [WARNING] Infected files in archives cannot be repaired --> a/b.class [DETECTION] Contains recognition pattern of the EXP/2012-0507.CN.3 exploit [WARNING] Infected files in archives cannot be repaired --> a/a.class [DETECTION] Contains recognition pattern of the EXP/2012-0507.CO.3 exploit [WARNING] Infected files in archives cannot be repaired --> b.class [DETECTION] Contains recognition pattern of the JAVA/Dldr.Lamar.CX Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [6] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2013-02-03 190007\Backup Files 2013-02-03 190007\Backup files 3.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2013-02-03 190007\Backup Files 2013-02-10 190004\Backup files 1.zip [5] Archive type: ZIP --> C/Users/Philipp/AppData/Local/Opera/Opera/cache/g_0015/opr1Q7SE.tmp [6] Archive type: GZ --> Object [DETECTION] Contains recognition pattern of the HTML/Redirect.00 HTML script virus [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2013-02-03 190007\Backup Files 2013-02-10 190004\Backup files 1.zip [DETECTION] Contains recognition pattern of the HTML/Redirect.00 HTML script virus --> G:\PHILIPP-PC\Backup Set 2013-02-03 190007\Backup Files 2013-02-17 190006\Backup files 1.zip [5] Archive type: ZIP --> C/Users/Philipp/AppData/Local/Opera/Opera/cache/g_0062/opr1RTVT.tmp [6] Archive type: RAR --> GALAS_VIDEO_DIARY_2.4_BY_GALA.mp4 [WARNING] The file could not be read! --> C/Users/Philipp/AppData/Local/Opera/Opera/cache/g_0062/opr1RTW0.tmp [6] Archive type: RAR --> sss213-\abclider.bmp [WARNING] The file could not be read! --> G:\PHILIPP-PC\Backup Set 2013-03-03 230723\Backup Files 2013-03-03 230723\Backup files 1.zip [5] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2013-03-03 230723\Backup Files 2013-03-03 230723\Backup files 3.zip [6] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [7] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/24f3662f-1ab509e5 [7] Archive type: ZIP --> a/javaww.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.215 exploit [WARNING] Infected files in archives cannot be repaired --> a/b.class [DETECTION] Contains recognition pattern of the EXP/2012-0507.CN.3 exploit [WARNING] Infected files in archives cannot be repaired --> a/a.class [DETECTION] Contains recognition pattern of the EXP/2012-0507.CO.3 exploit [WARNING] Infected files in archives cannot be repaired --> b.class [DETECTION] Contains recognition pattern of the JAVA/Dldr.Lamar.CX Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [7] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2013-03-03 230723\Backup Files 2013-03-03 230723\Backup files 3.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2013-03-27 140706\Backup Files 2013-03-27 140706\Backup files 1.zip [6] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2013-03-27 140706\Backup Files 2013-03-27 140706\Backup files 3.zip [7] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [8] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [8] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2013-03-27 140706\Backup Files 2013-03-27 140706\Backup files 3.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2013-04-14 190002\Backup Files 2013-04-14 190002\Backup files 1.zip [7] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2013-04-14 190002\Backup Files 2013-04-14 190002\Backup files 3.zip [8] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [9] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [9] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2013-04-14 190002\Backup Files 2013-04-14 190002\Backup files 3.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2013-05-06 172759\Backup Files 2013-05-06 172759\Backup files 1.zip [8] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2013-05-06 172759\Backup Files 2013-05-06 172759\Backup files 3.zip [9] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [10] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [10] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2013-05-06 172759\Backup Files 2013-05-06 172759\Backup files 3.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2013-05-26 190009\Backup Files 2013-05-26 190009\Backup files 1.zip [9] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2013-05-26 190009\Backup Files 2013-05-26 190009\Backup files 3.zip [10] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [11] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [11] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2013-05-26 190009\Backup Files 2013-05-26 190009\Backup files 3.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2013-06-09 194227\Backup Files 2013-06-09 194227\Backup files 1.zip [10] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2013-06-09 194227\Backup Files 2013-06-09 194227\Backup files 3.zip [11] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [12] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [12] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2013-06-09 194227\Backup Files 2013-06-09 194227\Backup files 3.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2013-06-09 194227\Backup Files 2013-06-24 174918\Backup files 1.zip [11] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [12] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2013-06-09 194227\Backup Files 2013-06-24 174918\Backup files 1.zip [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit --> G:\PHILIPP-PC\Backup Set 2013-06-30 213122\Backup Files 2013-06-30 213122\Backup files 1.zip [11] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2013-06-30 213122\Backup Files 2013-06-30 213122\Backup files 3.zip [12] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [13] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [13] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [13] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2013-06-30 213122\Backup Files 2013-06-30 213122\Backup files 3.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2013-07-14 190009\Backup Files 2013-07-14 190009\Backup files 1.zip [12] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2013-07-14 190009\Backup Files 2013-07-14 190009\Backup files 3.zip [13] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [14] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [14] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [14] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/Desktop/furry/Furry.exe [DETECTION] Contains recognition pattern of a probably damaged CC/00256 sample [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2013-07-14 190009\Backup Files 2013-07-14 190009\Backup files 3.zip [DETECTION] Contains recognition pattern of a probably damaged CC/00256 sample --> G:\PHILIPP-PC\Backup Set 2013-08-04 190004\Backup Files 2013-08-04 190004\Backup files 1.zip [13] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2013-08-04 190004\Backup Files 2013-08-04 190004\Backup files 3.zip [14] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [15] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [15] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [15] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/Desktop/furry/Furry.exe [DETECTION] Contains recognition pattern of a probably damaged CC/00256 sample [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2013-08-04 190004\Backup Files 2013-08-04 190004\Backup files 3.zip [DETECTION] Contains recognition pattern of a probably damaged CC/00256 sample --> G:\PHILIPP-PC\Backup Set 2013-09-01 190003\Backup Files 2013-09-01 190003\Backup files 1.zip [14] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2013-09-01 190003\Backup Files 2013-09-01 190003\Backup files 3.zip [15] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [16] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [16] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [16] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/Desktop/furry/Furry.exe [DETECTION] Contains recognition pattern of a probably damaged CC/00256 sample [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2013-09-01 190003\Backup Files 2013-09-01 190003\Backup files 3.zip [DETECTION] Contains recognition pattern of a probably damaged CC/00256 sample --> G:\PHILIPP-PC\Backup Set 2013-09-27 192833\Backup Files 2013-09-27 192833\Backup files 1.zip [15] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2013-09-27 192833\Backup Files 2013-09-27 192833\Backup files 3.zip [16] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [17] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [17] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [17] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2013-09-27 192833\Backup Files 2013-09-27 192833\Backup files 3.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2013-11-03 190004\Backup Files 2013-11-03 190004\Backup files 1.zip [16] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2013-11-03 190004\Backup Files 2013-11-03 190004\Backup files 3.zip [17] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [18] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [18] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [18] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2013-11-03 190004\Backup Files 2013-11-03 190004\Backup files 3.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2013-11-24 190006\Backup Files 2013-11-24 190006\Backup files 1.zip [17] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2013-11-24 190006\Backup Files 2013-11-24 190006\Backup files 3.zip [18] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [19] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [19] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [19] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2013-11-24 190006\Backup Files 2013-11-24 190006\Backup files 3.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2013-12-15 190011\Backup Files 2013-12-15 190011\Backup files 1.zip [18] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2013-12-15 190011\Backup Files 2013-12-15 190011\Backup files 4.zip [19] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [20] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [20] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [20] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2013-12-15 190011\Backup Files 2013-12-15 190011\Backup files 4.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-01-26 190004\Backup Files 2014-01-26 190004\Backup files 1.zip [19] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-01-26 190004\Backup Files 2014-01-26 190004\Backup files 5.zip [20] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [21] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [21] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [21] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-01-26 190004\Backup Files 2014-01-26 190004\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-01-26 190004\Backup Files 2014-02-02 190007\Backup files 1.zip [20] Archive type: ZIP --> C/Users/Philipp/AppData/Local/Google/Chrome/User Data/Default/Extensions/pnbbffeddnekkhjmokkhdebbfbibbflc/1.128_0/cs.js [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-01-26 190004\Backup Files 2014-02-02 190007\Backup files 1.zip [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen --> G:\PHILIPP-PC\Backup Set 2014-02-09 190003\Backup Files 2014-02-09 190003\Backup files 1.zip [20] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-02-09 190003\Backup Files 2014-02-09 190003\Backup files 3.zip [21] Archive type: ZIP --> C/Users/Philipp/AppData/Local/Google/Chrome/User Data/Default/Extensions/pnbbffeddnekkhjmokkhdebbfbibbflc/1.128_0/cs.js [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-02-09 190003\Backup Files 2014-02-09 190003\Backup files 3.zip [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen --> G:\PHILIPP-PC\Backup Set 2014-02-09 190003\Backup Files 2014-02-09 190003\Backup files 4.zip [21] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [22] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [22] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [22] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-02-09 190003\Backup Files 2014-02-09 190003\Backup files 4.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-03-02 190003\Backup Files 2014-03-02 190003\Backup files 1.zip [21] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-03-02 190003\Backup Files 2014-03-02 190003\Backup files 3.zip [22] Archive type: ZIP --> C/Users/Philipp/AppData/Local/Google/Chrome/User Data/Default/Extensions/pnbbffeddnekkhjmokkhdebbfbibbflc/1.128_0/cs.js [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen [WARNING] Infected files in archives cannot be repaired |
19.04.2017, 13:22 | #5 |
| Windows-7-PC langsam, Avira findet Adware ohne Ende Avira, Teil 3: Code:
ATTFilter G:\PHILIPP-PC\Backup Set 2014-03-02 190003\Backup Files 2014-03-02 190003\Backup files 3.zip [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen --> G:\PHILIPP-PC\Backup Set 2014-03-02 190003\Backup Files 2014-03-02 190003\Backup files 6.zip [22] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [23] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [23] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [23] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-03-02 190003\Backup Files 2014-03-02 190003\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-03-30 190008\Backup Files 2014-03-30 190008\Backup files 1.zip [22] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-03-30 190008\Backup Files 2014-03-30 190008\Backup files 3.zip [23] Archive type: ZIP --> C/Users/Philipp/AppData/Local/Google/Chrome/User Data/Default/Extensions/pnbbffeddnekkhjmokkhdebbfbibbflc/1.128_0/cs.js [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-03-30 190008\Backup Files 2014-03-30 190008\Backup files 3.zip [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen --> G:\PHILIPP-PC\Backup Set 2014-03-30 190008\Backup Files 2014-03-30 190008\Backup files 5.zip [23] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [24] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [24] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [24] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-03-30 190008\Backup Files 2014-03-30 190008\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-04-13 190009\Backup files 1.zip [23] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-04-13 190009\Backup files 3.zip [24] Archive type: ZIP --> C/Users/Philipp/AppData/Local/Google/Chrome/User Data/Default/Extensions/pnbbffeddnekkhjmokkhdebbfbibbflc/1.128_0/cs.js [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-04-13 190009\Backup files 3.zip [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen --> G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-04-13 190009\Backup files 6.zip [24] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [25] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [25] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [25] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-04-13 190009\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-05-11 190007\Backup files 9.zip [24] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [25] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-05-11 190007\Backup files 9.zip [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus --> G:\PHILIPP-PC\Backup Set 2014-05-25 190010\Backup Files 2014-05-25 190010\Backup files 1.zip [24] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-05-25 190010\Backup Files 2014-05-25 190010\Backup files 4.zip [25] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [26] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [26] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [26] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [26] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-05-25 190010\Backup Files 2014-05-25 190010\Backup files 4.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-06-15 190009\Backup Files 2014-06-15 190009\Backup files 1.zip [25] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-06-15 190009\Backup Files 2014-06-15 190009\Backup files 6.zip [26] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [27] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [27] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [27] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [27] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-06-15 190009\Backup Files 2014-06-15 190009\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-07-06 190011\Backup Files 2014-07-06 190011\Backup files 1.zip [26] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-07-06 190011\Backup Files 2014-07-06 190011\Backup files 5.zip [27] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [28] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [28] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [28] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [28] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-07-06 190011\Backup Files 2014-07-06 190011\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-07-27 190007\Backup Files 2014-07-27 190007\Backup files 1.zip [27] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-07-27 190007\Backup Files 2014-07-27 190007\Backup files 6.zip [28] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [29] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [29] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [29] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [29] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-07-27 190007\Backup Files 2014-07-27 190007\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-08-17 190003\Backup Files 2014-08-17 190003\Backup files 1.zip [28] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-08-17 190003\Backup Files 2014-08-17 190003\Backup files 4.zip [29] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [30] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [30] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [30] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [30] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-08-17 190003\Backup Files 2014-08-17 190003\Backup files 4.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-09-08 150856\Backup Files 2014-09-08 150856\Backup files 1.zip [29] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-09-08 150856\Backup Files 2014-09-08 150856\Backup files 6.zip [30] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [31] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [31] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [31] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [31] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-09-08 150856\Backup Files 2014-09-08 150856\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-09-21 190018\Backup Files 2014-09-21 190018\Backup files 1.zip [30] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-09-21 190018\Backup Files 2014-09-21 190018\Backup files 5.zip [31] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [32] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [32] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [32] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [32] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-09-21 190018\Backup Files 2014-09-21 190018\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-10-05 190006\Backup Files 2014-10-05 190006\Backup files 1.zip [31] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-10-05 190006\Backup Files 2014-10-05 190006\Backup files 4.zip [32] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [33] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [33] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [33] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [33] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-10-05 190006\Backup Files 2014-10-05 190006\Backup files 4.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-12-10 221250\Backup Files 2014-12-10 221250\Backup files 1.zip [32] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-12-10 221250\Backup Files 2014-12-10 221250\Backup files 4.zip [33] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [34] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [34] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [34] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [34] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-12-10 221250\Backup Files 2014-12-10 221250\Backup files 4.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-12-10 221250\Backup Files 2014-12-21 190006\Backup files 1.zip [33] Archive type: ZIP --> C/Users/Philipp/AppData/Roaming/Mozilla/Firefox/Profiles/x58wzstd.default-1401113928928/extensions/{d6f4f1c0-77a5-4681-b173-dc623691f111}.xpi [34] Archive type: ZIP --> bootstrap.js [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [WARNING] Infected files in archives cannot be repaired --> lib/AddonObserver.js [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-12-10 221250\Backup Files 2014-12-21 190006\Backup files 1.zip [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware --> G:\PHILIPP-PC\Backup Set 2014-12-28 190007\Backup Files 2014-12-28 190007\Backup files 1.zip [33] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-12-28 190007\Backup Files 2014-12-28 190007\Backup files 2.zip [34] Archive type: ZIP --> C/Users/Philipp/AppData/Roaming/Mozilla/Firefox/Profiles/x58wzstd.default-1401113928928/extensions/{d6f4f1c0-77a5-4681-b173-dc623691f111}.xpi [35] Archive type: ZIP --> bootstrap.js [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [WARNING] Infected files in archives cannot be repaired --> lib/AddonObserver.js [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-12-28 190007\Backup Files 2014-12-28 190007\Backup files 2.zip [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware --> G:\PHILIPP-PC\Backup Set 2014-12-28 190007\Backup Files 2014-12-28 190007\Backup files 5.zip [34] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [35] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [35] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [35] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [35] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired |
19.04.2017, 13:23 | #6 |
| Windows-7-PC langsam, Avira findet Adware ohne Ende Avira, Teil 4: Code:
ATTFilter G:\PHILIPP-PC\Backup Set 2014-03-02 190003\Backup Files 2014-03-02 190003\Backup files 3.zip [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen --> G:\PHILIPP-PC\Backup Set 2014-03-02 190003\Backup Files 2014-03-02 190003\Backup files 6.zip [22] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [23] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [23] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [23] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-03-02 190003\Backup Files 2014-03-02 190003\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-03-30 190008\Backup Files 2014-03-30 190008\Backup files 1.zip [22] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-03-30 190008\Backup Files 2014-03-30 190008\Backup files 3.zip [23] Archive type: ZIP --> C/Users/Philipp/AppData/Local/Google/Chrome/User Data/Default/Extensions/pnbbffeddnekkhjmokkhdebbfbibbflc/1.128_0/cs.js [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-03-30 190008\Backup Files 2014-03-30 190008\Backup files 3.zip [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen --> G:\PHILIPP-PC\Backup Set 2014-03-30 190008\Backup Files 2014-03-30 190008\Backup files 5.zip [23] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [24] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [24] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [24] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-03-30 190008\Backup Files 2014-03-30 190008\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-04-13 190009\Backup files 1.zip [23] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-04-13 190009\Backup files 3.zip [24] Archive type: ZIP --> C/Users/Philipp/AppData/Local/Google/Chrome/User Data/Default/Extensions/pnbbffeddnekkhjmokkhdebbfbibbflc/1.128_0/cs.js [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-04-13 190009\Backup files 3.zip [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen --> G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-04-13 190009\Backup files 6.zip [24] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [25] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [25] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [25] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-04-13 190009\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-05-11 190007\Backup files 9.zip [24] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [25] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-05-11 190007\Backup files 9.zip [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus --> G:\PHILIPP-PC\Backup Set 2014-05-25 190010\Backup Files 2014-05-25 190010\Backup files 1.zip [24] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-05-25 190010\Backup Files 2014-05-25 190010\Backup files 4.zip [25] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [26] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [26] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [26] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [26] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-05-25 190010\Backup Files 2014-05-25 190010\Backup files 4.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-06-15 190009\Backup Files 2014-06-15 190009\Backup files 1.zip [25] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-06-15 190009\Backup Files 2014-06-15 190009\Backup files 6.zip [26] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [27] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [27] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [27] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [27] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-06-15 190009\Backup Files 2014-06-15 190009\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-07-06 190011\Backup Files 2014-07-06 190011\Backup files 1.zip [26] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-07-06 190011\Backup Files 2014-07-06 190011\Backup files 5.zip [27] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [28] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [28] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [28] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [28] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-07-06 190011\Backup Files 2014-07-06 190011\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-07-27 190007\Backup Files 2014-07-27 190007\Backup files 1.zip [27] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-07-27 190007\Backup Files 2014-07-27 190007\Backup files 6.zip [28] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [29] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [29] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [29] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [29] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-07-27 190007\Backup Files 2014-07-27 190007\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-08-17 190003\Backup Files 2014-08-17 190003\Backup files 1.zip [28] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-08-17 190003\Backup Files 2014-08-17 190003\Backup files 4.zip [29] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [30] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [30] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [30] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [30] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-08-17 190003\Backup Files 2014-08-17 190003\Backup files 4.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-09-08 150856\Backup Files 2014-09-08 150856\Backup files 1.zip [29] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-09-08 150856\Backup Files 2014-09-08 150856\Backup files 6.zip [30] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [31] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [31] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [31] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [31] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-09-08 150856\Backup Files 2014-09-08 150856\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-09-21 190018\Backup Files 2014-09-21 190018\Backup files 1.zip [30] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-09-21 190018\Backup Files 2014-09-21 190018\Backup files 5.zip [31] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [32] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [32] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [32] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [32] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-09-21 190018\Backup Files 2014-09-21 190018\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-10-05 190006\Backup Files 2014-10-05 190006\Backup files 1.zip [31] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-10-05 190006\Backup Files 2014-10-05 190006\Backup files 4.zip [32] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [33] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [33] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [33] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [33] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-10-05 190006\Backup Files 2014-10-05 190006\Backup files 4.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-12-10 221250\Backup Files 2014-12-10 221250\Backup files 1.zip [32] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-12-10 221250\Backup Files 2014-12-10 221250\Backup files 4.zip [33] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [34] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [34] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [34] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [34] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-12-10 221250\Backup Files 2014-12-10 221250\Backup files 4.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2014-12-10 221250\Backup Files 2014-12-21 190006\Backup files 1.zip [33] Archive type: ZIP --> C/Users/Philipp/AppData/Roaming/Mozilla/Firefox/Profiles/x58wzstd.default-1401113928928/extensions/{d6f4f1c0-77a5-4681-b173-dc623691f111}.xpi [34] Archive type: ZIP --> bootstrap.js [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [WARNING] Infected files in archives cannot be repaired --> lib/AddonObserver.js [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-12-10 221250\Backup Files 2014-12-21 190006\Backup files 1.zip [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware --> G:\PHILIPP-PC\Backup Set 2014-12-28 190007\Backup Files 2014-12-28 190007\Backup files 1.zip [33] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2014-12-28 190007\Backup Files 2014-12-28 190007\Backup files 2.zip [34] Archive type: ZIP --> C/Users/Philipp/AppData/Roaming/Mozilla/Firefox/Profiles/x58wzstd.default-1401113928928/extensions/{d6f4f1c0-77a5-4681-b173-dc623691f111}.xpi [35] Archive type: ZIP --> bootstrap.js [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [WARNING] Infected files in archives cannot be repaired --> lib/AddonObserver.js [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2014-12-28 190007\Backup Files 2014-12-28 190007\Backup files 2.zip [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware --> G:\PHILIPP-PC\Backup Set 2014-12-28 190007\Backup Files 2014-12-28 190007\Backup files 5.zip [34] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [35] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [35] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [35] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [35] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired |
19.04.2017, 13:24 | #7 |
| Windows-7-PC langsam, Avira findet Adware ohne Ende Avira, Teil 5: Code:
ATTFilter G:\PHILIPP-PC\Backup Set 2014-12-28 190007\Backup Files 2014-12-28 190007\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2015-01-18 190006\Backup Files 2015-01-18 190006\Backup files 1.zip [34] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2015-01-18 190006\Backup Files 2015-01-18 190006\Backup files 2.zip [35] Archive type: ZIP --> C/Users/Philipp/AppData/Roaming/Mozilla/Firefox/Profiles/x58wzstd.default-1401113928928/extensions/{d6f4f1c0-77a5-4681-b173-dc623691f111}.xpi [36] Archive type: ZIP --> bootstrap.js [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [WARNING] Infected files in archives cannot be repaired --> lib/AddonObserver.js [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2015-01-18 190006\Backup Files 2015-01-18 190006\Backup files 2.zip [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware --> G:\PHILIPP-PC\Backup Set 2015-01-18 190006\Backup Files 2015-01-18 190006\Backup files 4.zip [35] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [36] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [36] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [36] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [36] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2015-01-18 190006\Backup Files 2015-01-18 190006\Backup files 4.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2015-02-08 190008\Backup Files 2015-02-08 190008\Backup files 1.zip [35] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2015-02-08 190008\Backup Files 2015-02-08 190008\Backup files 4.zip [36] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [37] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [37] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [37] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [37] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2015-02-08 190008\Backup Files 2015-02-08 190008\Backup files 4.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2015-02-08 190008\Backup Files 2015-02-08 190008\Backup files 5.zip [36] Archive type: ZIP --> C/Users/Philipp/Desktop/Old Firefox Data/x58wzstd.default-1401113928928/extensions/{d6f4f1c0-77a5-4681-b173-dc623691f111}.xpi [37] Archive type: ZIP --> bootstrap.js [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [WARNING] Infected files in archives cannot be repaired --> lib/AddonObserver.js [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2015-02-08 190008\Backup Files 2015-02-08 190008\Backup files 5.zip [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware --> G:\PHILIPP-PC\Backup Set 2015-03-01 190006\Backup Files 2015-03-01 190006\Backup files 1.zip [36] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2015-03-01 190006\Backup Files 2015-03-01 190006\Backup files 7.zip [37] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [38] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [38] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [38] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [38] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2015-03-01 190006\Backup Files 2015-03-01 190006\Backup files 7.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2015-03-15 190006\Backup Files 2015-03-15 190006\Backup files 1.zip [37] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2015-03-15 190006\Backup Files 2015-03-15 190006\Backup files 5.zip [38] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [39] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [39] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [39] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [39] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2015-03-15 190006\Backup Files 2015-03-15 190006\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2015-03-29 190009\Backup Files 2015-03-29 190009\Backup files 1.zip [38] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2015-03-29 190009\Backup Files 2015-03-29 190009\Backup files 6.zip [39] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [40] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [40] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [40] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [40] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2015-03-29 190009\Backup Files 2015-03-29 190009\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2015-04-19 190007\Backup Files 2015-04-19 190007\Backup files 1.zip [39] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2015-04-19 190007\Backup Files 2015-04-19 190007\Backup files 6.zip [40] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [41] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [41] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [41] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [41] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2015-04-19 190007\Backup Files 2015-04-19 190007\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2015-05-03 190026\Backup Files 2015-05-03 190026\Backup files 1.zip [40] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2015-05-03 190026\Backup Files 2015-05-03 190026\Backup files 6.zip [41] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [42] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [42] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [42] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [42] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2015-05-03 190026\Backup Files 2015-05-03 190026\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2015-05-24 190008\Backup Files 2015-05-24 190008\Backup files 1.zip [41] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2015-05-24 190008\Backup Files 2015-05-24 190008\Backup files 6.zip [42] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [43] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [43] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [43] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [43] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2015-05-24 190008\Backup Files 2015-05-24 190008\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2015-06-14 190007\Backup Files 2015-06-14 190007\Backup files 1.zip [42] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2015-06-14 190007\Backup Files 2015-06-14 190007\Backup files 6.zip [43] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [44] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [44] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [44] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [44] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired |
19.04.2017, 13:25 | #8 |
| Windows-7-PC langsam, Avira findet Adware ohne Ende Avira, Teil 6: Code:
ATTFilter G:\PHILIPP-PC\Backup Set 2015-06-14 190007\Backup Files 2015-06-14 190007\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2015-07-05 190022\Backup Files 2015-07-05 190022\Backup files 1.zip [43] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2015-07-05 190022\Backup Files 2015-07-05 190022\Backup files 6.zip [44] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [45] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [45] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [45] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [45] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2015-07-05 190022\Backup Files 2015-07-05 190022\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2015-07-26 190018\Backup Files 2015-07-26 190018\Backup files 1.zip [44] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2015-07-26 190018\Backup Files 2015-07-26 190018\Backup files 5.zip [45] Archive type: ZIP --> C/Users/Philipp/AppData/Local/Mozilla/Firefox/Profiles/9s0hc6sl.default-1430862582424/cache2/entries/C84B15C99CEA60557ED7DB2E3323E68CB5555288 [46] Archive type: GZ --> Object [DETECTION] Contains recognition pattern of the JS/Obfus.jdk.11 Java script virus [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2015-07-26 190018\Backup Files 2015-07-26 190018\Backup files 5.zip [DETECTION] Contains recognition pattern of the JS/Obfus.jdk.11 Java script virus --> G:\PHILIPP-PC\Backup Set 2015-07-26 190018\Backup Files 2015-07-26 190018\Backup files 6.zip [45] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [46] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [46] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [46] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [46] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2015-07-26 190018\Backup Files 2015-07-26 190018\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2015-08-16 190003\Backup Files 2015-08-16 190003\Backup files 1.zip [45] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2015-08-16 190003\Backup Files 2015-08-16 190003\Backup files 5.zip [46] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [47] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [47] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [47] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [47] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2015-08-16 190003\Backup Files 2015-08-16 190003\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2015-08-16 190003\Backup Files 2015-09-06 190007\Backup files 1.zip [46] Archive type: ZIP --> C/Users/Philipp/AppData/Roaming/Mozilla/Firefox/Profiles/9s0hc6sl.default-1430862582424/extensions/{631a3931-ef2e-40d8-8b76-2eb6230bf84a}.xpi [47] Archive type: ZIP --> bootstrap.js [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [WARNING] Infected files in archives cannot be repaired --> lib/AddonObserver.js [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2015-08-16 190003\Backup Files 2015-09-06 190007\Backup files 1.zip [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware --> G:\PHILIPP-PC\Backup Set 2015-08-16 190003\Backup Files 2015-09-13 190009\Backup files 1.zip [46] Archive type: ZIP --> C/Users/Philipp/AppData/Roaming/Mozilla/Firefox/Profiles/9s0hc6sl.default-1430862582424/extensions/{631a3931-ef2e-40d8-8b76-2eb6230bf84a}.xpi [47] Archive type: ZIP --> bootstrap.js [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [WARNING] Infected files in archives cannot be repaired --> lib/AddonObserver.js [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2015-08-16 190003\Backup Files 2015-09-13 190009\Backup files 1.zip [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware --> G:\PHILIPP-PC\Backup Set 2015-09-20 190008\Backup Files 2015-09-20 190008\Backup files 1.zip [46] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2015-09-20 190008\Backup Files 2015-09-20 190008\Backup files 3.zip [47] Archive type: ZIP --> C/Users/Philipp/AppData/Roaming/Mozilla/Firefox/Profiles/9s0hc6sl.default-1430862582424/extensions/{631a3931-ef2e-40d8-8b76-2eb6230bf84a}.xpi [48] Archive type: ZIP --> bootstrap.js [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [WARNING] Infected files in archives cannot be repaired --> lib/AddonObserver.js [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2015-09-20 190008\Backup Files 2015-09-20 190008\Backup files 3.zip [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware --> G:\PHILIPP-PC\Backup Set 2015-09-20 190008\Backup Files 2015-09-20 190008\Backup files 6.zip [47] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [48] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [48] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [48] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2015-09-20 190008\Backup Files 2015-09-20 190008\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit --> G:\PHILIPP-PC\Backup Set 2015-09-20 190008\Backup Files 2015-09-20 190008\Backup files 7.zip [47] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [48] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2015-09-20 190008\Backup Files 2015-09-20 190008\Backup files 7.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2015-10-11 190009\Backup Files 2015-10-11 190009\Backup files 1.zip [47] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2015-10-11 190009\Backup Files 2015-10-11 190009\Backup files 3.zip [48] Archive type: ZIP --> C/Users/Philipp/AppData/Roaming/Mozilla/Firefox/Profiles/9s0hc6sl.default-1430862582424/extensions/{631a3931-ef2e-40d8-8b76-2eb6230bf84a}.xpi [49] Archive type: ZIP --> bootstrap.js [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [WARNING] Infected files in archives cannot be repaired --> lib/AddonObserver.js [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2015-10-11 190009\Backup Files 2015-10-11 190009\Backup files 3.zip [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware --> G:\PHILIPP-PC\Backup Set 2015-10-11 190009\Backup Files 2015-10-11 190009\Backup files 7.zip [48] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [49] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [49] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [49] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [49] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2015-10-11 190009\Backup Files 2015-10-11 190009\Backup files 7.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2015-11-01 190008\Backup Files 2015-11-01 190008\Backup files 1.zip [48] Archive type: ZIP --> G:\PHILIPP-PC\Backup Set 2015-11-01 190008\Backup Files 2015-11-01 190008\Backup files 7.zip [49] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [50] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [50] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [50] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [50] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2015-11-01 190008\Backup Files 2015-11-01 190008\Backup files 7.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2015-11-01 190008\Backup Files 2015-11-08 190008\Backup files 1.zip [49] Archive type: ZIP --> C/Users/Philipp/AppData/Roaming/Mozilla/Firefox/Profiles/d1g0pw9w.default-1444645305666/extensions/{195d8c90-85e5-4ee9-8f4d-44d0beca1b91}.xpi [50] Archive type: ZIP --> bootstrap.js [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [WARNING] Infected files in archives cannot be repaired --> lib/AddonObserver.js [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/Local/Mozilla/Firefox/Profiles/d1g0pw9w.default-1444645305666/cache2/entries/88EF24FE2BD79CF346531CE5E916131B5877BB2E [50] Archive type: ZIP --> bootstrap.js [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [WARNING] Infected files in archives cannot be repaired --> lib/AddonObserver.js [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2015-11-01 190008\Backup Files 2015-11-08 190008\Backup files 1.zip [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware --> G:\PHILIPP-PC\Backup Set 2015-11-22 190009\Backup Files 2015-11-22 190009\Backup files 5.zip [49] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [50] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [50] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [50] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [50] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2015-11-22 190009\Backup Files 2015-11-22 190009\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2015-12-13 190012\Backup Files 2015-12-13 190012\Backup files 5.zip [49] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [50] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [50] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [50] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [50] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired |
19.04.2017, 13:26 | #9 |
| Windows-7-PC langsam, Avira findet Adware ohne Ende Avira, Teil 7: Code:
ATTFilter G:\PHILIPP-PC\Backup Set 2015-12-13 190012\Backup Files 2015-12-13 190012\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2016-01-20 212751\Backup Files 2016-01-20 212751\Backup files 5.zip [49] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [50] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [50] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [50] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [50] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2016-01-20 212751\Backup Files 2016-01-20 212751\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2016-02-07 190011\Backup Files 2016-02-07 190011\Backup files 4.zip [49] Archive type: ZIP --> C/Users/Philipp/AppData/Local/Mozilla/Firefox/Profiles/lzk71ppa.default-1454532706038/cache2/entries/C84B15C99CEA60557ED7DB2E3323E68CB5555288 [50] Archive type: GZ --> Object [DETECTION] Contains recognition pattern of the JS/Obfus.jdk.11 Java script virus [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2016-02-07 190011\Backup Files 2016-02-07 190011\Backup files 4.zip [DETECTION] Contains recognition pattern of the JS/Obfus.jdk.11 Java script virus --> G:\PHILIPP-PC\Backup Set 2016-02-07 190011\Backup Files 2016-02-07 190011\Backup files 5.zip [49] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [50] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [50] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [50] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [50] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2016-02-07 190011\Backup Files 2016-02-07 190011\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2016-02-28 190017\Backup Files 2016-02-28 190017\Backup files 6.zip [49] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [50] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [50] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [50] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [50] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2016-02-28 190017\Backup Files 2016-02-28 190017\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2016-03-20 190213\Backup Files 2016-03-20 190213\Backup files 5.zip [49] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [50] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [50] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [50] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [50] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2016-03-20 190213\Backup Files 2016-03-20 190213\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2016-04-10 190016\Backup Files 2016-04-10 190016\Backup files 5.zip [49] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [50] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [50] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [50] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [50] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2016-04-10 190016\Backup Files 2016-04-10 190016\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2016-05-01 190333\Backup Files 2016-05-01 190333\Backup files 6.zip [49] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [50] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [50] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [50] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [50] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2016-05-01 190333\Backup Files 2016-05-01 190333\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2016-05-22 204634\Backup Files 2016-05-22 204634\Backup files 7.zip [49] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [50] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [50] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [50] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [50] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2016-05-22 204634\Backup Files 2016-05-22 204634\Backup files 7.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2016-07-03 190014\Backup Files 2016-07-03 190014\Backup files 7.zip [49] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [50] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [50] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [50] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [50] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2016-07-03 190014\Backup Files 2016-07-03 190014\Backup files 7.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2016-07-17 190009\Backup Files 2016-07-17 190009\Backup files 7.zip [49] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [50] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [50] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [50] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [50] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2016-07-17 190009\Backup Files 2016-07-17 190009\Backup files 7.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2016-07-31 190013\Backup Files 2016-07-31 190013\Backup files 4.zip [49] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [50] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [50] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [50] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [50] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2016-07-31 190013\Backup Files 2016-07-31 190013\Backup files 4.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2016-08-21 190007\Backup Files 2016-08-21 190007\Backup files 6.zip [49] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [50] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [50] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [50] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [50] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired |
19.04.2017, 13:27 | #10 |
| Windows-7-PC langsam, Avira findet Adware ohne Ende Avira, Teil 8: Code:
ATTFilter G:\PHILIPP-PC\Backup Set 2016-08-21 190007\Backup Files 2016-08-21 190007\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2016-09-11 190013\Backup Files 2016-09-11 190013\Backup files 7.zip [49] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [50] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [50] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [50] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [50] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2016-09-11 190013\Backup Files 2016-09-11 190013\Backup files 7.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2016-10-02 190018\Backup Files 2016-10-02 190018\Backup files 7.zip [49] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [50] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [50] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [50] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [50] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2016-10-02 190018\Backup Files 2016-10-02 190018\Backup files 7.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2016-10-23 190007\Backup Files 2016-10-23 190007\Backup files 7.zip [49] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [50] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [50] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [50] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [50] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2016-10-23 190007\Backup Files 2016-10-23 190007\Backup files 7.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2016-11-13 190009\Backup Files 2016-11-13 190009\Backup files 8.zip [49] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [50] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [50] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [50] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [50] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2016-11-13 190009\Backup Files 2016-11-13 190009\Backup files 8.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2016-12-04 190009\Backup Files 2016-12-04 190009\Backup files 9.zip [49] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [50] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [50] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [50] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [50] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2016-12-04 190009\Backup Files 2016-12-04 190009\Backup files 9.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2016-12-25 190018\Backup Files 2016-12-25 190018\Backup files 9.zip [49] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [50] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [50] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [50] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [50] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired |
19.04.2017, 13:28 | #11 |
| Windows-7-PC langsam, Avira findet Adware ohne Ende Avira, Teil 9 (der letzte): Code:
ATTFilter G:\PHILIPP-PC\Backup Set 2016-12-25 190018\Backup Files 2016-12-25 190018\Backup files 9.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2017-01-22 190020\Backup Files 2017-01-22 190020\Backup files 9.zip [49] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [50] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [50] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [50] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [50] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2017-01-22 190020\Backup Files 2017-01-22 190020\Backup files 9.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2017-03-12 190012\Backup Files 2017-03-12 190012\Backup files 9.zip [49] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [50] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [50] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [50] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [50] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2017-03-12 190012\Backup Files 2017-03-12 190012\Backup files 9.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit --> G:\PHILIPP-PC\Backup Set 2017-04-02 190007\Backup Files 2017-04-02 190007\Backup files 10.zip [49] Archive type: ZIP --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d [50] Archive type: ZIP --> Java_Security.class [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d [50] Archive type: ZIP --> Zanaxo.class [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit [WARNING] Infected files in archives cannot be repaired --> Vii.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit [WARNING] Infected files in archives cannot be repaired --> Third.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit [WARNING] Infected files in archives cannot be repaired --> Stuc.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit [WARNING] Infected files in archives cannot be repaired --> Seed.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit [WARNING] Infected files in archives cannot be repaired --> Momos.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit [WARNING] Infected files in archives cannot be repaired --> Kpcas.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit [WARNING] Infected files in archives cannot be repaired --> Fai.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit [WARNING] Infected files in archives cannot be repaired --> Atomic.class [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit [WARNING] Infected files in archives cannot be repaired --> Accord.class [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit [WARNING] Infected files in archives cannot be repaired --> u.class [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a [50] Archive type: ZIP --> CBaiAEA.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit [WARNING] Infected files in archives cannot be repaired --> FWBAhmA.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus [WARNING] Infected files in archives cannot be repaired --> kCHXi.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus [WARNING] Infected files in archives cannot be repaired --> uEjwBpl.class [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus [WARNING] Infected files in archives cannot be repaired --> xlLxeUH.class [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [WARNING] Infected files in archives cannot be repaired --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383 [50] Archive type: ZIP --> main.class [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [WARNING] Infected files in archives cannot be repaired G:\PHILIPP-PC\Backup Set 2017-04-02 190007\Backup Files 2017-04-02 190007\Backup files 10.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit The file 'G:\RECYCLER\S-1-5-21-1935655697-688789844-1343024091-1003\Dg149\Programme Fragezeichen\MediaMonkey\UninstDP.exe' was scanned with the Protection Cloud. SHA256 = AFDE0ED6FC0D35A1ABEBE696AF6715422CA81B77E365CA6B39CB8EA42E75092C The file 'G:\RECYCLER\S-1-5-21-1935655697-688789844-1343024091-1003\Dg149\Programme Fragezeichen\Opera\uninst\OpUninst.exe' was scanned with the Protection Cloud. SHA256 = 52328FA7A1CE3BCA8DABCF51921063266822AFEDEEDAC286ECE538708151FC2C The file 'G:\RECYCLER\S-1-5-21-1935655697-688789844-1343024091-1003\Dg149\Programme Fragezeichen\Opera\uninst\unwise.exe' was scanned with the Protection Cloud. SHA256 = 4751A3547F3B482BB4A2440D4E91E3DCBA9B4B0F5B1BB50416A32FB47AE75C5E Begin scan in 'Q:\' Search path Q:\ could not be opened! System error [5]: Zugriff verweigert Beginning disinfection: G:\PHILIPP-PC\Backup Set 2017-04-02 190007\Backup Files 2017-04-02 190007\Backup files 10.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '5f242dd8.qua'! G:\PHILIPP-PC\Backup Set 2017-03-12 190012\Backup Files 2017-03-12 190012\Backup files 9.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '47b30273.qua'! G:\PHILIPP-PC\Backup Set 2017-01-22 190020\Backup Files 2017-01-22 190020\Backup files 9.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '15ec58fd.qua'! G:\PHILIPP-PC\Backup Set 2016-12-25 190018\Backup Files 2016-12-25 190018\Backup files 9.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '73db1714.qua'! G:\PHILIPP-PC\Backup Set 2016-12-04 190009\Backup Files 2016-12-04 190009\Backup files 9.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '365f3a3c.qua'! G:\PHILIPP-PC\Backup Set 2016-11-13 190009\Backup Files 2016-11-13 190009\Backup files 8.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '49440fac.qua'! G:\PHILIPP-PC\Backup Set 2016-10-23 190007\Backup Files 2016-10-23 190007\Backup files 7.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '05fc23f2.qua'! G:\PHILIPP-PC\Backup Set 2016-10-02 190018\Backup Files 2016-10-02 190018\Backup files 7.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '79e46390.qua'! G:\PHILIPP-PC\Backup Set 2016-09-11 190013\Backup Files 2016-09-11 190013\Backup files 7.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '54be4ccf.qua'! G:\PHILIPP-PC\Backup Set 2016-08-21 190007\Backup Files 2016-08-21 190007\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '4dd6775e.qua'! G:\PHILIPP-PC\Backup Set 2016-07-31 190013\Backup Files 2016-07-31 190013\Backup files 4.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '218a5b12.qua'! G:\PHILIPP-PC\Backup Set 2016-07-17 190009\Backup Files 2016-07-17 190009\Backup files 7.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '50336295.qua'! G:\PHILIPP-PC\Backup Set 2016-07-03 190014\Backup Files 2016-07-03 190014\Backup files 7.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '5e29525d.qua'! G:\PHILIPP-PC\Backup Set 2016-05-22 204634\Backup Files 2016-05-22 204634\Backup files 7.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '1b002b22.qua'! G:\PHILIPP-PC\Backup Set 2016-05-01 190333\Backup Files 2016-05-01 190333\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '120b2f9c.qua'! G:\PHILIPP-PC\Backup Set 2016-04-10 190016\Backup Files 2016-04-10 190016\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '4a4a36f9.qua'! G:\PHILIPP-PC\Backup Set 2016-03-20 190213\Backup Files 2016-03-20 190213\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '66be4fc2.qua'! G:\PHILIPP-PC\Backup Set 2016-02-28 190017\Backup Files 2016-02-28 190017\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '58402f03.qua'! G:\PHILIPP-PC\Backup Set 2016-02-07 190011\Backup Files 2016-02-07 190011\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '3b4e0479.qua'! G:\PHILIPP-PC\Backup Set 2016-02-07 190011\Backup Files 2016-02-07 190011\Backup files 4.zip [DETECTION] Contains recognition pattern of the JS/Obfus.jdk.11 Java script virus [NOTE] The file was moved to the quarantine directory under the name '1d86443a.qua'! G:\PHILIPP-PC\Backup Set 2016-01-20 212751\Backup Files 2016-01-20 212751\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '2f123f95.qua'! G:\PHILIPP-PC\Backup Set 2015-12-13 190012\Backup Files 2015-12-13 190012\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '255714ff.qua'! G:\PHILIPP-PC\Backup Set 2015-11-22 190009\Backup Files 2015-11-22 190009\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '1a047084.qua'! G:\PHILIPP-PC\Backup Set 2015-11-01 190008\Backup Files 2015-11-08 190008\Backup files 1.zip [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [NOTE] The file was moved to the quarantine directory under the name '64287d66.qua'! G:\PHILIPP-PC\Backup Set 2015-11-01 190008\Backup Files 2015-11-01 190008\Backup files 7.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '315079a4.qua'! G:\PHILIPP-PC\Backup Set 2015-10-11 190009\Backup Files 2015-10-11 190009\Backup files 7.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '3cc60894.qua'! G:\PHILIPP-PC\Backup Set 2015-10-11 190009\Backup Files 2015-10-11 190009\Backup files 3.zip [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [NOTE] The file was moved to the quarantine directory under the name '209b1c94.qua'! G:\PHILIPP-PC\Backup Set 2015-09-20 190008\Backup Files 2015-09-20 190008\Backup files 7.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '1148512b.qua'! G:\PHILIPP-PC\Backup Set 2015-09-20 190008\Backup Files 2015-09-20 190008\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [NOTE] The file was moved to the quarantine directory under the name '7d1e451a.qua'! G:\PHILIPP-PC\Backup Set 2015-09-20 190008\Backup Files 2015-09-20 190008\Backup files 3.zip [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [NOTE] The file was moved to the quarantine directory under the name '3484600e.qua'! G:\PHILIPP-PC\Backup Set 2015-08-16 190003\Backup Files 2015-09-13 190009\Backup files 1.zip [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [NOTE] The file was moved to the quarantine directory under the name '6f1168e4.qua'! G:\PHILIPP-PC\Backup Set 2015-08-16 190003\Backup Files 2015-09-06 190007\Backup files 1.zip [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [NOTE] The file was moved to the quarantine directory under the name '09a36419.qua'! G:\PHILIPP-PC\Backup Set 2015-08-16 190003\Backup Files 2015-08-16 190003\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '5e2d16bc.qua'! G:\PHILIPP-PC\Backup Set 2015-07-26 190018\Backup Files 2015-07-26 190018\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '7c5d4133.qua'! G:\PHILIPP-PC\Backup Set 2015-07-26 190018\Backup Files 2015-07-26 190018\Backup files 5.zip [DETECTION] Contains recognition pattern of the JS/Obfus.jdk.11 Java script virus [NOTE] The file was moved to the quarantine directory under the name '144d3bac.qua'! G:\PHILIPP-PC\Backup Set 2015-07-05 190022\Backup Files 2015-07-05 190022\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '343b3f3d.qua'! G:\PHILIPP-PC\Backup Set 2015-06-14 190007\Backup Files 2015-06-14 190007\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '611f79b5.qua'! G:\PHILIPP-PC\Backup Set 2015-05-24 190008\Backup Files 2015-05-24 190008\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '003f581e.qua'! G:\PHILIPP-PC\Backup Set 2015-05-03 190026\Backup Files 2015-05-03 190026\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '65931a9a.qua'! G:\PHILIPP-PC\Backup Set 2015-04-19 190007\Backup Files 2015-04-19 190007\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '00446e49.qua'! G:\PHILIPP-PC\Backup Set 2015-03-29 190009\Backup Files 2015-03-29 190009\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '13a052c0.qua'! G:\PHILIPP-PC\Backup Set 2015-03-15 190006\Backup Files 2015-03-15 190006\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '01192e4a.qua'! G:\PHILIPP-PC\Backup Set 2015-03-01 190006\Backup Files 2015-03-01 190006\Backup files 7.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '16494dff.qua'! G:\PHILIPP-PC\Backup Set 2015-02-08 190008\Backup Files 2015-02-08 190008\Backup files 5.zip [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [NOTE] The file was moved to the quarantine directory under the name '4c6b7f78.qua'! G:\PHILIPP-PC\Backup Set 2015-02-08 190008\Backup Files 2015-02-08 190008\Backup files 4.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '69660568.qua'! G:\PHILIPP-PC\Backup Set 2015-01-18 190006\Backup Files 2015-01-18 190006\Backup files 4.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '1d3d1eee.qua'! G:\PHILIPP-PC\Backup Set 2015-01-18 190006\Backup Files 2015-01-18 190006\Backup files 2.zip [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [NOTE] The file was moved to the quarantine directory under the name '3f3f4c6d.qua'! G:\PHILIPP-PC\Backup Set 2014-12-28 190007\Backup Files 2014-12-28 190007\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '4aac346f.qua'! G:\PHILIPP-PC\Backup Set 2014-12-28 190007\Backup Files 2014-12-28 190007\Backup files 2.zip [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [NOTE] The file was moved to the quarantine directory under the name '61fb6866.qua'! G:\PHILIPP-PC\Backup Set 2014-12-10 221250\Backup Files 2014-12-21 190006\Backup files 1.zip [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware [NOTE] The file was moved to the quarantine directory under the name '069c20e3.qua'! G:\PHILIPP-PC\Backup Set 2014-12-10 221250\Backup Files 2014-12-10 221250\Backup files 4.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '4dec19fe.qua'! G:\PHILIPP-PC\Backup Set 2014-10-05 190006\Backup Files 2014-10-05 190006\Backup files 4.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '4d1213b5.qua'! G:\PHILIPP-PC\Backup Set 2014-09-21 190018\Backup Files 2014-09-21 190018\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '07bd46ad.qua'! G:\PHILIPP-PC\Backup Set 2014-09-08 150856\Backup Files 2014-09-08 150856\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '69946912.qua'! G:\PHILIPP-PC\Backup Set 2014-08-17 190003\Backup Files 2014-08-17 190003\Backup files 4.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '24b43764.qua'! G:\PHILIPP-PC\Backup Set 2014-07-27 190007\Backup Files 2014-07-27 190007\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '4c901046.qua'! G:\PHILIPP-PC\Backup Set 2014-07-06 190011\Backup Files 2014-07-06 190011\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '36212a83.qua'! G:\PHILIPP-PC\Backup Set 2014-06-15 190009\Backup Files 2014-06-15 190009\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '477376fb.qua'! G:\PHILIPP-PC\Backup Set 2014-05-25 190010\Backup Files 2014-05-25 190010\Backup files 4.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '37945ce6.qua'! G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-05-11 190007\Backup files 9.zip [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [NOTE] The file was moved to the quarantine directory under the name '4ce420b7.qua'! G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-04-13 190009\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '02bf53c6.qua'! G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-04-13 190009\Backup files 3.zip [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen [NOTE] The file was moved to the quarantine directory under the name '7cc42914.qua'! G:\PHILIPP-PC\Backup Set 2014-03-30 190008\Backup Files 2014-03-30 190008\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '085e016b.qua'! G:\PHILIPP-PC\Backup Set 2014-03-30 190008\Backup Files 2014-03-30 190008\Backup files 3.zip [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen [NOTE] The file was moved to the quarantine directory under the name '036a5d19.qua'! G:\PHILIPP-PC\Backup Set 2014-03-02 190003\Backup Files 2014-03-02 190003\Backup files 6.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '50b24eee.qua'! G:\PHILIPP-PC\Backup Set 2014-03-02 190003\Backup Files 2014-03-02 190003\Backup files 3.zip [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen [NOTE] The file was moved to the quarantine directory under the name '35db658e.qua'! G:\PHILIPP-PC\Backup Set 2014-02-09 190003\Backup Files 2014-02-09 190003\Backup files 4.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '1d203531.qua'! G:\PHILIPP-PC\Backup Set 2014-02-09 190003\Backup Files 2014-02-09 190003\Backup files 3.zip [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen [NOTE] The file was moved to the quarantine directory under the name '69836cff.qua'! G:\PHILIPP-PC\Backup Set 2014-01-26 190004\Backup Files 2014-02-02 190007\Backup files 1.zip [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen [NOTE] The file was moved to the quarantine directory under the name '268e1479.qua'! G:\PHILIPP-PC\Backup Set 2014-01-26 190004\Backup Files 2014-01-26 190004\Backup files 5.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '195a4dc8.qua'! G:\PHILIPP-PC\Backup Set 2013-12-15 190011\Backup Files 2013-12-15 190011\Backup files 4.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '636c4e43.qua'! G:\PHILIPP-PC\Backup Set 2013-11-24 190006\Backup Files 2013-11-24 190006\Backup files 3.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '3364493e.qua'! G:\PHILIPP-PC\Backup Set 2013-11-03 190004\Backup Files 2013-11-03 190004\Backup files 3.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '656c4361.qua'! G:\PHILIPP-PC\Backup Set 2013-09-27 192833\Backup Files 2013-09-27 192833\Backup files 3.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '22dc47ba.qua'! G:\PHILIPP-PC\Backup Set 2013-09-01 190003\Backup Files 2013-09-01 190003\Backup files 3.zip [DETECTION] Contains recognition pattern of a probably damaged CC/00256 sample [NOTE] The file was moved to the quarantine directory under the name '019026c5.qua'! G:\PHILIPP-PC\Backup Set 2013-08-04 190004\Backup Files 2013-08-04 190004\Backup files 3.zip [DETECTION] Contains recognition pattern of a probably damaged CC/00256 sample [NOTE] The file was moved to the quarantine directory under the name '461b0f22.qua'! G:\PHILIPP-PC\Backup Set 2013-07-14 190009\Backup Files 2013-07-14 190009\Backup files 3.zip [DETECTION] Contains recognition pattern of a probably damaged CC/00256 sample [NOTE] The file was moved to the quarantine directory under the name '347f5cb3.qua'! G:\PHILIPP-PC\Backup Set 2013-06-30 213122\Backup Files 2013-06-30 213122\Backup files 3.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '1f101fbf.qua'! G:\PHILIPP-PC\Backup Set 2013-06-09 194227\Backup Files 2013-06-24 174918\Backup files 1.zip [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [NOTE] The file was moved to the quarantine directory under the name '5c891137.qua'! G:\PHILIPP-PC\Backup Set 2013-06-09 194227\Backup Files 2013-06-09 194227\Backup files 3.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '1647680b.qua'! G:\PHILIPP-PC\Backup Set 2013-05-26 190009\Backup Files 2013-05-26 190009\Backup files 3.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '1b0f76bf.qua'! G:\PHILIPP-PC\Backup Set 2013-05-06 172759\Backup Files 2013-05-06 172759\Backup files 3.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '34e53e5a.qua'! G:\PHILIPP-PC\Backup Set 2013-04-14 190002\Backup Files 2013-04-14 190002\Backup files 3.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '0b21774c.qua'! G:\PHILIPP-PC\Backup Set 2013-03-27 140706\Backup Files 2013-03-27 140706\Backup files 3.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '34c661dc.qua'! G:\PHILIPP-PC\Backup Set 2013-03-03 230723\Backup Files 2013-03-03 230723\Backup files 3.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '511f3115.qua'! G:\PHILIPP-PC\Backup Set 2013-02-03 190007\Backup Files 2013-02-10 190004\Backup files 1.zip [DETECTION] Contains recognition pattern of the HTML/Redirect.00 HTML script virus [NOTE] The file was moved to the quarantine directory under the name '773e1675.qua'! G:\PHILIPP-PC\Backup Set 2013-02-03 190007\Backup Files 2013-02-03 190007\Backup files 3.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '7b934534.qua'! G:\PHILIPP-PC\Backup Set 2013-01-13 190004\Backup Files 2013-01-13 190004\Backup files 3.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '4ef933e8.qua'! G:\PHILIPP-PC\Backup Set 2012-12-24 124445\Backup Files 2012-12-24 124445\Backup files 2.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '35d934af.qua'! G:\PHILIPP-PC\Backup Set 2012-12-02 210546\Backup Files 2012-12-02 210546\Backup files 2.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '13d9318d.qua'! G:\PHILIPP-PC\Backup Set 2012-11-18 190005\Backup Files 2012-11-18 190005\Backup files 2.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '7f547c5e.qua'! G:\PHILIPP-PC\Backup Set 2012-10-28 190002\Backup Files 2012-10-28 190002\Backup files 2.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '5f386916.qua'! G:\PHILIPP-PC\Backup Set 2012-10-07 190005\Backup Files 2012-10-07 190005\Backup files 2.zip [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '383f03f3.qua'! F:\Eff\Installers\agsetup183se.exe [DETECTION] Contains virus patterns of Adware ADWARE/DealPly.Y [NOTE] The file was moved to the quarantine directory under the name '45c96036.qua'! C:\Users\Philipp\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\48\6f40e570-1d303383 [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '19b16f2e.qua'! C:\Users\Philipp\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\31\5565fadf-5e43bc2a [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit [NOTE] The file was moved to the quarantine directory under the name '51e8540d.qua'! C:\Users\Philipp\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\23\690a7d57-633d556d [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit [NOTE] The file was moved to the quarantine directory under the name '3f3a390b.qua'! C:\Users\Philipp\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\14\458aee8e-50c8aa6d [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus [NOTE] The file was moved to the quarantine directory under the name '1af56751.qua'! End of the scan: Dienstag, 18. April 2017 22:42 Used time: 7:39:29 Hour(s) The scan has been done completely. 41526 Scanned directories 5803631 Files were scanned 1404 Viruses and/or unwanted programs were found 0 Files were classified as suspicious 0 Files were deleted 0 Viruses and unwanted programs were repaired 98 Files were moved to quarantine 0 Files were renamed 0 Files cannot be scanned 5802227 Files not concerned 127634 Archives were scanned 1311 Warnings 98 Notes 1285610 Objects were scanned with rootkit scan 0 Hidden objects were found |
19.04.2017, 13:49 | #12 |
/// Winkelfunktion /// TB-Süch-Tiger™ | Windows-7-PC langsam, Avira findet Adware ohne Ende Es gibt auch Helfer die ZIPs bzw Logs in Anhängen annehmen, ich mag die aber nicht, die erschweren die Arbeit. Eben die genannten Gründe im Lesestoff. Scan mit Farbar's Recovery Scan Tool (FRST) Bitte lade dir die passende Version von Farbar's Recovery Scan Tool auf deinen Desktop: FRST 32-Bit | FRST 64-Bit (Wenn du nicht sicher bist: Lade beide Versionen oder unter Start > Computer (Rechtsklick) > Eigenschaften nachschauen)
__________________ Logfiles bitte immer in CODE-Tags posten |
19.04.2017, 14:13 | #13 |
| Windows-7-PC langsam, Avira findet Adware ohne Ende FRST: Code:
ATTFilter Untersuchungsergebnis von Farbar Recovery Scan Tool (FRST) (x64) Version: 17-04-2017 01 durchgeführt von Philipp (Administrator) auf PHILIPP-PC (19-04-2017 13:55:08) Gestartet von C:\Users\Philipp\Desktop Geladene Profile: Philipp (Verfügbare Profile: Philipp) Platform: Windows 7 Home Premium Service Pack 1 (X64) Sprache: Deutsch (Deutschland) Internet Explorer Version 11 (Standard-Browser: "C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe" -- "%1") Start-Modus: Normal Anleitung für Farbar Recovery Scan Tool: hxxp://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/ ==================== Prozesse (Nicht auf der Ausnahmeliste) ================= (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird der Prozess geschlossen. Die Datei wird nicht verschoben.) (Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\sched.exe (Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\avguard.exe (Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\VPN\Avira.VpnService.exe (Intel Corporation) C:\Windows\System32\igfxpers.exe (Groom-A-Zebu (tm) ) C:\Program Files (x86)\Proxomitron Naoko-4\Proxomitron.exe (Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe (BlackBerry Limited) C:\Program Files (x86)\Common Files\Research In Motion\USB Drivers\RIMBBLaunchAgent.exe (BlackBerry Limited) C:\Program Files (x86)\Common Files\Research In Motion\Tunnel Manager\PeerManager.exe (Telegram Messenger LLP) C:\Users\Philipp\AppData\Roaming\Telegram Desktop\Telegram.exe (Apple Inc.) C:\Program Files (x86)\Common Files\Research In Motion\Tunnel Manager\mDNSResponder.exe (Microsoft Corporation) C:\Program Files (x86)\Microsoft Application Virtualization Client\sftvsa.exe (Telefónica I+D) C:\Program Files (x86)\o2\Mobile Connection Manager\ImpWiFiSvc.exe (Microsoft Corp.) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE (BlackBerry Limited) C:\Program Files (x86)\Common Files\Research In Motion\Tunnel Manager\tunmgr.exe (Microsoft Corporation) C:\Program Files (x86)\Microsoft Application Virtualization Client\sftlist.exe (Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\Launcher\Avira.ServiceHost.exe (Microsoft Corp.) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVCM.EXE (Microsoft Corporation) C:\Program Files (x86)\Common Files\microsoft shared\Virtualization Handler\CVHSVC.EXE (Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\Launcher\Avira.Systray.exe (Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\avshadow.exe (BlackBerry Limited) C:\Program Files (x86)\Common Files\Research In Motion\USB Drivers\BbDevMgr.exe () C:\Program Files (x86)\Common Files\Research In Motion\nginx\nginx.exe () C:\Program Files (x86)\Common Files\Research In Motion\nginx\nginx.exe (Microsoft Corporation) C:\Windows\System32\rundll32.exe (Microsoft Corporation) C:\Windows\System32\dllhost.exe (Nero AG) C:\Program Files (x86)\Nero\Update\NASvc.exe (Vivaldi Technologies AS) C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe (Vivaldi Technologies AS) C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe (Vivaldi Technologies AS) C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe (Vivaldi Technologies AS) C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe (Vivaldi Technologies AS) C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe (Vivaldi Technologies AS) C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe (Vivaldi Technologies AS) C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe (Vivaldi Technologies AS) C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe (Vivaldi Technologies AS) C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe (Vivaldi Technologies AS) C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe (Nullsoft, Inc.) C:\Program Files (x86)\Winamp\winamp.exe ==================== Registry (Nicht auf der Ausnahmeliste) ==================== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird der Registryeintrag auf den Standardwert zurückgesetzt oder entfernt. Die Datei wird nicht verschoben.) HKLM-x32\...\Run: [avgnt] => C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe [909744 2017-03-22] (Avira Operations GmbH & Co. KG) HKLM-x32\...\Run: [Avira SystrayStartTrigger] => C:\Program Files (x86)\Avira\Launcher\Avira.SystrayStartTrigger.exe [63432 2017-03-09] (Avira Operations GmbH & Co. KG) HKLM-x32\...\Run: [RIMBBLaunchAgent.exe] => C:\Program Files (x86)\Common Files\Research In Motion\USB Drivers\RIMBBLaunchAgent.exe [443640 2014-10-31] (BlackBerry Limited) HKLM-x32\...\Run: [RIM PeerManager] => C:\Program Files (x86)\Common Files\Research In Motion\Tunnel Manager\PeerManager.exe [4730616 2015-05-26] (BlackBerry Limited) Winlogon\Notify\igfxcui: C:\Windows\system32\igfxdev.dll (Intel Corporation) HKU\S-1-5-21-3455811494-3201091269-2129086357-1000\...\Run: [GoogleChromeAutoLaunch_3C13D6FD3AC52ECDF6F1A6C02C137E1A] => C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe [851064 2017-04-07] (Vivaldi Technologies AS) HKU\S-1-5-21-3455811494-3201091269-2129086357-1000\...\MountPoints2: {38b2e01f-1c7c-11e3-a18e-d067e502f425} - G:\AutoRun.exe HKU\S-1-5-21-3455811494-3201091269-2129086357-1000\...\MountPoints2: {84e15aa1-1bb3-11e3-bf79-d067e502f425} - G:\AutoRun.exe HKU\S-1-5-21-3455811494-3201091269-2129086357-1000\...\MountPoints2: {84e15aad-1bb3-11e3-bf79-d067e502f425} - G:\AutoRun.exe Startup: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\The Proxomitron.lnk [2011-09-16] ShortcutTarget: The Proxomitron.lnk -> C:\Program Files (x86)\Proxomitron Naoko-4\Proxomitron.exe (Groom-A-Zebu (tm) ) Startup: C:\Users\Philipp\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.lnk [2017-04-14] ShortcutTarget: Telegram.lnk -> C:\Users\Philipp\AppData\Roaming\Telegram Desktop\Telegram.exe (Telegram Messenger LLP) ==================== Internet (Nicht auf der Ausnahmeliste) ==================== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird der Eintrag entfernt oder auf den Standardwert zurückgesetzt, wenn es sich um einen Registryeintrag handelt.) Tcpip\Parameters: [DhcpNameServer] 192.168.178.1 Tcpip\..\Interfaces\{0AD71848-FD2A-4331-B69C-1AAEFEBA4E24}: [DhcpNameServer] 192.168.178.1 Tcpip\..\Interfaces\{705424B9-6759-4A35-8829-9251D5B87DC4}: [DhcpNameServer] 192.168.178.1 Tcpip\..\Interfaces\{97393977-B140-4A1D-BB17-64E38DF4E81E}: [DhcpNameServer] 192.168.178.1 Tcpip\..\Interfaces\{F78DDDEC-CFF3-4366-9DDB-D54CD46D6C00}: [DhcpNameServer] 192.168.178.1 Internet Explorer: ================== HKU\S-1-5-21-3455811494-3201091269-2129086357-1000\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://www.google.de/ HKU\S-1-5-21-3455811494-3201091269-2129086357-1000\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://g.uk.msn.com/USCON/8 URLSearchHook: HKU\S-1-5-21-3455811494-3201091269-2129086357-1000 - (Kein Name) - {c840e246-6b95-475e-9bd7-caa1c7eca9f2} - Keine Datei SearchScopes: HKLM -> DefaultScope {49606DC7-976D-4030-A74E-9FB5C842FA68} URL = hxxp://www.bing.com/search?q={searchTerms}&form=DLCDF8&pc=MDDC&src=IE-SearchBox SearchScopes: HKLM -> {49606DC7-976D-4030-A74E-9FB5C842FA68} URL = hxxp://www.bing.com/search?q={searchTerms}&form=DLCDF8&pc=MDDC&src=IE-SearchBox SearchScopes: HKLM-x32 -> DefaultScope {49606DC7-976D-4030-A74E-9FB5C842FA68} URL = hxxp://www.bing.com/search?q={searchTerms}&form=DLCDF8&pc=MDDC&src=IE-SearchBox SearchScopes: HKLM-x32 -> {49606DC7-976D-4030-A74E-9FB5C842FA68} URL = hxxp://www.bing.com/search?q={searchTerms}&form=DLCDF8&pc=MDDC&src=IE-SearchBox SearchScopes: HKLM-x32 -> {afdbddaa-5d3f-42ee-b79c-185a7020515b} URL = hxxp://search.conduit.com/ResultsExt.aspx?q={searchTerms}&SearchSource=4&ctid=CT2851647 SearchScopes: HKU\S-1-5-21-3455811494-3201091269-2129086357-1000 -> DefaultScope {49606DC7-976D-4030-A74E-9FB5C842FA68} URL = SearchScopes: HKU\S-1-5-21-3455811494-3201091269-2129086357-1000 -> {49606DC7-976D-4030-A74E-9FB5C842FA68} URL = SearchScopes: HKU\S-1-5-21-3455811494-3201091269-2129086357-1000 -> {FFEBBF0A-C22C-4172-89FF-45215A135AC7} URL = hxxp://go.mail.ru/search?q={searchTerms}&utf8in=1&fr=ietb BHO: Java(tm) Plug-In SSV Helper -> {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} -> C:\Program Files\Java\jre7\bin\ssv.dll [2014-06-01] (Oracle Corporation) BHO: Windows Live ID Sign-in Helper -> {9030D464-4C02-4ABF-8ECC-5164760863C6} -> C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll [2010-09-21] (Microsoft Corp.) BHO: Office Document Cache Handler -> {B4F3A835-0E21-4959-BA22-42B3008E02FF} -> C:\Program Files\Microsoft Office\Office14\URLREDIR.DLL [2013-03-06] (Microsoft Corporation) BHO: Java(tm) Plug-In 2 SSV Helper -> {DBC80044-A445-435b-BC74-9C25C1C588A9} -> C:\Program Files\Java\jre7\bin\jp2ssv.dll [2014-06-01] (Oracle Corporation) BHO-x32: Java(tm) Plug-In SSV Helper -> {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} -> C:\Program Files (x86)\Java\jre7\bin\ssv.dll [2013-06-25] (Oracle Corporation) BHO-x32: Windows Live ID-Anmelde-Hilfsprogramm -> {9030D464-4C02-4ABF-8ECC-5164760863C6} -> C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll [2010-09-21] (Microsoft Corp.) BHO-x32: Office Document Cache Handler -> {B4F3A835-0E21-4959-BA22-42B3008E02FF} -> C:\Program Files (x86)\Microsoft Office\Office14\URLREDIR.DLL [2013-03-06] (Microsoft Corporation) BHO-x32: AviraBrowserSafety.BrowserSafety -> {c3c77255-42c0-499f-b664-6e981a0b1647} -> C:\Windows\system32\mscoree.dll [2010-11-21] (Microsoft Corporation) BHO-x32: Java(tm) Plug-In 2 SSV Helper -> {DBC80044-A445-435b-BC74-9C25C1C588A9} -> C:\Program Files (x86)\Java\jre7\bin\jp2ssv.dll [2013-06-25] (Oracle Corporation) Handler-x32: abs - {E00957BD-D0E1-4eb9-A025-7743FDC8B27B} - C:\Windows\system32\mscoree.dll [2010-11-21] (Microsoft Corporation) Handler-x32: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\Program Files (x86)\Common Files\Skype\Skype4COM.dll [2017-01-01] (Skype Technologies) FireFox: ======== FF ProfilePath: C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\lzk71ppa.default-1454532706038 [2017-04-16] FF Extension: (crowd_bar) - C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\lzk71ppa.default-1454532706038\Extensions\jid1-XGbYhwCViPEOUQ@jetpack.xpi [2016-11-12] FF Extension: (Disable Prefetch) - C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\lzk71ppa.default-1454532706038\features\{3a1ce062-c816-4574-b9e1-a4cdbf9e7b0b}\disable-prefetch@mozilla.org.xpi [2017-04-10] FF ProfilePath: C:\Users\Philipp\AppData\Roaming\Greyfirst\Celtx\Profiles\o0ktb274.default [2012-12-05] FF Extension: (Timezone Definitions for Mozilla Calendar) - C:\Program Files (x86)\Celtx\extensions\calendar-timezones@mozilla.org [2012-10-24] [ist nicht signiert] FF Extension: (Default Shot Palette) - C:\Program Files (x86)\Celtx\extensions\default-palette@celtx.com [2012-10-24] [ist nicht signiert] FF Extension: (DOM Inspector) - C:\Program Files (x86)\Celtx\extensions\inspector@mozilla.org [2012-10-24] [ist nicht signiert] FF Extension: (Java Console) - C:\Program Files (x86)\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0033-ABCDEFFEDCBA} [2016-12-10] [ist nicht signiert] FF Extension: (Java Console) - C:\Program Files (x86)\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0035-ABCDEFFEDCBA} [2016-12-10] [ist nicht signiert] FF Extension: (Java Console) - C:\Program Files (x86)\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0037-ABCDEFFEDCBA} [2016-12-10] [ist nicht signiert] FF Extension: (Site Deployment Checker) - C:\Program Files (x86)\Mozilla Firefox\browser\features\deployment-checker@mozilla.org.xpi [2017-04-11] [ist nicht signiert] FF Plugin: @adobe.com/FlashPlayer -> C:\Windows\system32\Macromed\Flash\NPSWF64_25_0_0_148.dll [2017-04-13] () FF Plugin: @java.com/DTPlugin,version=10.60.2 -> C:\Program Files\Java\jre7\bin\dtplugin\npDeployJava1.dll [2014-06-01] (Oracle Corporation) FF Plugin: @java.com/JavaPlugin,version=10.60.2 -> C:\Program Files\Java\jre7\bin\plugin2\npjp2.dll [2014-06-01] (Oracle Corporation) FF Plugin: @microsoft.com/GENUINE -> disabled [Keine Datei] FF Plugin: @Microsoft.com/NpCtrl,version=1.0 -> C:\Program Files\Microsoft Silverlight\5.1.50906.0\npctrl.dll [2017-03-09] ( Microsoft Corporation) FF Plugin: @microsoft.com/OfficeAuthz,version=14.0 -> C:\PROGRA~1\MICROS~2\Office14\NPAUTHZ.DLL [2010-01-09] (Microsoft Corporation) FF Plugin-x32: @adobe.com/FlashPlayer -> C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_25_0_0_148.dll [2017-04-13] () FF Plugin-x32: @adobe.com/ShockwavePlayer -> C:\Windows\SysWOW64\Adobe\Director\np32dsw_1168638.dll [2012-10-04] (Adobe Systems, Inc.) FF Plugin-x32: @java.com/DTPlugin,version=10.25.2 -> C:\Windows\SysWOW64\npDeployJava1.dll [2013-06-25] (Oracle Corporation) FF Plugin-x32: @java.com/JavaPlugin,version=10.25.2 -> C:\Program Files (x86)\Java\jre7\bin\plugin2\npjp2.dll [2013-06-25] (Oracle Corporation) FF Plugin-x32: @microsoft.com/GENUINE -> disabled [Keine Datei] FF Plugin-x32: @Microsoft.com/NpCtrl,version=1.0 -> C:\Program Files (x86)\Microsoft Silverlight\5.1.50906.0\npctrl.dll [2017-03-09] ( Microsoft Corporation) FF Plugin-x32: @microsoft.com/OfficeAuthz,version=14.0 -> C:\PROGRA~2\MICROS~1\Office14\NPAUTHZ.DLL [2010-01-09] (Microsoft Corporation) FF Plugin-x32: @microsoft.com/SharePoint,version=14.0 -> C:\PROGRA~2\MICROS~1\Office14\NPSPWRAP.DLL [2010-03-24] (Microsoft Corporation) FF Plugin-x32: @microsoft.com/WLPG,version=15.4.3502.0922 -> C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll [2010-11-10] (Microsoft Corporation) FF Plugin-x32: @microsoft.com/WLPG,version=15.4.3508.1109 -> C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll [2010-11-10] (Microsoft Corporation) FF Plugin-x32: @RIM.com/WebSLLauncher,version=1.0 -> C:\Program Files (x86)\Common Files\Research In Motion\BBWebSLLauncher\NPWebSLLauncher.dll [2015-05-22] () FF Plugin-x32: Adobe Reader -> C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\nppdf32.dll [2017-04-05] (Adobe Systems Inc.) FF Plugin HKU\S-1-5-21-3455811494-3201091269-2129086357-1000: SkypePlugin -> C:\Users\Philipp\AppData\Local\SkypePlugin\7.18.0.51\npGatewayNpapi.dll [2016-04-25] (Skype Technologies S.A.) FF Plugin HKU\S-1-5-21-3455811494-3201091269-2129086357-1000: SkypePlugin64 -> C:\Users\Philipp\AppData\Local\SkypePlugin\7.18.0.51\npGatewayNpapi-x64.dll [2016-04-25] (Skype Technologies S.A.) FF Plugin ProgramFiles/Appdata: C:\Program Files (x86)\mozilla firefox\plugins\nppdf32.dll [2017-04-05] (Adobe Systems Inc.) FF Plugin ProgramFiles/Appdata: C:\Program Files (x86)\mozilla firefox\plugins\npwachk.dll [2012-06-28] (Nullsoft, Inc.) Chrome: ======= CHR HKLM\...\Chrome\Extension: [flliilndjeohchalpbbcdekjklbdgfkk] - hxxps://clients2.google.com/service/update2/crx CHR HKLM-x32\...\Chrome\Extension: [flliilndjeohchalpbbcdekjklbdgfkk] - hxxps://clients2.google.com/service/update2/crx CHR HKLM-x32\...\Chrome\Extension: [pnbbffeddnekkhjmokkhdebbfbibbflc] - C:\Program Files (x86)\LyricsPal\128.crx <nicht gefunden> ==================== Dienste (Nicht auf der Ausnahmeliste) ==================== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.) S2 AntiVirMailService; C:\Program Files (x86)\Avira\AntiVir Desktop\avmailc7.exe [1115552 2017-03-22] (Avira Operations GmbH & Co. KG) R2 AntiVirSchedulerService; C:\Program Files (x86)\Avira\AntiVir Desktop\sched.exe [487432 2017-03-22] (Avira Operations GmbH & Co. KG) R2 AntiVirService; C:\Program Files (x86)\Avira\AntiVir Desktop\avguard.exe [487432 2017-03-22] (Avira Operations GmbH & Co. KG) S2 AntiVirWebService; C:\Program Files (x86)\Avira\AntiVir Desktop\avwebg7.exe [1519136 2017-03-22] (Avira Operations GmbH & Co. KG) R2 Avira.ServiceHost; C:\Program Files (x86)\Avira\Launcher\Avira.ServiceHost.exe [349560 2017-03-09] (Avira Operations GmbH & Co. KG) R2 AviraPhantomVPN; C:\Program Files (x86)\Avira\VPN\Avira.VpnService.exe [316976 2017-03-20] (Avira Operations GmbH & Co. KG) R3 BlackBerry Device Manager; C:\Program Files (x86)\Common Files\Research In Motion\USB Drivers\BbDevMgr.exe [588024 2014-10-31] (BlackBerry Limited) S2 DellDataVault; C:\Program Files\Dell\DellDataVault\DellDataVault.exe [2552528 2015-01-30] (Dell Inc.) R2 RIM MDNS; C:\Program Files (x86)\Common Files\Research In Motion\Tunnel Manager\mDNSResponder.exe [396024 2015-05-26] (Apple Inc.) R2 RIM Tunnel Service; C:\Program Files (x86)\Common Files\Research In Motion\Tunnel Manager\tunmgr.exe [1355000 2015-05-26] (BlackBerry Limited) R2 TGCM_ImportWiFiSvc; C:\Program Files (x86)\o2\Mobile Connection Manager\ImpWiFiSvc.exe [200624 2010-09-29] (Telefónica I+D) S3 WinDefend; C:\Program Files\Windows Defender\mpsvc.dll [1011712 2013-05-27] (Microsoft Corporation) ===================== Treiber (Nicht auf der Ausnahmeliste) ====================== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.) R2 avgntflt; C:\Windows\System32\DRIVERS\avgntflt.sys [176968 2017-03-22] (Avira Operations GmbH & Co. KG) R1 avipbb; C:\Windows\System32\DRIVERS\avipbb.sys [148104 2017-03-22] (Avira Operations GmbH & Co. KG) R1 avkmgr; C:\Windows\System32\DRIVERS\avkmgr.sys [35328 2017-03-22] (Avira Operations GmbH & Co. KG) R2 avnetflt; C:\Windows\System32\DRIVERS\avnetflt.sys [78600 2017-03-22] (Avira Operations GmbH & Co. KG) R3 CMUACWO; C:\Windows\System32\DRIVERS\CMUACWO.sys [617984 2014-12-29] (C-Media Inc.) S3 DDDriver; C:\Windows\System32\drivers\DDDriver64Dcsa.sys [23760 2015-01-30] (Dell Computer Corporation) S3 DellProf; C:\Windows\System32\drivers\DellProf.sys [23312 2015-01-30] (Dell Computer Corporation) S3 ewusbnet; C:\Windows\System32\DRIVERS\ewusbnet.sys [256000 2010-08-31] (Huawei Technologies Co., Ltd.) R3 rimvndis; C:\Windows\System32\Drivers\rimvndis6_AMD64.sys [18432 2015-05-26] (BlackBerry Limited) R3 RimVSerPort; C:\Windows\System32\DRIVERS\RimSerial_AMD64.sys [44544 2012-12-10] (Research in Motion Ltd) S3 RTL8187B; C:\Windows\System32\DRIVERS\RTL8187B.sys [416768 2009-06-10] (Realtek Semiconductor Corporation ) S3 SNPSTD3; C:\Windows\System32\DRIVERS\snpstd3.sys [10916352 2009-07-03] (Sonix Co. Ltd.) S3 SNPSTD3; C:\Windows\SysWOW64\DRIVERS\snpstd3.sys [10526464 2009-07-03] (Sonix Co. Ltd.) ==================== NetSvcs (Nicht auf der Ausnahmeliste) =================== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.) ==================== Ein Monat: Erstellte Dateien und Ordner ======== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird die Datei/der Ordner verschoben.) 2017-04-19 13:55 - 2017-04-19 13:57 - 00018999 _____ C:\Users\Philipp\Desktop\FRST.txt 2017-04-19 13:54 - 2017-04-19 13:55 - 00000000 ____D C:\FRST 2017-04-19 13:52 - 2017-04-19 13:52 - 02424832 _____ (Farbar) C:\Users\Philipp\Desktop\FRST64.exe 2017-04-16 18:20 - 2017-04-16 18:24 - 00000000 ____D C:\Users\Philipp\Desktop\photoshoot 2017-04-15 20:43 - 2017-04-15 20:43 - 00172840 _____ C:\Users\Philipp\Desktop\verbs.pdf 2017-04-14 09:43 - 2017-04-14 09:43 - 00014423 _____ C:\Users\Philipp\Downloads\Kendrick Lamar - DAMN. - 2017 (WEB - FLAC - Lossless)-816718.torrent 2017-04-14 09:08 - 2017-04-19 06:33 - 00000000 ____D C:\Users\Philipp\AppData\Roaming\Telegram Desktop 2017-04-14 09:08 - 2017-04-14 09:08 - 00000999 _____ C:\Users\Philipp\Desktop\Telegram.lnk 2017-04-14 09:08 - 2017-04-14 09:08 - 00000000 ____D C:\Users\Philipp\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Telegram Desktop 2017-04-13 19:51 - 2017-03-27 19:13 - 00394448 _____ (Microsoft Corporation) C:\Windows\system32\iedkcs32.dll 2017-04-13 19:51 - 2017-03-27 18:28 - 00346320 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iedkcs32.dll 2017-04-13 19:51 - 2017-03-25 20:39 - 20284416 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll 2017-04-13 19:51 - 2017-03-25 20:07 - 04604416 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9.dll 2017-04-13 19:51 - 2017-03-25 20:06 - 13654016 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieframe.dll 2017-04-13 19:51 - 2017-03-25 19:55 - 02767360 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wininet.dll 2017-04-13 19:51 - 2017-03-25 19:52 - 02289152 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iertutil.dll 2017-04-13 19:51 - 2017-03-25 19:51 - 01313280 _____ (Microsoft Corporation) C:\Windows\SysWOW64\urlmon.dll 2017-04-13 19:51 - 2017-03-25 19:48 - 00499200 _____ (Microsoft Corporation) C:\Windows\SysWOW64\vbscript.dll 2017-04-13 19:51 - 2017-03-25 19:47 - 02055680 _____ (Microsoft Corporation) C:\Windows\SysWOW64\inetcpl.cpl 2017-04-13 19:51 - 2017-03-25 19:47 - 00710144 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieapfltr.dll 2017-04-13 19:51 - 2017-03-25 19:47 - 00047616 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieetwproxystub.dll 2017-04-13 19:51 - 2017-03-25 19:46 - 00693248 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msfeeds.dll 2017-04-13 19:51 - 2017-03-25 19:46 - 00663552 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript.dll 2017-04-13 19:51 - 2017-03-25 19:46 - 00620032 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9diag.dll 2017-04-13 19:51 - 2017-03-25 19:46 - 00230400 _____ (Microsoft Corporation) C:\Windows\SysWOW64\webcheck.dll 2017-04-13 19:51 - 2017-03-25 19:46 - 00168960 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msrating.dll 2017-04-13 19:51 - 2017-03-25 19:46 - 00130048 _____ (Microsoft Corporation) C:\Windows\SysWOW64\occache.dll 2017-04-13 19:51 - 2017-03-25 19:46 - 00047104 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jsproxy.dll 2017-04-13 19:51 - 2017-03-25 19:45 - 00416256 _____ (Microsoft Corporation) C:\Windows\SysWOW64\dxtmsft.dll 2017-04-13 19:51 - 2017-03-25 19:45 - 00279040 _____ (Microsoft Corporation) C:\Windows\SysWOW64\dxtrans.dll 2017-04-13 19:51 - 2017-03-25 19:45 - 00115712 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieUnatt.exe 2017-04-13 19:51 - 2017-03-25 19:45 - 00091136 _____ (Microsoft Corporation) C:\Windows\SysWOW64\inseng.dll 2017-04-13 19:51 - 2017-03-25 19:44 - 00076288 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtmled.dll 2017-04-13 19:51 - 2017-03-25 19:16 - 00066560 _____ (Microsoft Corporation) C:\Windows\system32\iesetup.dll 2017-04-13 19:51 - 2017-03-25 19:14 - 00417792 _____ (Microsoft Corporation) C:\Windows\system32\html.iec 2017-04-13 19:51 - 2017-03-25 19:14 - 00048640 _____ (Microsoft Corporation) C:\Windows\system32\ieetwproxystub.dll 2017-04-13 19:51 - 2017-03-25 19:13 - 00576512 _____ (Microsoft Corporation) C:\Windows\system32\vbscript.dll 2017-04-13 19:51 - 2017-03-25 19:13 - 00088064 _____ (Microsoft Corporation) C:\Windows\system32\MshtmlDac.dll 2017-04-13 19:51 - 2017-03-25 19:10 - 02898432 _____ (Microsoft Corporation) C:\Windows\system32\iertutil.dll 2017-04-13 19:51 - 2017-03-25 19:04 - 00054784 _____ (Microsoft Corporation) C:\Windows\system32\jsproxy.dll 2017-04-13 19:51 - 2017-03-25 19:02 - 00034304 _____ (Microsoft Corporation) C:\Windows\system32\iernonce.dll 2017-04-13 19:51 - 2017-03-25 18:57 - 00615936 _____ (Microsoft Corporation) C:\Windows\system32\ieui.dll 2017-04-13 19:51 - 2017-03-25 18:56 - 00817664 _____ (Microsoft Corporation) C:\Windows\system32\jscript.dll 2017-04-13 19:51 - 2017-03-25 18:56 - 00814080 _____ (Microsoft Corporation) C:\Windows\system32\jscript9diag.dll 2017-04-13 19:51 - 2017-03-25 18:56 - 00144384 _____ (Microsoft Corporation) C:\Windows\system32\ieUnatt.exe 2017-04-13 19:51 - 2017-03-25 18:56 - 00114688 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollector.exe 2017-04-13 19:51 - 2017-03-25 18:52 - 25746944 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll 2017-04-13 19:51 - 2017-03-25 18:45 - 00968704 _____ (Microsoft Corporation) C:\Windows\system32\MsSpellCheckingFacility.exe 2017-04-13 19:51 - 2017-03-25 18:41 - 06045696 _____ (Microsoft Corporation) C:\Windows\system32\jscript9.dll 2017-04-13 19:51 - 2017-03-25 18:41 - 00489984 _____ (Microsoft Corporation) C:\Windows\system32\dxtmsft.dll 2017-04-13 19:51 - 2017-03-25 18:30 - 00077824 _____ (Microsoft Corporation) C:\Windows\system32\JavaScriptCollectionAgent.dll 2017-04-13 19:51 - 2017-03-25 18:29 - 00107520 _____ (Microsoft Corporation) C:\Windows\system32\inseng.dll 2017-04-13 19:51 - 2017-03-25 18:24 - 00199680 _____ (Microsoft Corporation) C:\Windows\system32\msrating.dll 2017-04-13 19:51 - 2017-03-25 18:23 - 00092160 _____ (Microsoft Corporation) C:\Windows\system32\mshtmled.dll 2017-04-13 19:51 - 2017-03-25 18:20 - 00315392 _____ (Microsoft Corporation) C:\Windows\system32\dxtrans.dll 2017-04-13 19:51 - 2017-03-25 18:19 - 00341504 _____ (Microsoft Corporation) C:\Windows\SysWOW64\html.iec 2017-04-13 19:51 - 2017-03-25 18:17 - 00152064 _____ (Microsoft Corporation) C:\Windows\system32\occache.dll 2017-04-13 19:51 - 2017-03-25 18:06 - 00476160 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieui.dll 2017-04-13 19:51 - 2017-03-25 18:04 - 00262144 _____ (Microsoft Corporation) C:\Windows\system32\webcheck.dll 2017-04-13 19:51 - 2017-03-25 18:00 - 00725504 _____ (Microsoft Corporation) C:\Windows\system32\ie4uinit.exe 2017-04-13 19:51 - 2017-03-25 17:59 - 00806912 _____ (Microsoft Corporation) C:\Windows\system32\msfeeds.dll 2017-04-13 19:51 - 2017-03-25 17:57 - 02131456 _____ (Microsoft Corporation) C:\Windows\system32\inetcpl.cpl 2017-04-13 19:51 - 2017-03-25 17:57 - 01359360 _____ (Microsoft Corporation) C:\Windows\system32\mshtmlmedia.dll 2017-04-13 19:51 - 2017-03-25 17:28 - 15259136 _____ (Microsoft Corporation) C:\Windows\system32\ieframe.dll 2017-04-13 19:51 - 2017-03-25 17:27 - 01155072 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtmlmedia.dll 2017-04-13 19:51 - 2017-03-25 17:24 - 03241472 _____ (Microsoft Corporation) C:\Windows\system32\wininet.dll 2017-04-13 19:51 - 2017-03-25 17:10 - 01546240 _____ (Microsoft Corporation) C:\Windows\system32\urlmon.dll 2017-04-13 19:51 - 2017-03-25 17:01 - 00800768 _____ (Microsoft Corporation) C:\Windows\system32\ieapfltr.dll 2017-04-13 19:51 - 2017-03-24 23:50 - 00405504 _____ (Microsoft Corporation) C:\Windows\system32\gdi32.dll 2017-04-13 19:51 - 2017-03-24 23:42 - 00313344 _____ (Microsoft Corporation) C:\Windows\SysWOW64\gdi32.dll 2017-04-13 19:51 - 2017-03-22 16:32 - 03165184 _____ (Microsoft Corporation) C:\Windows\system32\wucltux.dll 2017-04-13 19:51 - 2017-03-22 16:32 - 00192512 _____ (Microsoft Corporation) C:\Windows\system32\wuwebv.dll 2017-04-13 19:51 - 2017-03-22 16:32 - 00098816 _____ (Microsoft Corporation) C:\Windows\system32\wudriver.dll 2017-04-13 19:51 - 2017-03-22 16:30 - 00091136 _____ (Microsoft Corporation) C:\Windows\system32\WinSetupUI.dll 2017-04-13 19:51 - 2017-03-22 16:24 - 00174080 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wuwebv.dll 2017-04-13 19:51 - 2017-03-22 16:17 - 02651136 _____ (Microsoft Corporation) C:\Windows\system32\wuaueng.dll 2017-04-13 19:51 - 2017-03-22 16:15 - 00709120 _____ (Microsoft Corporation) C:\Windows\system32\wuapi.dll 2017-04-13 19:51 - 2017-03-22 16:15 - 00140288 _____ (Microsoft Corporation) C:\Windows\system32\wuauclt.exe 2017-04-13 19:51 - 2017-03-22 16:15 - 00037888 _____ (Microsoft Corporation) C:\Windows\system32\wups2.dll 2017-04-13 19:51 - 2017-03-22 16:15 - 00037888 _____ (Microsoft Corporation) C:\Windows\system32\wuapp.exe 2017-04-13 19:51 - 2017-03-22 16:15 - 00036864 _____ (Microsoft Corporation) C:\Windows\system32\wups.dll 2017-04-13 19:51 - 2017-03-22 16:15 - 00012288 _____ (Microsoft Corporation) C:\Windows\system32\wu.upgrade.ps.dll 2017-04-13 19:51 - 2017-03-22 16:05 - 00573440 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wuapi.dll 2017-04-13 19:51 - 2017-03-22 16:05 - 00093696 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wudriver.dll 2017-04-13 19:51 - 2017-03-22 16:05 - 00035328 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wuapp.exe 2017-04-13 19:51 - 2017-03-22 16:05 - 00030208 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wups.dll 2017-04-13 19:51 - 2017-03-14 16:34 - 00986344 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\dxgkrnl.sys 2017-04-13 19:51 - 2017-03-14 16:34 - 00265448 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\dxgmms1.sys 2017-04-13 19:51 - 2017-03-14 16:30 - 00144384 _____ (Microsoft Corporation) C:\Windows\system32\cdd.dll 2017-04-13 19:51 - 2017-03-10 17:35 - 00382696 _____ (Adobe Systems Incorporated) C:\Windows\system32\atmfd.dll 2017-04-13 19:51 - 2017-03-10 17:31 - 00041472 _____ (Microsoft Corporation) C:\Windows\system32\lpk.dll 2017-04-13 19:51 - 2017-03-10 17:27 - 00308456 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\atmfd.dll 2017-04-13 19:51 - 2017-03-10 17:00 - 03219968 _____ (Microsoft Corporation) C:\Windows\system32\win32k.sys 2017-04-13 19:51 - 2017-03-08 21:20 - 01133568 _____ (Microsoft Corporation) C:\Windows\system32\cdosys.dll 2017-04-13 19:51 - 2017-03-08 21:10 - 00805376 _____ (Microsoft Corporation) C:\Windows\SysWOW64\cdosys.dll 2017-04-13 19:51 - 2017-03-08 05:37 - 00631176 _____ (Microsoft Corporation) C:\Windows\system32\winresume.efi 2017-04-13 19:51 - 2017-03-08 05:36 - 05548264 _____ (Microsoft Corporation) C:\Windows\system32\ntoskrnl.exe 2017-04-13 19:51 - 2017-03-08 05:36 - 00706792 _____ (Microsoft Corporation) C:\Windows\system32\winload.efi 2017-04-13 19:51 - 2017-03-08 05:36 - 00154856 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\ksecpkg.sys 2017-04-13 19:51 - 2017-03-08 05:36 - 00095464 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\ksecdd.sys 2017-04-13 19:51 - 2017-03-08 05:34 - 01732864 _____ (Microsoft Corporation) C:\Windows\system32\ntdll.dll 2017-04-13 19:51 - 2017-03-08 05:33 - 02064384 _____ (Microsoft Corporation) C:\Windows\system32\ole32.dll 2017-04-13 19:51 - 2017-03-08 05:33 - 01460736 _____ (Microsoft Corporation) C:\Windows\system32\lsasrv.dll 2017-04-13 19:51 - 2017-03-08 05:33 - 01212928 _____ (Microsoft Corporation) C:\Windows\system32\rpcrt4.dll 2017-04-13 19:51 - 2017-03-08 05:33 - 01163264 _____ (Microsoft Corporation) C:\Windows\system32\kernel32.dll 2017-04-13 19:51 - 2017-03-08 05:33 - 00880640 _____ (Microsoft Corporation) C:\Windows\system32\advapi32.dll 2017-04-13 19:51 - 2017-03-08 05:33 - 00730624 _____ (Microsoft Corporation) C:\Windows\system32\kerberos.dll 2017-04-13 19:51 - 2017-03-08 05:33 - 00503808 _____ (Microsoft Corporation) C:\Windows\system32\srcore.dll 2017-04-13 19:51 - 2017-03-08 05:33 - 00463872 _____ (Microsoft Corporation) C:\Windows\system32\certcli.dll 2017-04-13 19:51 - 2017-03-08 05:33 - 00419840 _____ (Microsoft Corporation) C:\Windows\system32\KernelBase.dll 2017-04-13 19:51 - 2017-03-08 05:33 - 00362496 _____ (Microsoft Corporation) C:\Windows\system32\wow64win.dll 2017-04-13 19:51 - 2017-03-08 05:33 - 00345600 _____ (Microsoft Corporation) C:\Windows\system32\schannel.dll 2017-04-13 19:51 - 2017-03-08 05:33 - 00316928 _____ (Microsoft Corporation) C:\Windows\system32\msv1_0.dll 2017-04-13 19:51 - 2017-03-08 05:33 - 00312320 _____ (Microsoft Corporation) C:\Windows\system32\ncrypt.dll 2017-04-13 19:51 - 2017-03-08 05:33 - 00243712 _____ (Microsoft Corporation) C:\Windows\system32\wow64.dll 2017-04-13 19:51 - 2017-03-08 05:33 - 00215552 _____ (Microsoft Corporation) C:\Windows\system32\winsrv.dll 2017-04-13 19:51 - 2017-03-08 05:33 - 00210432 _____ (Microsoft Corporation) C:\Windows\system32\wdigest.dll 2017-04-13 19:51 - 2017-03-08 05:33 - 00190464 _____ (Microsoft Corporation) C:\Windows\system32\rpchttp.dll 2017-04-13 19:51 - 2017-03-08 05:33 - 00135680 _____ (Microsoft Corporation) C:\Windows\system32\sspicli.dll 2017-04-13 19:51 - 2017-03-08 05:33 - 00123904 _____ (Microsoft Corporation) C:\Windows\system32\bcrypt.dll 2017-04-13 19:51 - 2017-03-08 05:33 - 00086528 _____ (Microsoft Corporation) C:\Windows\system32\TSpkg.dll 2017-04-13 19:51 - 2017-03-08 05:33 - 00050176 _____ (Microsoft Corporation) C:\Windows\system32\srclient.dll 2017-04-13 19:51 - 2017-03-08 05:33 - 00044032 _____ (Microsoft Corporation) C:\Windows\system32\csrsrv.dll 2017-04-13 19:51 - 2017-03-08 05:33 - 00043520 _____ (Microsoft Corporation) C:\Windows\system32\cryptbase.dll 2017-04-13 19:51 - 2017-03-08 05:26 - 04000488 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ntkrnlpa.exe 2017-04-13 19:51 - 2017-03-08 05:26 - 03945192 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ntoskrnl.exe 2017-04-13 19:51 - 2017-03-08 05:24 - 01314112 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ntdll.dll 2017-04-13 19:51 - 2017-03-08 05:22 - 01416192 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ole32.dll 2017-04-13 19:51 - 2017-03-08 05:22 - 00666112 _____ (Microsoft Corporation) C:\Windows\SysWOW64\rpcrt4.dll 2017-04-13 19:51 - 2017-03-08 05:22 - 00553472 _____ (Microsoft Corporation) C:\Windows\SysWOW64\kerberos.dll 2017-04-13 19:51 - 2017-03-08 05:22 - 00275456 _____ (Microsoft Corporation) C:\Windows\SysWOW64\KernelBase.dll 2017-04-13 19:51 - 2017-03-08 05:22 - 00261120 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msv1_0.dll 2017-04-13 19:51 - 2017-03-08 05:22 - 00254464 _____ (Microsoft Corporation) C:\Windows\SysWOW64\schannel.dll 2017-04-13 19:51 - 2017-03-08 05:22 - 00223232 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ncrypt.dll 2017-04-13 19:51 - 2017-03-08 05:22 - 00172032 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wdigest.dll 2017-04-13 19:51 - 2017-03-08 05:22 - 00096768 _____ (Microsoft Corporation) C:\Windows\SysWOW64\sspicli.dll 2017-04-13 19:51 - 2017-03-08 05:22 - 00043008 _____ (Microsoft Corporation) C:\Windows\SysWOW64\srclient.dll 2017-04-13 19:51 - 2017-03-08 05:21 - 00644096 _____ (Microsoft Corporation) C:\Windows\SysWOW64\advapi32.dll 2017-04-13 19:51 - 2017-03-08 05:21 - 00342528 _____ (Microsoft Corporation) C:\Windows\SysWOW64\certcli.dll 2017-04-13 19:51 - 2017-03-08 05:03 - 00062464 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\appid.sys 2017-04-13 19:51 - 2017-03-08 05:00 - 00338432 _____ (Microsoft Corporation) C:\Windows\system32\conhost.exe 2017-04-13 19:51 - 2017-03-08 04:59 - 00296960 _____ (Microsoft Corporation) C:\Windows\system32\rstrui.exe 2017-04-13 19:51 - 2017-03-08 04:56 - 00291328 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\mrxsmb10.sys 2017-04-13 19:51 - 2017-03-08 04:56 - 00159744 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\mrxsmb.sys 2017-04-13 19:51 - 2017-03-08 04:56 - 00129536 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\mrxsmb20.sys 2017-04-13 19:51 - 2017-03-08 04:55 - 00112640 _____ (Microsoft Corporation) C:\Windows\system32\smss.exe 2017-04-13 19:51 - 2017-03-08 04:55 - 00030720 _____ (Microsoft Corporation) C:\Windows\system32\lsass.exe 2017-04-13 19:51 - 2017-03-07 17:30 - 00085504 _____ (Microsoft Corporation) C:\Windows\system32\asycfilt.dll 2017-04-13 19:51 - 2017-03-07 17:17 - 00067584 _____ (Microsoft Corporation) C:\Windows\SysWOW64\asycfilt.dll 2017-04-13 19:51 - 2017-03-07 15:05 - 00243200 _____ (Microsoft Corporation) C:\Windows\system32\rdpudd.dll 2017-04-13 19:51 - 2017-03-04 02:27 - 01574912 _____ (Microsoft Corporation) C:\Windows\system32\quartz.dll 2017-04-13 19:51 - 2017-03-04 02:27 - 00093696 _____ (Microsoft Corporation) C:\Windows\system32\mfmjpegdec.dll 2017-04-13 19:51 - 2017-03-04 02:14 - 01329664 _____ (Microsoft Corporation) C:\Windows\SysWOW64\quartz.dll 2017-04-13 19:51 - 2017-03-04 02:14 - 00077312 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mfmjpegdec.dll 2017-04-13 19:51 - 2017-02-14 17:33 - 00757248 _____ (Microsoft Corporation) C:\Windows\system32\win32spl.dll 2017-04-13 19:51 - 2017-02-14 17:19 - 00497664 _____ (Microsoft Corporation) C:\Windows\SysWOW64\win32spl.dll 2017-04-13 19:51 - 2017-02-09 17:32 - 00769536 _____ (Microsoft Corporation) C:\Windows\system32\samsrv.dll 2017-04-13 19:51 - 2017-02-09 17:32 - 00106496 _____ (Microsoft Corporation) C:\Windows\system32\samlib.dll 2017-04-13 19:51 - 2017-02-09 17:14 - 00060416 _____ (Microsoft Corporation) C:\Windows\SysWOW64\samlib.dll 2017-04-13 19:51 - 2017-01-18 16:36 - 00994760 _____ (Microsoft Corporation) C:\Windows\system32\ucrtbase.dll 2017-04-13 19:51 - 2017-01-18 16:36 - 00063840 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-private-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:36 - 00020832 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-math-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:36 - 00019808 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-multibyte-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:36 - 00017760 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-string-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:36 - 00017760 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-stdio-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:36 - 00016224 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-runtime-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:36 - 00015712 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-convert-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:36 - 00014176 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-time-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:36 - 00014176 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-localization-l1-2-0.dll 2017-04-13 19:51 - 2017-01-18 16:36 - 00013664 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-filesystem-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:36 - 00012640 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-process-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:36 - 00012640 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-heap-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:36 - 00012640 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-conio-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:36 - 00012128 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-utility-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:36 - 00012128 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-locale-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:36 - 00012128 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-environment-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:36 - 00012128 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-synch-l1-2-0.dll 2017-04-13 19:51 - 2017-01-18 16:36 - 00012128 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-processthreads-l1-1-1.dll 2017-04-13 19:51 - 2017-01-18 16:36 - 00011616 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-xstate-l2-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:36 - 00011616 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-timezone-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:36 - 00011616 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-file-l2-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:36 - 00011608 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-file-l1-2-0.dll 2017-04-13 19:51 - 2017-01-18 16:35 - 00922432 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ucrtbase.dll 2017-04-13 19:51 - 2017-01-18 16:35 - 00066400 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-private-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:35 - 00022368 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-math-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:35 - 00019808 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-multibyte-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:35 - 00017760 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-string-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:35 - 00017760 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-stdio-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:35 - 00016224 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-runtime-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:35 - 00015712 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-convert-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:35 - 00014176 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-time-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:35 - 00014176 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-localization-l1-2-0.dll 2017-04-13 19:51 - 2017-01-18 16:35 - 00013664 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-filesystem-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:35 - 00012640 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-process-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:35 - 00012640 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-heap-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:35 - 00012640 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-conio-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:35 - 00012128 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-utility-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:35 - 00012128 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-locale-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:35 - 00012128 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-environment-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:35 - 00012128 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-synch-l1-2-0.dll 2017-04-13 19:51 - 2017-01-18 16:35 - 00012128 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-processthreads-l1-1-1.dll 2017-04-13 19:51 - 2017-01-18 16:35 - 00011616 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-xstate-l2-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:35 - 00011616 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-timezone-l1-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:35 - 00011616 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-file-l2-1-0.dll 2017-04-13 19:51 - 2017-01-18 16:35 - 00011616 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-file-l1-2-0.dll 2017-04-13 19:50 - 2017-03-25 19:46 - 00060416 _____ (Microsoft Corporation) C:\Windows\SysWOW64\JavaScriptCollectionAgent.dll 2017-04-13 19:50 - 2017-03-25 19:45 - 00064000 _____ (Microsoft Corporation) C:\Windows\SysWOW64\MshtmlDac.dll 2017-04-13 19:50 - 2017-03-25 19:45 - 00062464 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iesetup.dll 2017-04-13 19:50 - 2017-03-25 19:45 - 00030720 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iernonce.dll 2017-04-13 19:50 - 2017-03-25 19:44 - 02724864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb 2017-04-13 19:50 - 2017-03-25 19:35 - 02724864 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb 2017-04-13 19:50 - 2017-03-25 19:35 - 00004096 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollectorres.dll 2017-04-13 19:50 - 2017-03-10 17:31 - 00100864 _____ (Microsoft Corporation) C:\Windows\system32\fontsub.dll 2017-04-13 19:50 - 2017-03-10 17:31 - 00046080 _____ (Adobe Systems) C:\Windows\system32\atmlib.dll 2017-04-13 19:50 - 2017-03-10 17:31 - 00014336 _____ (Microsoft Corporation) C:\Windows\system32\dciman32.dll 2017-04-13 19:50 - 2017-03-10 17:20 - 00025600 _____ (Microsoft Corporation) C:\Windows\SysWOW64\lpk.dll 2017-04-13 19:50 - 2017-03-10 17:19 - 00070656 _____ (Microsoft Corporation) C:\Windows\SysWOW64\fontsub.dll 2017-04-13 19:50 - 2017-03-10 17:19 - 00010240 _____ (Microsoft Corporation) C:\Windows\SysWOW64\dciman32.dll 2017-04-13 19:50 - 2017-03-10 16:53 - 00034304 _____ (Adobe Systems) C:\Windows\SysWOW64\atmlib.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00690688 _____ (Microsoft Corporation) C:\Windows\system32\adtschema.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00146432 _____ (Microsoft Corporation) C:\Windows\system32\msaudite.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00063488 _____ (Microsoft Corporation) C:\Windows\system32\setbcdlocale.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00060416 _____ (Microsoft Corporation) C:\Windows\system32\msobjs.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00059904 _____ (Microsoft Corporation) C:\Windows\system32\appidapi.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00034816 _____ (Microsoft Corporation) C:\Windows\system32\appidsvc.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00028672 _____ (Microsoft Corporation) C:\Windows\system32\sspisrv.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00028160 _____ (Microsoft Corporation) C:\Windows\system32\secur32.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00022016 _____ (Microsoft Corporation) C:\Windows\system32\credssp.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00016384 _____ (Microsoft Corporation) C:\Windows\system32\ntvdm64.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00013312 _____ (Microsoft Corporation) C:\Windows\system32\wow64cpu.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00006656 _____ (Microsoft Corporation) C:\Windows\system32\apisetschema.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00006144 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-security-base-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00005120 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-file-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00004608 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-threadpool-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00004608 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-processthreads-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00004096 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-sysinfo-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00004096 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-synch-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00004096 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-localregistry-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00004096 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-localization-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00003584 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-rtlsupport-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00003584 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-processenvironment-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00003584 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-namedpipe-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00003584 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-misc-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00003584 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-memory-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00003584 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-libraryloader-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00003584 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-heap-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-xstate-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-util-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-string-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-profile-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-io-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-interlocked-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-handle-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-fibers-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-errorhandling-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-delayload-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-debug-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-datetime-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-console-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:22 - 01114112 _____ (Microsoft Corporation) C:\Windows\SysWOW64\kernel32.dll 2017-04-13 19:50 - 2017-03-08 05:22 - 00146432 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msaudite.dll 2017-04-13 19:50 - 2017-03-08 05:22 - 00141312 _____ (Microsoft Corporation) C:\Windows\SysWOW64\rpchttp.dll 2017-04-13 19:50 - 2017-03-08 05:22 - 00082944 _____ (Microsoft Corporation) C:\Windows\SysWOW64\bcrypt.dll 2017-04-13 19:50 - 2017-03-08 05:22 - 00065536 _____ (Microsoft Corporation) C:\Windows\SysWOW64\TSpkg.dll 2017-04-13 19:50 - 2017-03-08 05:22 - 00060416 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msobjs.dll 2017-04-13 19:50 - 2017-03-08 05:22 - 00022016 _____ (Microsoft Corporation) C:\Windows\SysWOW64\secur32.dll 2017-04-13 19:50 - 2017-03-08 05:22 - 00017408 _____ (Microsoft Corporation) C:\Windows\SysWOW64\credssp.dll 2017-04-13 19:50 - 2017-03-08 05:22 - 00005120 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wow32.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00690688 _____ (Microsoft Corporation) C:\Windows\SysWOW64\adtschema.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00050688 _____ (Microsoft Corporation) C:\Windows\SysWOW64\appidapi.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00006656 _____ (Microsoft Corporation) C:\Windows\SysWOW64\apisetschema.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00005120 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-file-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00004608 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-processthreads-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00004096 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-sysinfo-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00004096 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-synch-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00004096 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-misc-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00004096 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-localregistry-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00004096 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-localization-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00003584 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-processenvironment-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00003584 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-namedpipe-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00003584 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-memory-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00003584 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-libraryloader-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00003584 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-interlocked-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00003584 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-heap-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-string-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-rtlsupport-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-profile-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-io-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-handle-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-fibers-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-errorhandling-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-debug-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-datetime-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:21 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-console-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 05:03 - 00148480 _____ (Microsoft Corporation) C:\Windows\system32\appidpolicyconverter.exe 2017-04-13 19:50 - 2017-03-08 05:03 - 00064000 _____ (Microsoft Corporation) C:\Windows\system32\auditpol.exe 2017-04-13 19:50 - 2017-03-08 05:03 - 00017920 _____ (Microsoft Corporation) C:\Windows\system32\appidcertstorecheck.exe 2017-04-13 19:50 - 2017-03-08 04:57 - 00050176 _____ (Microsoft Corporation) C:\Windows\SysWOW64\auditpol.exe 2017-04-13 19:50 - 2017-03-08 04:54 - 00025600 _____ (Microsoft Corporation) C:\Windows\SysWOW64\setup16.exe 2017-04-13 19:50 - 2017-03-08 04:54 - 00014336 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ntvdm64.dll 2017-04-13 19:50 - 2017-03-08 04:54 - 00007680 _____ (Microsoft Corporation) C:\Windows\SysWOW64\instnm.exe 2017-04-13 19:50 - 2017-03-08 04:54 - 00002048 _____ (Microsoft Corporation) C:\Windows\SysWOW64\user.exe 2017-04-13 19:50 - 2017-03-08 04:53 - 00036352 _____ (Microsoft Corporation) C:\Windows\SysWOW64\cryptbase.dll 2017-04-13 19:50 - 2017-03-08 04:53 - 00006144 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-security-base-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 04:53 - 00004608 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-threadpool-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 04:53 - 00003584 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-xstate-l1-1-0.dll 2017-04-13 19:50 - 2017-03-08 04:53 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-util-l1-1-0.dll 2017-04-13 19:50 - 2017-02-11 17:33 - 00002048 _____ (Microsoft Corporation) C:\Windows\system32\tzres.dll 2017-04-13 19:50 - 2017-02-11 17:16 - 00002048 _____ (Microsoft Corporation) C:\Windows\SysWOW64\tzres.dll 2017-04-13 19:50 - 2016-03-23 23:40 - 03181568 _____ (Microsoft Corporation) C:\Windows\system32\rdpcorets.dll 2017-04-13 19:50 - 2016-03-23 23:40 - 00016384 _____ (Microsoft Corporation) C:\Windows\system32\RdpGroupPolicyExtension.dll 2017-04-09 14:58 - 2017-04-09 15:13 - 00000000 ____D C:\Users\Philipp\Desktop\Q Magazine 2017-04-06 17:36 - 2017-04-06 17:37 - 00013078 _____ C:\Users\Philipp\Downloads\Gorillaz - Let Me Out - 2017 (WEB - FLAC - Lossless)-808031.torrent 2017-03-29 20:21 - 2017-03-29 20:21 - 00019962 _____ C:\Users\Philipp\Downloads\The Beach Boys - Love You - 2015 (WEB - FLAC - Lossless)-86023.torrent 2017-03-29 13:19 - 2017-03-29 13:19 - 00015554 _____ C:\Users\Philipp\Downloads\Black Knights - The Almighty - 2015 (CD - FLAC - Lossless)-10967.torrent 2017-03-28 21:14 - 2017-03-28 21:14 - 00023538 _____ C:\Users\Philipp\Downloads\Stone Temple Pilots - Tiny Music… Songs From the Vatican Gift Shop - 1996 (CD - FLAC - Lossless)-143983.torrent 2017-03-26 10:25 - 2017-03-26 10:25 - 00011426 _____ C:\Users\Philipp\Downloads\John Frusciante - Foregrow EP - 2016 (CD - FLAC - Lossless)-640972.torrent 2017-03-24 19:44 - 2017-03-24 19:45 - 00835013 _____ C:\Users\Philipp\Downloads\trim.18157E59-91AE-4735-BF24-7B035EB3BAF4.MOV 2017-03-23 23:32 - 2017-03-23 23:32 - 00014381 _____ C:\Users\Philipp\Downloads\Gorillaz - Andromeda - 2017 (WEB - FLAC - Lossless)-790214.torrent 2017-03-23 23:32 - 2017-03-23 23:32 - 00012186 _____ C:\Users\Philipp\Downloads\Gorillaz - Ascension - 2017 (WEB - FLAC - Lossless)-790210.torrent 2017-03-23 23:32 - 2017-03-23 23:32 - 00011698 _____ C:\Users\Philipp\Downloads\Gorillaz - We Got the Power - 2017 (WEB - FLAC - Lossless)-790223.torrent 2017-03-23 23:31 - 2017-03-23 23:31 - 00014246 _____ C:\Users\Philipp\Downloads\Gorillaz - Saturnz Barz - 2017 (WEB - FLAC - Lossless)-790219.torrent 2017-03-23 08:51 - 2017-03-23 10:24 - 00000000 ____D C:\Users\Philipp\AppData\Roaming\discord 2017-03-23 08:51 - 2017-03-23 08:51 - 00002180 _____ C:\Users\Philipp\Desktop\Discord.lnk 2017-03-23 08:51 - 2017-03-23 08:51 - 00000000 ____D C:\Users\Philipp\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Hammer & Chisel, Inc 2017-03-23 08:51 - 2017-03-23 08:51 - 00000000 ____D C:\Users\Philipp\AppData\Local\SquirrelTemp 2017-03-23 08:51 - 2017-03-23 08:51 - 00000000 ____D C:\Users\Philipp\AppData\Local\Discord 2017-03-20 19:10 - 2017-03-20 19:10 - 00875712 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msvcr120_clr0400.dll 2017-03-20 19:10 - 2017-03-20 19:10 - 00536776 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msvcp120_clr0400.dll 2017-03-20 19:10 - 2017-03-20 19:10 - 00028352 _____ (Microsoft Corporation) C:\Windows\SysWOW64\aspnet_counters.dll 2017-03-20 19:10 - 2017-03-20 19:10 - 00018088 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msvcr110_clr0400.dll 2017-03-20 19:10 - 2017-03-20 19:10 - 00018088 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msvcr100_clr0400.dll 2017-03-20 19:10 - 2017-03-20 19:10 - 00018088 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msvcp110_clr0400.dll 2017-03-20 18:32 - 2017-03-20 18:32 - 00869576 _____ (Microsoft Corporation) C:\Windows\system32\msvcr120_clr0400.dll 2017-03-20 18:32 - 2017-03-20 18:32 - 00678592 _____ (Microsoft Corporation) C:\Windows\system32\msvcp120_clr0400.dll 2017-03-20 18:32 - 2017-03-20 18:32 - 00029888 _____ (Microsoft Corporation) C:\Windows\system32\aspnet_counters.dll 2017-03-20 18:32 - 2017-03-20 18:32 - 00018088 _____ (Microsoft Corporation) C:\Windows\system32\msvcr110_clr0400.dll 2017-03-20 18:32 - 2017-03-20 18:32 - 00018088 _____ (Microsoft Corporation) C:\Windows\system32\msvcr100_clr0400.dll 2017-03-20 18:32 - 2017-03-20 18:32 - 00018088 _____ (Microsoft Corporation) C:\Windows\system32\msvcp110_clr0400.dll 2017-03-20 09:57 - 2017-03-20 09:57 - 08858165 _____ C:\Users\Philipp\Downloads\trim.4C90439B-9E9C-4209-86A9-04D247AE3FB1.MOV 2017-03-20 09:56 - 2017-03-20 09:56 - 04050181 _____ C:\Users\Philipp\Downloads\trim.CBC6FC2E-0CD1-4709-9584-AB5B1F972B5F.MOV ==================== Ein Monat: Geänderte Dateien und Ordner ======== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird die Datei/der Ordner verschoben.) 2017-04-19 13:52 - 2012-02-22 02:21 - 00000000 ____D C:\Users\Philipp\AppData\Roaming\uTorrent 2017-04-19 13:13 - 2015-03-02 13:19 - 00129752 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys 2017-04-19 12:32 - 2011-09-16 18:10 - 00000000 ____D C:\Users\Philipp\AppData\Roaming\Skype 2017-04-19 07:35 - 2016-04-25 02:05 - 00000000 ____D C:\Users\Philipp\Downloads\Telegram Desktop 2017-04-19 06:43 - 2009-07-14 05:45 - 00021296 ____H C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0 2017-04-19 06:43 - 2009-07-14 05:45 - 00021296 ____H C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0 2017-04-19 06:32 - 2011-09-13 12:00 - 00000000 ____D C:\Windows\de 2017-04-19 06:32 - 2009-07-14 06:08 - 00000006 ____H C:\Windows\Tasks\SA.DAT 2017-04-18 22:04 - 2011-11-09 08:28 - 00003747 _____ C:\Windows\musi.ini 2017-04-18 14:35 - 2013-01-17 11:50 - 00000000 ____D C:\Users\Philipp\AppData\Roaming\ICQM 2017-04-18 14:35 - 2011-09-16 18:01 - 00000000 ____D C:\Program Files (x86)\Conduit 2017-04-17 17:03 - 2011-09-16 17:50 - 00000000 ____D C:\Users\Philipp\AppData\Roaming\Audacity 2017-04-16 23:43 - 2016-12-10 18:15 - 00000000 ____D C:\Users\Philipp\AppData\LocalLow\Mozilla 2017-04-16 10:40 - 2011-09-13 11:33 - 00000000 ____D C:\Windows\SysWOW64\Macromed 2017-04-15 14:22 - 2014-02-12 17:16 - 00000000 ____D C:\Users\Philipp\AppData\Roaming\MPC-HC 2017-04-15 10:58 - 2009-07-14 04:20 - 00000000 ____D C:\Windows\rescache 2017-04-14 09:10 - 2016-07-03 08:46 - 00004366 _____ C:\Windows\System32\Tasks\Adobe Flash Player Updater 2017-04-14 09:10 - 2016-05-16 09:45 - 00004512 _____ C:\Windows\System32\Tasks\Adobe Flash Player PPAPI Notifier 2017-04-14 09:09 - 2012-03-30 11:57 - 00802904 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe 2017-04-14 09:09 - 2011-10-20 21:51 - 00000000 ____D C:\Windows\system32\Macromed 2017-04-14 09:09 - 2011-09-13 11:33 - 00144472 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl 2017-04-14 09:04 - 2010-11-21 07:50 - 00699868 _____ C:\Windows\system32\perfh007.dat 2017-04-14 09:04 - 2010-11-21 07:50 - 00149750 _____ C:\Windows\system32\perfc007.dat 2017-04-14 09:04 - 2009-07-14 06:13 - 01622228 _____ C:\Windows\system32\PerfStringBackup.INI 2017-04-14 09:04 - 2009-07-14 04:20 - 00000000 ____D C:\Windows\inf 2017-04-14 08:55 - 2009-07-14 05:45 - 00344736 _____ C:\Windows\system32\FNTCACHE.DAT 2017-04-14 08:54 - 2013-03-14 00:46 - 00000000 ____D C:\Program Files\Microsoft Silverlight 2017-04-14 08:54 - 2013-03-14 00:46 - 00000000 ____D C:\Program Files (x86)\Microsoft Silverlight 2017-04-13 20:15 - 2013-03-14 00:47 - 00000000 ____D C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Microsoft Silverlight 2017-04-13 20:12 - 2013-08-14 20:45 - 00000000 ____D C:\Windows\system32\MRT 2017-04-13 20:05 - 2015-05-25 14:10 - 00004476 _____ C:\Windows\System32\Tasks\Adobe Acrobat Update Task 2017-04-13 20:03 - 2016-10-24 20:25 - 00002441 _____ C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Acrobat Reader DC.lnk 2017-04-13 20:01 - 2011-09-19 13:20 - 148601744 ____C (Microsoft Corporation) C:\Windows\system32\MRT.exe 2017-04-13 19:56 - 2011-02-11 11:22 - 01595572 _____ C:\Windows\SysWOW64\PerfStringBackup.INI 2017-04-13 19:40 - 2016-04-26 11:39 - 00002138 _____ C:\Users\Philipp\Desktop\Vivaldi.lnk 2017-04-13 19:40 - 2016-04-13 14:49 - 00000000 ____D C:\Program Files (x86)\Vivaldi 2017-04-13 19:21 - 2012-06-11 21:58 - 00000000 ____D C:\Program Files (x86)\Mozilla Maintenance Service 2017-04-11 00:18 - 2016-12-10 00:17 - 00000000 ____D C:\Program Files (x86)\Mozilla Firefox 2017-04-10 22:13 - 2011-09-16 18:03 - 00000000 ____D C:\Program Files (x86)\WaveGain frontend 2017-04-07 12:34 - 2011-09-21 18:06 - 00000000 ____D C:\Users\Philipp\AppData\Roaming\Mp3tag 2017-04-04 22:04 - 2013-01-01 21:27 - 00000000 ____D C:\Users\Philipp\AppData\Roaming\Media Player Classic 2017-04-04 21:58 - 2016-07-31 18:47 - 00000784 _____ C:\Users\Public\Desktop\CCleaner.lnk 2017-03-31 08:57 - 2012-10-22 10:17 - 00000000 ____D C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Avira 2017-03-29 14:44 - 2014-02-06 21:25 - 00000000 ____D C:\Users\Philipp\Desktop\Rechnungen 2017-03-22 12:39 - 2016-10-09 14:27 - 00051248 _____ (Avira Operations GmbH & Co. KG) C:\Windows\system32\Drivers\avusbflt.sys 2017-03-22 12:39 - 2015-03-25 04:42 - 00176968 _____ (Avira Operations GmbH & Co. KG) C:\Windows\system32\Drivers\avgntflt.sys 2017-03-22 12:39 - 2015-03-25 04:42 - 00148104 _____ (Avira Operations GmbH & Co. KG) C:\Windows\system32\Drivers\avipbb.sys 2017-03-22 12:39 - 2015-03-25 04:42 - 00078600 _____ (Avira Operations GmbH & Co. KG) C:\Windows\system32\Drivers\avnetflt.sys 2017-03-22 12:39 - 2015-03-25 04:42 - 00035328 _____ (Avira Operations GmbH & Co. KG) C:\Windows\system32\Drivers\avkmgr.sys 2017-03-22 08:30 - 2015-03-24 12:49 - 00000000 ____D C:\ProgramData\Package Cache 2017-03-21 01:50 - 2015-05-25 19:25 - 00001243 _____ C:\Users\Philipp\Desktop\txt.txt ==================== Dateien im Wurzelverzeichnis einiger Verzeichnisse ======= 2012-04-22 03:22 - 2016-07-31 17:00 - 0007658 _____ () C:\Users\Philipp\AppData\Local\Resmon.ResmonCfg ==================== Bamital & volsnap ====================== (Es ist kein automatischer Fix für Dateien vorhanden, die an der Verifikation gescheitert sind.) C:\Windows\system32\winlogon.exe => Datei ist digital signiert C:\Windows\system32\wininit.exe => Datei ist digital signiert C:\Windows\SysWOW64\wininit.exe => Datei ist digital signiert C:\Windows\explorer.exe => Datei ist digital signiert C:\Windows\SysWOW64\explorer.exe => Datei ist digital signiert C:\Windows\system32\svchost.exe => Datei ist digital signiert C:\Windows\SysWOW64\svchost.exe => Datei ist digital signiert C:\Windows\system32\services.exe => Datei ist digital signiert C:\Windows\system32\User32.dll => Datei ist digital signiert C:\Windows\SysWOW64\User32.dll => Datei ist digital signiert C:\Windows\system32\userinit.exe => Datei ist digital signiert C:\Windows\SysWOW64\userinit.exe => Datei ist digital signiert C:\Windows\system32\rpcss.dll => Datei ist digital signiert C:\Windows\system32\dnsapi.dll => Datei ist digital signiert C:\Windows\SysWOW64\dnsapi.dll => Datei ist digital signiert C:\Windows\system32\Drivers\volsnap.sys => Datei ist digital signiert LastRegBack: 2017-04-15 10:51 ==================== Ende von FRST.txt ============================ Code:
ATTFilter Zusätzliches Untersuchungsergebnis von Farbar Recovery Scan Tool (x64) Version: 17-04-2017 01 durchgeführt von Philipp (19-04-2017 13:59:04) Gestartet von C:\Users\Philipp\Desktop Windows 7 Home Premium Service Pack 1 (X64) (2011-09-16 15:11:05) Start-Modus: Normal ========================================================== ==================== Konten: ============================= Administrator (S-1-5-21-3455811494-3201091269-2129086357-500 - Administrator - Disabled) Gast (S-1-5-21-3455811494-3201091269-2129086357-501 - Limited - Disabled) HomeGroupUser$ (S-1-5-21-3455811494-3201091269-2129086357-1002 - Limited - Enabled) Philipp (S-1-5-21-3455811494-3201091269-2129086357-1000 - Administrator - Enabled) => C:\Users\Philipp ==================== Sicherheits-Center ======================== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er entfernt.) AV: Avira Antivirus (Enabled - Up to date) {B3F630BD-538D-1B4A-14FA-14B63235278F} AS: Avira Antivirus (Enabled - Up to date) {0897D159-75B7-14C4-2E4A-2FC449B26D32} AS: Windows Defender (Disabled - Up to date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46} ==================== Installierte Programme ====================== (Nur Adware-Programme mit dem Zusatz "Hidden" können in die Fixlist aufgenommen werden, um sie sichtbar zu machen. Die Adware-Programme sollten manuell deinstalliert werden.) µTorrent (HKLM-x32\...\uTorrent) (Version: 2.2.1 - ) 7-Zip 9.20 (x64 edition) (HKLM\...\{23170F69-40C1-2702-0920-000001000000}) (Version: 9.20.00.0 - Igor Pavlov) Adobe Acrobat Reader DC - Deutsch (HKLM-x32\...\{AC76BA86-7AD7-1031-7B44-AC0F074E4100}) (Version: 17.009.20044 - Adobe Systems Incorporated) Adobe AIR (HKLM-x32\...\Adobe AIR) (Version: 2.6.0.19120 - Adobe Systems Incorporated) Adobe Flash Player 25 ActiveX (HKLM-x32\...\Adobe Flash Player ActiveX) (Version: 25.0.0.148 - Adobe Systems Incorporated) Adobe Flash Player 25 NPAPI (HKLM-x32\...\Adobe Flash Player NPAPI) (Version: 25.0.0.148 - Adobe Systems Incorporated) Adobe Flash Player 25 PPAPI (HKLM-x32\...\Adobe Flash Player PPAPI) (Version: 25.0.0.148 - Adobe Systems Incorporated) Adobe Shockwave Player 11.6 (HKLM-x32\...\Adobe Shockwave Player) (Version: 11.6.8.638 - Adobe Systems, Inc.) ASIO4ALL (HKLM-x32\...\ASIO4ALL) (Version: - ) Avira Antivirus (HKLM-x32\...\Avira Antivirus) (Version: 15.0.25.172 - Avira Operations GmbH & Co. KG) Avira Browser Safety (HKLM-x32\...\{9E10EA90-5E97-43B7-A246-FC7B4F5E9493}) (Version: 1.4.5.509 - Avira Operations GmbH & Co KG) Avira Connect (HKLM-x32\...\{0b46d918-af4f-4612-8076-5c0ae67cb2aa}) (Version: 1.2.81.41506 - Avira Operations GmbH & Co. KG) Avira Connect (x32 Version: 1.2.81.41506 - Avira Operations GmbH & Co. KG) Hidden Avira Phantom VPN (HKLM-x32\...\Avira Phantom VPN) (Version: 2.7.1.26756 - Avira Operations GmbH & Co. KG) BlackBerry 10 Desktop Software (Blend, Link, Drivers) (HKLM-x32\...\{c33e77db-89b5-4abf-a1d1-97f8b35347e1}) (Version: 1.2.0.52 - BlackBerry) BlackBerry Blend (x32 Version: 1.2.0.50 - BlackBerry Ltd.) Hidden BlackBerry Communication Drivers (x32 Version: 8.0.0.143 - BlackBerry Ltd.) Hidden BlackBerry Device Drivers (x32 Version: 8.0.0.143 - BlackBerry Ltd.) Hidden BlackBerry Link (x32 Version: 1.2.4.39 - BlackBerry) Hidden BlackBerry Link Remover (x32 Version: 1.2.4.0 - BlackBerry Ltd.) Hidden Canon IJ Network Scanner Selector EX (HKLM-x32\...\Canon_IJ_Network_Scanner_Selector_EX) (Version: 1.5.4.4 - Canon Inc.) Canon IJ Network Tool (HKLM-x32\...\Canon_IJ_Network_UTILITY) (Version: 3.7.0 - Canon Inc.) Canon IJ Scan Utility (HKLM-x32\...\Canon_IJ_Scan_Utility) (Version: 1.1.20.13 - Canon Inc.) Canon MG5700 series Benutzerregistrierung (HKLM-x32\...\Canon MG5700 series Benutzerregistrierung) (Version: - *Canon Inc.) Canon MG5700 series MP Drivers (HKLM\...\{1199FAD5-9546-44f3-81CF-FFDB8040B7BF}_Canon_MG5700_series) (Version: 1.00 - Canon Inc.) Canon MG5700 series On-screen Manual (HKLM-x32\...\Canon MG5700 series On-screen Manual) (Version: 7.8.0 - Canon Inc.) Canon My Printer (HKLM-x32\...\CanonMyPrinter) (Version: 3.3.0 - Canon Inc.) Canon Quick Menu (HKLM-x32\...\CanonQuickMenu) (Version: 2.7.1 - Canon Inc.) CCleaner (HKLM\...\CCleaner) (Version: 5.28 - Piriform) Celtx (2.9.7) (HKLM-x32\...\Celtx (2.9.7)) (Version: 2.9.7 (en-US) - Greyfirst) CMEDIA USB2.0 Audio Device (HKLM-x32\...\{9445E4B8-E875-470A-928A-A665D3F973B4}) (Version: 1.00.0005 - C-Media Electronics, Inc.) Conexant HD Audio (HKLM\...\CNXT_AUDIO_HDA) (Version: 8.50.4.0 - Conexant) CyberLink PowerDVD 9.5 (HKLM-x32\...\InstallShield_{A8516AC9-AAF1-47F9-9766-03E2D4CDBCF8}) (Version: 9.5.1.3225 - CyberLink Corp.) D3DX10 (x32 Version: 15.4.2368.0902 - Microsoft) Hidden dBpoweramp DSP Effects (HKLM-x32\...\dBpoweramp DSP Effects) (Version: Release 7 - Illustrate) dBpoweramp Music Converter (HKLM-x32\...\dBpoweramp Music Converter) (Version: Release 14.2 - Illustrate) Dell Data Vault (Version: 4.1.9.0 - Dell Inc.) Hidden Dell Edoc Viewer (HKLM\...\{8EBA8727-ADC2-477B-9D9A-1A1836BE4E05}) (Version: 1.0.0 - Dell Inc) Discord (HKU\S-1-5-21-3455811494-3201091269-2129086357-1000\...\Discord) (Version: 0.0.297 - Hammer & Chisel, Inc.) DOSBoxnoalttab (HKLM\...\{81c4a0a9-8fb0-4a2d-aec1-efce279f57a6}.sdb) (Version: - ) Dota 2 (HKLM\...\Steam App 570) (Version: - Valve) Exact Audio Copy 1.0beta2 (HKLM-x32\...\Exact Audio Copy) (Version: 1.0beta2 - Andre Wiethoff) FL Studio 8 (HKLM-x32\...\FL Studio 8) (Version: - Image-Line bvba) FLAC 1.2.1b (remove only) (HKLM-x32\...\FLAC) (Version: 1.2.1b - Xiph.org) Giana Worlds 0.83 Preview (HKLM-x32\...\Giana Worlds) (Version: - ) HUAWEI DataCard Driver 4.20.12.00 (HKLM-x32\...\HUAWEI DataCard Driver) (Version: 4.20.12.00 - Huawei technologies Co., Ltd.) Intel(R) Processor Graphics (HKLM-x32\...\{F0E3AD40-2BBD-4360-9C76-B9AC9A5886EA}) (Version: 9.17.10.3347 - Intel Corporation) Java 7 Update 25 (HKLM-x32\...\{26A24AE4-039D-4CA4-87B4-2F83217025FF}) (Version: 7.0.250 - Oracle) Java 7 Update 60 (64-bit) (HKLM\...\{26A24AE4-039D-4CA4-87B4-2F06417060FF}) (Version: 7.0.600 - Oracle) Junk Mail filter update (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden LIMBO (HKU\S-1-5-21-3455811494-3201091269-2129086357-1000\...\Limbo) (Version: - ) Mesh Runtime (x32 Version: 15.4.5722.2 - Microsoft Corporation) Hidden Microsoft .NET Framework 4.5.1 (Deutsch) (HKLM\...\{92FB6C44-E685-45AD-9B20-CADF4CABA132} - 1031) (Version: 4.5.50938 - Microsoft Corporation) Microsoft .NET Framework 4.5.2 (HKLM\...\{92FB6C44-E685-45AD-9B20-CADF4CABA132} - 1033) (Version: 4.5.51209 - Microsoft Corporation) Microsoft Office Home and Student 2010 (HKLM-x32\...\Office14.SingleImage) (Version: 14.0.7015.1000 - Microsoft Corporation) Microsoft Office Klick-und-Los 2010 (HKLM-x32\...\Office14.Click2Run) (Version: 14.0.4763.1000 - Microsoft Corporation) Microsoft Silverlight (HKLM\...\{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}) (Version: 5.1.50906.0 - Microsoft Corporation) Microsoft SQL Server 2005 Compact Edition [ENU] (HKLM-x32\...\{F0B430D1-B6AA-473D-9B06-AA3DD01FD0B8}) (Version: 3.1.0000 - Microsoft Corporation) Microsoft Visual C++ 2005 ATL Update kb973923 - x86 8.0.50727.4053 (HKLM-x32\...\{770657D0-A123-3C07-8E44-1C83EC895118}) (Version: 8.0.50727.4053 - Microsoft Corporation) Microsoft Visual C++ 2005 Redistributable (HKLM-x32\...\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}) (Version: 8.0.61001 - Microsoft Corporation) Microsoft Visual C++ 2005 Redistributable (HKLM-x32\...\{837b34e3-7c30-493c-8f6a-2b0f04e2912c}) (Version: 8.0.59193 - Microsoft Corporation) Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729 (HKLM-x32\...\{6AFCA4E1-9B78-3640-8F72-A7BF33448200}) (Version: 9.0.30729 - Microsoft Corporation) Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729 (HKLM-x32\...\{820B6609-4C97-3A2B-B644-573B06A0F0CC}) (Version: 9.0.30729 - Microsoft Corporation) Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (HKLM-x32\...\{9A25302D-30C0-39D9-BD6F-21E6EC160475}) (Version: 9.0.30729 - Microsoft Corporation) Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148 (HKLM-x32\...\{1F1C2DFC-2D24-3E06-BCB8-725134ADF989}) (Version: 9.0.30729.4148 - Microsoft Corporation) Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (HKLM-x32\...\{9BE518E6-ECC6-35A9-88E4-87755C07200F}) (Version: 9.0.30729.6161 - Microsoft Corporation) Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219 (HKLM\...\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}) (Version: 10.0.40219 - Microsoft Corporation) Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (HKLM-x32\...\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}) (Version: 10.0.40219 - Microsoft Corporation) Microsoft Visual C++ 2015 Redistributable (x86) - 14.0.24215 (HKLM-x32\...\{e2803110-78b3-4664-a479-3611a381656a}) (Version: 14.0.24215.1 - Microsoft Corporation) Microsoft Visual Studio 2010 Tools for Office Runtime (x64) (HKLM\...\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)) (Version: 10.0.50903 - Microsoft Corporation) Microsoft Visual Studio 2010-Tools für Office-Laufzeit (x64) Language Pack - DEU (HKLM\...\Microsoft Visual Studio 2010 Tools for Office Runtime (x64) Language Pack - DEU) (Version: 10.0.50903 - Microsoft Corporation) Mobile Connection Manager (HKLM-x32\...\o2DE) (Version: - Mobile Connection Manager) Mozilla Firefox 52.0.2 (x86 en-GB) (HKLM-x32\...\Mozilla Firefox 52.0.2 (x86 en-GB)) (Version: 52.0.2 - Mozilla) Mozilla Maintenance Service (HKLM-x32\...\MozillaMaintenanceService) (Version: 52.0.2.6291 - Mozilla) Mp3tag v2.81 (HKLM-x32\...\Mp3tag) (Version: 2.81 - Florian Heidenreich) MSXML 4.0 SP2 (KB954430) (HKLM-x32\...\{86493ADD-824D-4B8E-BD72-8C5DCDC52A71}) (Version: 4.20.9870.0 - Microsoft Corporation) MSXML 4.0 SP2 (KB973688) (HKLM-x32\...\{F662A8E6-F4DC-41A2-901E-8C11F044BDEC}) (Version: 4.20.9876.0 - Microsoft Corporation) Nero Info (HKLM-x32\...\{B791E0AB-87A9-41A4-8D98-D13C2E37D928}) (Version: 15.1.0030 - Nero AG) Nero Prerequisite Installer 2.0 (HKLM-x32\...\{10EACC1C-7B87-4F57-ACA6-4EC15E13E4E9}) (Version: 12.0.01300 - Nero AG) Nero WaveEditor (HKLM-x32\...\{59C6E86A-14A9-47FD-9EE8-8D9DA864E0AF}) (Version: 12.5.01300 - Nero AG) Octava SD25 (HKLM-x32\...\{0D06066D-69E5-4B7E-8409-86F221E7AEFA}) (Version: 6.04 - Obtiv) Opera 12.18 (HKLM-x32\...\Opera 12.18.1872) (Version: 12.18.1872 - Opera Software ASA) PoiZone (HKLM-x32\...\PoiZone) (Version: - Image-Line bvba) PokerStars.net (HKLM-x32\...\PokerStars.net) (Version: - PokerStars.net) Power Undelete Wizard Demo 3.2 (HKLM-x32\...\Power Undelete Wizard Demo) (Version: 3.2 - www.power-undelete.com) Prerequisite installer (x32 Version: 12.0.0004 - Nero AG) Hidden Rayman Origins (HKLM-x32\...\{DE491AB9-1D47-4FED-A8F5-4D4325B2EB4B}) (Version: 1.02 - Ubisoft) Rayman3 (HKLM-x32\...\{BAF5914B-5730-4373-B038-9F436AC6A0D6}) (Version: 1.00.0000 - Ubi Soft) Service Pack 2 for Microsoft Office 2010 (KB2687455) 32-Bit Edition (HKLM-x32\...\{90140000-003D-0000-0000-0000000FF1CE}_Office14.SingleImage_{DE28B448-32E8-4E8F-84F0-A52B21A49B5B}) (Version: - Microsoft) Skype Web Plugin (HKLM-x32\...\{575E7A6A-F93E-4C3F-AAEB-AF96D8679532}) (Version: 7.18.0.51 - Skype Technologies S.A.) Skype™ 7.33 (HKLM-x32\...\{3B7E914A-93D5-4A29-92BB-AF8C3F66C431}) (Version: 7.33.104 - Skype Technologies S.A.) Spotify (HKU\S-1-5-21-3455811494-3201091269-2129086357-1000\...\Spotify) (Version: 0.8.5.1333.g822e0de8 - Spotify AB) Steam (HKLM-x32\...\Steam) (Version: 2.10.91.91 - Valve Corporation) Stereo Tool 6.32 (HKLM-x32\...\Stereo Tool) (Version: - ) swMSM (x32 Version: 12.0.0.1 - Adobe Systems, Inc) Hidden System Requirements Lab CYRI (HKLM-x32\...\{943A8D28-80D6-41DC-AE94-81FEB42041BF}) (Version: 4.5.1.0 - Husdawg, LLC) TeamSpeak 3 Client (HKLM-x32\...\TeamSpeak 3 Client) (Version: - TeamSpeak Systems GmbH) TL-WN822N/TL-WN821N Driver (HKLM-x32\...\{62FE0726-9652-4CD2-9F09-C769D8699C21}) (Version: 1.0.0 - TP-LINK) Tomb Raider II (HKLM-x32\...\Tomb Raider II) (Version: - ) Toxic Biohazard (HKLM-x32\...\Toxic Biohazard) (Version: - Image-Line bvba) Trust Webcam (HKLM-x32\...\{ECD03DA7-5952-406A-8156-5F0C93618D1F}) (Version: 5.18.1211.103 - Sonix) TT-Dynamic-Range 1.4 (HKLM-x32\...\TT-Dynamic-Range 1.4) (Version: - ) Vivaldi (HKU\S-1-5-21-3455811494-3201091269-2129086357-1000\...\Vivaldi) (Version: 1.8.770.56 - Vivaldi) Winamp (HKLM-x32\...\Winamp) (Version: 5.666 - Nullsoft, Inc) Winamp Detector Plug-in (HKU\S-1-5-21-3455811494-3201091269-2129086357-1000\...\Winamp Detect) (Version: 1.0.0.1 - Nullsoft, Inc) Windows Live Essentials (HKLM-x32\...\WinLiveSuite) (Version: 15.4.3508.1109 - Microsoft Corporation) Windows Live Mesh ActiveX control for remote connections (HKLM-x32\...\{C5398A89-516C-4DAF-BA07-EE7949090E56}) (Version: 15.4.5722.2 - Microsoft Corporation) WinRAR 4.20 (64-bit) (HKLM\...\WinRAR archiver) (Version: 4.20.0 - win.rar GmbH) Worms Blast (HKLM-x32\...\{8874FD36-7C9D-4573-8956-E368D6753D90}) (Version: - ) Zinio Reader 4 (HKLM-x32\...\ZinioReader4) (Version: 4.2.4164 - Zinio LLC) Zinio Reader 4 (x32 Version: 4.2.4164 - Zinio LLC) Hidden ==================== Benutzerdefinierte CLSID (Nicht auf der Ausnahmeliste): ========================== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.) CustomCLSID: HKU\S-1-5-21-3455811494-3201091269-2129086357-1000_Classes\CLSID\{41CA1685-6816-4DDD-BD49-62E8527FF5FC}\InprocServer32 -> C:\Users\Philipp\AppData\Local\SkypePlugin\7.18.0.51\GatewayActiveX-x64.dll (Skype Technologies S.A.) CustomCLSID: HKU\S-1-5-21-3455811494-3201091269-2129086357-1000_Classes\CLSID\{AECD7203-A7DC-437F-BB84-CAFCB8726531}\localserver32 -> C:\Users\Philipp\AppData\Local\SkypePlugin\7.18.0.51\GatewayVersion-x64.exe (Skype Technologies S.A.) CustomCLSID: HKU\S-1-5-21-3455811494-3201091269-2129086357-1000_Classes\CLSID\{CBF9CD8C-2714-4F36-B76A-43E6C7547BC2}\localserver32 -> C:\Users\Philipp\AppData\Local\SkypePlugin\7.18.0.51\EdgeCalling.exe (Skype Technologies S.A.) ==================== Geplante Aufgaben (Nicht auf der Ausnahmeliste) ============= (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.) Task: {00088FD1-6211-4F86-8AF7-48F70221EDC9} - System32\Tasks\{94A9EE23-1765-416F-94AF-3DFD49B529E2} => pcalua.exe -a "C:\Program Files\TrueKey\Mcafee.TrueKey.InstallerService.exe" -d "C:\Program Files\TrueKey" Task: {03C9002D-66A9-4371-B4C4-1BF7C58F5E55} - System32\Tasks\Adobe Acrobat Update Task => C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe [2017-02-02] (Adobe Systems Incorporated) Task: {04E03913-2089-4285-8AAC-7E87DA2C9312} - System32\Tasks\{2344F093-592D-454D-9E80-3868207016AB} => C:\Program Files (x86)\sox-14-4-0\sox.exe Task: {16174250-C13A-4A8F-AE70-A3FE5427433F} - System32\Tasks\CCleanerSkipUAC => C:\Program Files\CCleaner\CCleaner.exe [2017-03-03] (Piriform Ltd) Task: {2102B220-9704-4DF2-8EBD-5B668DFF9086} - System32\Tasks\{D7121E38-DE0C-4E3F-AAA1-8A28631441D1} => C:\Program Files (x86)\sox-14-4-0\sox.exe Task: {215F4337-3211-4640-A767-5A59BA6F6384} - System32\Tasks\{55B2AB3F-138B-4650-BF3D-C36E9E7C722C} => pcalua.exe -a F:\Gee\Installers\GiantWorldsInstaller.exe -d F:\Gee\Installers Task: {21868FE6-68A7-4955-925B-B1A55E0154AF} - System32\Tasks\{9D179C60-6620-4F56-A839-366EB133E534} => C:\Users\Philipp\Desktop\MarsTaxi\Marstaxi.exe Task: {365685F9-E154-490C-8856-E3FDF51B0284} - System32\Tasks\Nero\Nero Info => C:\Program Files (x86)\Common Files\Nero\Nero Info\NeroInfo.exe [2013-10-16] (Nero AG) Task: {493920D0-FCFF-48F7-A23D-87073E6B0424} - System32\Tasks\{F5069992-398F-46A2-A6F3-BB320B571246} => c:\program files (x86)\vivaldi\application\vivaldi.exe [2017-04-07] (Vivaldi Technologies AS) Task: {6972B8B6-6853-41A4-BF88-BE8BF435C590} - System32\Tasks\{8BAC9740-AC22-4853-AAA6-8BC29467BA8B} => pcalua.exe -a "C:\Program Files (x86)\RTEQ\unins000.exe" Task: {7394F48E-5C78-4732-A5A3-6EDC1829C849} - System32\Tasks\{B768E49A-127D-46CA-BE20-8CEAE07DF361} => pcalua.exe -a "C:\Program Files (x86)\Ubi Soft\Rayman3\DirectX\dxsetup.exe" -d "C:\Program Files (x86)\Ubi Soft\Rayman3\DirectX" Task: {76439162-A4DD-48C9-AB3E-BEA3D4BF850B} - System32\Tasks\{C560024C-E38A-46D6-A44D-407C36CBB9D0} => pcalua.exe -a "C:\Program Files (x86)\Portable\Tomb Raider 2\data\SETUP.EXE" -d "C:\Program Files (x86)\Portable\Tomb Raider 2\data" Task: {78989588-C417-4C21-B190-981B20030B7C} - System32\Tasks\{6E8031DD-AE79-4827-80C3-783BA720BB99} => C:\Program Files (x86)\Ubi Soft\Rayman3\Rayman3.exe [2003-02-24] () Task: {895B5F6E-71BA-4DF7-BEE2-676581D5A528} - System32\Tasks\{9852E7CD-2F1A-4C0E-880C-04FE0B1B116C} => pcalua.exe -a C:\Users\Philipp\Desktop\marstaxi\marstaxi.part1.exe -d C:\Users\Philipp\Desktop\marstaxi Task: {A5ED9401-BD4A-4A8A-87C2-627210F02237} - System32\Tasks\{C2C993DE-3B67-4E3E-AFEC-70A9987DB548} => pcalua.exe -a C:\Users\Philipp\Desktop\AudioIdentifier_setup.exe -d C:\Users\Philipp\Desktop Task: {B288C38A-8B08-4B32-BC1D-F700A2C62A05} - System32\Tasks\{17F0A2A9-B17E-48C8-881E-F770B79EEA8D} => msiexec.exe /package "F:\Gee\Installers\Octava SD25.msi" Task: {B41A56D6-16A6-45F5-ACFF-A2CFEA615B40} - System32\Tasks\{4C1759B2-17A1-43E9-B38A-85CE5918EB9D} => pcalua.exe -a F:\Gee\Installers\GianaWorlds_Installer\SETUP.EXE -d F:\Gee\Installers\GianaWorlds_Installer Task: {BFAB72A4-55A4-4BA1-927B-875BB9C9B1A8} - \Express Files Updater -> Keine Datei <==== ACHTUNG Task: {C732B039-AEFE-449F-A030-54C939C722AB} - System32\Tasks\{1D8B9D5D-7244-4B63-AF6E-DD9ECB7FEE66} => pcalua.exe -a "F:\Gee\Installers\Webcam Drivers.exe" -d F:\Gee\Installers Task: {CE7265D3-E1FD-47E4-97C3-919B6F4E3670} - System32\Tasks\{B6BB92A3-1306-4668-8524-202D6CE03623} => pcalua.exe -a C:\Users\Philipp\Desktop\marstaxi.part1.exe -d C:\Users\Philipp\Desktop Task: {D11355D6-6B10-4930-A75F-5C5899382491} - System32\Tasks\{B978A690-534B-4176-9A92-70F054863E47} => C:\Program Files (x86)\Skype\Phone\Skype.exe [2017-02-14] (Skype Technologies S.A.) Task: {D46D972F-5A13-4318-9C74-F566274D675B} - System32\Tasks\{E467CB89-3804-42EB-B593-F0FA830667E9} => C:\Users\Philipp\Desktop\marstaxi\MARSTAXI\MARSTAXI.EXE Task: {DD54A6EA-5AA1-47E7-8FFB-2189B9AA6F53} - System32\Tasks\Adobe Flash Player PPAPI Notifier => C:\Windows\SysWOW64\Macromed\Flash\FlashUtil32_25_0_0_148_pepper.exe [2017-04-14] (Adobe Systems Incorporated) Task: {EEFBA248-B525-4A19-8ED6-FAA9DE698361} - System32\Tasks\Adobe Flash Player Updater => C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2017-04-14] (Adobe Systems Incorporated) Task: {F05C4CC3-15E0-4464-8FB0-0079E3D17D6C} - System32\Tasks\{C1193F18-40EE-42F9-8876-91C29BA876BE} => msiexec.exe /package "F:\Gee\Installers\Octava SD25.msi" Task: {F0C1A199-E40D-4215-83FB-BCF2D87156A2} - System32\Tasks\{D7BCEEB2-DD79-43D6-89EB-1CAFC225C0C7} => c:\program files (x86)\opera\opera.exe [2016-02-17] (Opera Software) (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird die Aufgabe verschoben. Die Datei, die durch die Aufgabe gestartet wird, wird nicht verschoben.) ==================== Verknüpfungen ============================= (Die Einträge können gelistet werden, um sie zurückzusetzen oder zu entfernen.) Shortcut: C:\Users\Philipp\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Image-Line\FL Studio 8\Additional\SynthMaker website.lnk -> hxxp://www.synthmaker.co.uk Shortcut: C:\Users\Philipp\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ICQ\icq.com.lnk -> hxxp://www.icq.com ==================== Geladene Module (Nicht auf der Ausnahmeliste) ============== 2011-09-13 19:01 - 2011-01-27 16:11 - 00094208 _____ () C:\Windows\System32\IccLibDll_x64.dll 2015-05-20 13:00 - 2015-05-20 13:00 - 00688888 _____ () C:\Program Files (x86)\Common Files\Research In Motion\nginx\nginx.exe 2015-05-26 16:46 - 2015-05-26 16:46 - 00094208 _____ () C:\Program Files (x86)\Common Files\Research In Motion\Tunnel Manager\libxpmux.dll 2017-04-13 19:39 - 2017-04-07 17:21 - 02253432 _____ () C:\Program Files (x86)\Vivaldi\Application\1.8.770.56\libglesv2.dll 2017-04-13 19:39 - 2017-04-07 17:21 - 00087160 _____ () C:\Program Files (x86)\Vivaldi\Application\1.8.770.56\libegl.dll 2013-12-13 03:47 - 2013-12-13 03:47 - 00333824 _____ () C:\Program Files (x86)\Winamp\Plugins\freeform\wacs\freetype\freetype.wac ==================== Alternate Data Streams (Nicht auf der Ausnahmeliste) ========= (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird nur der ADS entfernt.) ==================== Abgesicherter Modus (Nicht auf der Ausnahmeliste) =================== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Der Wert "AlternateShell" wird wiederhergestellt.) ==================== Verknüpfungen (Nicht auf der Ausnahmeliste) =============== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird der Registryeintrag auf den Standardwert zurückgesetzt oder entfernt.) ==================== Internet Explorer Vertrauenswürdig/Eingeschränkt =============== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt.) ==================== Hosts Inhalt: =============================== (Wenn benötigt kann der Hosts: Schalter in die Fixlist aufgenommen werden um die Hosts Datei zurückzusetzen.) 2009-07-14 03:34 - 2014-02-22 23:07 - 00000822 ____A C:\Windows\system32\Drivers\etc\hosts ==================== Andere Bereiche ============================ (Aktuell gibt es keinen automatisierten Fix für diesen Bereich.) HKU\S-1-5-21-3455811494-3201091269-2129086357-1000\Control Panel\Desktop\\Wallpaper -> C:\Users\Philipp\AppData\Roaming\Microsoft\Windows\Themes\TranscodedWallpaper.jpg DNS Servers: 192.168.178.1 HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System => (ConsentPromptBehaviorAdmin: 0) (ConsentPromptBehaviorUser: 3) (EnableLUA: 0) Windows Firewall ist aktiviert. ==================== MSCONFIG/TASK MANAGER Deaktivierte Einträge == MSCONFIG\startupreg: AccuWeatherWidget => "C:\Program Files (x86)\Dell Stage\Dell Stage\AccuWeather\accuweather.exe" "C:\Program Files (x86)\Dell Stage\Dell Stage\AccuWeather\start.umj" --startup MSCONFIG\startupreg: Adobe Reader Speed Launcher => "C:\Program Files (x86)\Adobe\Reader 10.0\Reader\Reader_sl.exe" MSCONFIG\startupreg: CanonQuickMenu => C:\Program Files (x86)\Canon\Quick Menu\CNQMMAIN.EXE /logon MSCONFIG\startupreg: CCleaner Monitoring => "C:\Program Files\CCleaner\CCleaner64.exe" /MONITOR MSCONFIG\startupreg: Dell DataSafe Online => C:\Program Files (x86)\Dell\Dell Datasafe Online\NOBuClient.exe MSCONFIG\startupreg: DellStage => "C:\Program Files (x86)\Dell Stage\Dell Stage\stage_primary.exe" "C:\Program Files (x86)\Dell Stage\Dell Stage\start.umj" --startup MSCONFIG\startupreg: icq => C:\Users\Philipp\AppData\Roaming\ICQM\icq.exe -CU MSCONFIG\startupreg: IJNetworkScannerSelectorEX => C:\Program Files (x86)\Canon\IJ Network Scanner Selector EX\CNMNSST.exe /FORCE MSCONFIG\startupreg: PDVD9LanguageShortcut => "C:\Program Files (x86)\CyberLink\PowerDVD9\Language\Language.exe" MSCONFIG\startupreg: RemoteControl9 => "C:\Program Files (x86)\CyberLink\PowerDVD9\PDVD9Serv.exe" MSCONFIG\startupreg: Skype => "C:\Program Files (x86)\Skype\Phone\Skype.exe" /minimized /regrun MSCONFIG\startupreg: snpstd3 => C:\Windows\vsnpstd3.exe MSCONFIG\startupreg: Spotify Web Helper => "C:\Users\Philipp\AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe" MSCONFIG\startupreg: Stage Remote => C:\Program Files (x86)\Dell\Stage Remote\StageRemote.exe -Quiet MSCONFIG\startupreg: tsnpstd3 => C:\Windows\tsnpstd3.exe ==================== Firewall Regeln (Nicht auf der Ausnahmeliste) =============== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.) FirewallRules: [{289F2240-AF73-4518-99C1-2E9C7A49D2AD}] => (Allow) C:\Program Files (x86)\CyberLink\PowerDVD9\PowerDVD Cinema\PowerDVDCinema.exe FirewallRules: [{15C84F8D-CE57-4690-B0D7-1A6F04A1C923}] => (Allow) C:\Program Files (x86)\CyberLink\PowerDVD9\PowerDVD9.EXE FirewallRules: [{A870A3F7-3420-49C1-B342-8D4CBEB56E20}] => (Allow) C:\Program Files (x86)\Windows Live\Contacts\wlcomm.exe FirewallRules: [{3E270342-18BA-4B21-9C23-AA801A88C3B6}] => (Allow) LPort=2869 FirewallRules: [{1D4E7817-0A71-4FE7-A96A-6E114F8299E9}] => (Allow) LPort=1900 FirewallRules: [{D38BE0A2-2FD9-45C9-9B83-9BA735D7BA85}] => (Allow) C:\Program Files (x86)\Windows Live\Messenger\msnmsgr.exe FirewallRules: [{2B359DFA-8187-42D7-B12D-290325DAB147}] => (Allow) C:\Program Files (x86)\Windows Live\Mesh\MOE.exe FirewallRules: [{BF619327-B0C4-40D9-96B1-1372A8DEE8FC}] => (Allow) C:\Program Files (x86)\Opera\opera.exe FirewallRules: [{F8917A39-22EE-4626-BED8-8005E05D3A45}] => (Allow) C:\Program Files (x86)\Opera\opera.exe FirewallRules: [{FF36C387-F1EE-4E2D-AEC2-0FE0A96CBAA8}] => (Allow) C:\Program Files (x86)\uTorrent\uTorrent.exe FirewallRules: [{60168207-D5B4-4385-9DAD-04B0EBDCB11A}] => (Allow) C:\Program Files (x86)\uTorrent\uTorrent.exe FirewallRules: [{1CFC46F9-3786-4720-AA49-3B8BA1369F5D}] => (Allow) C:\Program Files (x86)\uTorrent\uTorrent.exe FirewallRules: [{22677970-3F85-4EE6-96C6-AB142E2D3A45}] => (Allow) C:\Program Files (x86)\uTorrent\uTorrent.exe FirewallRules: [TCP Query User{728B64E3-B52F-4291-9052-8EC27A031061}C:\users\philipp\desktop\utorrent.exe] => (Allow) C:\users\philipp\desktop\utorrent.exe FirewallRules: [UDP Query User{C2F2D4DE-3670-4A49-9436-39B856EDD587}C:\users\philipp\desktop\utorrent.exe] => (Allow) C:\users\philipp\desktop\utorrent.exe FirewallRules: [TCP Query User{0C7A7CC3-35D5-4130-9A22-19DB00017FA1}C:\users\philipp\desktop\utorrent.exe] => (Allow) C:\users\philipp\desktop\utorrent.exe FirewallRules: [UDP Query User{0D8047C2-572C-4098-B925-E48CCCD31DCE}C:\users\philipp\desktop\utorrent.exe] => (Allow) C:\users\philipp\desktop\utorrent.exe FirewallRules: [TCP Query User{2C6FC49C-2973-4ECC-89F3-718900D2562E}C:\program files (x86)\opera\opera.exe] => (Allow) C:\program files (x86)\opera\opera.exe FirewallRules: [UDP Query User{5870DB1D-7F1B-4C48-8EC5-509209A77772}C:\program files (x86)\opera\opera.exe] => (Allow) C:\program files (x86)\opera\opera.exe FirewallRules: [{6B43F846-6D5B-469A-AA80-650D0F694E2D}] => (Allow) %USERPROFILE%\Desktop\utorrent.exe FirewallRules: [{1AACF3C8-6ED7-4309-AA5A-A174A52A004F}] => (Allow) LPort=59611 FirewallRules: [{E76D4A16-159A-4D2F-B838-1682261391FE}] => (Allow) LPort=59611 FirewallRules: [{F51240C0-2912-409D-B3BB-F69E7544BC7B}] => (Allow) %ProgramFiles% (x86)\uTorrent\uTorrent.exe FirewallRules: [{79E3570A-FF85-4E77-800F-BCD3E92DCDC1}] => (Allow) LPort=55558 FirewallRules: [{BFC7C80B-3EA0-4ACF-96D3-D74E6644FFE8}] => (Allow) LPort=55558 FirewallRules: [{435D1431-DBF0-48CA-8671-88E9D0BDB4A4}] => (Allow) LPort=22 FirewallRules: [{2AB08460-FA8C-479C-AB11-23A331F72965}] => (Allow) LPort=22 FirewallRules: [{D8EA0F2D-97B8-4616-BC58-2275F5ECD71E}] => (Allow) LPort=55558 FirewallRules: [{085A7B3E-1117-4057-BBDC-94B5BB8E8459}] => (Allow) LPort=55558 FirewallRules: [{96B3EFC5-A857-4C2B-81D1-E9A95B8BA84D}] => (Allow) C:\Program Files (x86)\Ubisoft\Rayman Origins\Rayman Origins.exe FirewallRules: [{2DD6A490-9FAC-459E-8FBA-CAF4A36DD881}] => (Allow) C:\Program Files (x86)\Ubisoft\Rayman Origins\Rayman Origins.exe FirewallRules: [{16669D55-5DF9-41AF-9B1A-2EB0C83C5A2D}] => (Allow) C:\Program Files (x86)\Ubisoft\Rayman Origins\gu.exe FirewallRules: [{E16C4F06-3DED-4755-9896-A9693E73AA0E}] => (Allow) C:\Program Files (x86)\Ubisoft\Rayman Origins\gu.exe FirewallRules: [{E889A435-6647-4378-82FC-B21FBF00BB12}] => (Allow) C:\Users\Philipp\AppData\Roaming\Spotify\spotify.exe FirewallRules: [{BFEEB885-2D90-48EE-A50A-641F8CC01BF5}] => (Allow) C:\Users\Philipp\AppData\Roaming\Spotify\spotify.exe FirewallRules: [{1809A7E9-379F-4448-A026-BAED7FC9016A}] => (Allow) C:\Users\Philipp\AppData\Roaming\Spotify\spotify.exe FirewallRules: [{28140B9D-1206-4174-9F71-5BE865A975AB}] => (Allow) C:\Users\Philipp\AppData\Roaming\Spotify\spotify.exe FirewallRules: [{4D4AE818-2272-49EC-BA33-5891806F86E1}] => (Allow) C:\Users\Philipp\AppData\Roaming\ICQM\icq.exe FirewallRules: [{5546BB25-EBA1-4DA2-B0C0-3BE1EDB25D14}] => (Allow) C:\Users\Philipp\AppData\Roaming\ICQM\icq.exe FirewallRules: [TCP Query User{97B6C5DC-94BE-417B-A8E5-9E8E3442FC56}C:\program files (x86)\winamp\winamp.exe] => (Block) C:\program files (x86)\winamp\winamp.exe FirewallRules: [UDP Query User{B4FCB184-E6C2-44C5-B133-3230CCB8AD71}C:\program files (x86)\winamp\winamp.exe] => (Block) C:\program files (x86)\winamp\winamp.exe FirewallRules: [TCP Query User{06D62623-AC5F-4789-98F8-97FA764EA2BF}C:\program files (x86)\proxomitron naoko-4\proxomitron.exe] => (Allow) C:\program files (x86)\proxomitron naoko-4\proxomitron.exe FirewallRules: [UDP Query User{72A80B43-45F1-4395-A197-E3609C0C77B7}C:\program files (x86)\proxomitron naoko-4\proxomitron.exe] => (Allow) C:\program files (x86)\proxomitron naoko-4\proxomitron.exe FirewallRules: [{4493763E-845D-45EF-A150-2A5A88E06228}] => (Allow) C:\Users\Philipp\Desktop\utorrent.exe FirewallRules: [{7AAC114E-16F9-4CAA-9AAE-C2B5183169DA}] => (Allow) C:\Users\Philipp\Desktop\utorrent.exe FirewallRules: [{F224478F-0EFE-4E80-999C-CE85DC603D7E}] => (Allow) C:\Program Files (x86)\Winamp\winamp.exe FirewallRules: [{A82A80A8-FB72-41BF-8C0D-FDD19A525FC2}] => (Allow) C:\Program Files (x86)\Winamp\winamp.exe FirewallRules: [{0E809CC4-484D-4179-A2A2-8B985B42C882}] => (Allow) C:\Program Files (x86)\Mozilla Firefox\firefox.exe FirewallRules: [{3817D242-58A3-4209-BA27-4BBD95CA9178}] => (Allow) C:\Program Files (x86)\Mozilla Firefox\firefox.exe FirewallRules: [{D9A12709-DB04-418F-9425-3E3F75A63E1A}] => (Allow) C:\Program Files (x86)\Skype\Phone\Skype.exe FirewallRules: [{3E732436-C391-4901-84B4-E46B59E5F8B4}] => (Allow) C:\Program Files (x86)\Mozilla Firefox\firefox.exe FirewallRules: [{7873D197-7473-47A8-83F5-4CC721C709D0}] => (Allow) C:\Program Files (x86)\Mozilla Firefox\firefox.exe FirewallRules: [{5F565F49-7412-446A-B8B5-E308F42477BA}] => (Allow) C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe FirewallRules: [TCP Query User{0543C83E-A1A6-414B-BD2D-91CB5294E635}C:\users\philipp\appdata\local\skypeplugin\7.18.0.51\pluginhost.exe] => (Allow) C:\users\philipp\appdata\local\skypeplugin\7.18.0.51\pluginhost.exe FirewallRules: [UDP Query User{72EB67A5-53DF-41F6-BAA5-FFB66CA66372}C:\users\philipp\appdata\local\skypeplugin\7.18.0.51\pluginhost.exe] => (Allow) C:\users\philipp\appdata\local\skypeplugin\7.18.0.51\pluginhost.exe FirewallRules: [{8DF7189A-7304-4873-9BE0-A2DACD522212}] => (Allow) C:\Program Files (x86)\Steam\Steam.exe FirewallRules: [{BF8914BA-C58F-43CD-B07F-FB7AA4FCE422}] => (Allow) C:\Program Files (x86)\Steam\Steam.exe FirewallRules: [{9CAC4707-63A8-4030-9058-FCE0C9F970EC}] => (Allow) C:\Program Files (x86)\Steam\bin\steamwebhelper.exe FirewallRules: [{7CE906B5-369F-46AC-982D-523C4DC3312E}] => (Allow) C:\Program Files (x86)\Steam\bin\steamwebhelper.exe FirewallRules: [{45817113-D93E-4DDC-831E-DF96A079784B}] => (Allow) C:\Program Files (x86)\Steam\steamapps\common\dota 2 beta\game\bin\win64\dota2.exe FirewallRules: [{01099DE2-41D6-4771-ADAA-389D00B49D85}] => (Allow) C:\Program Files (x86)\Steam\steamapps\common\dota 2 beta\game\bin\win64\dota2.exe FirewallRules: [{E76A5E0B-437B-4F39-AE7D-BC802678A90D}] => (Allow) tunmgr.exe FirewallRules: [{5F663F1F-E23C-49E3-BCFA-673E280832B7}] => (Allow) tunmgr.exe FirewallRules: [{6B34CD81-3F31-40C4-80C2-1455FDA536A7}] => (Allow) mDNSResponder.exe FirewallRules: [{70F8A69C-2171-4F88-927C-139975EE10A5}] => (Allow) mDNSResponder.exe FirewallRules: [{F32ED5CA-8A47-4C52-9114-0D0A8F27B70A}] => (Allow) C:\Program Files (x86)\Common Files\Research In Motion\nginx\nginx.exe FirewallRules: [{F9D324FF-8A74-436E-A677-650A8531C85B}] => (Allow) C:\Program Files (x86)\Common Files\Research In Motion\tunnel manager\PeerManager.exe FirewallRules: [{DAD6B9F8-21CA-497E-AE9D-7CDF1DA300BE}] => (Allow) C:\Program Files (x86)\BlackBerry\BlackBerry Blend\desktopinvokeproxy.exe FirewallRules: [{00A5D0E8-20A6-4E54-9638-2BA5C9DFCBAD}] => (Allow) C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe ==================== Wiederherstellungspunkte ========================= 09-04-2017 19:52:53 Windows-Sicherung 13-04-2017 19:52:34 Windows Update 16-04-2017 19:00:29 Windows-Sicherung ==================== Fehlerhafte Geräte im Gerätemanager ============= ==================== Fehlereinträge in der Ereignisanzeige: ========================= Applikationsfehler: ================== Error: (04/19/2017 06:34:13 AM) (Source: WinMgmt) (EventID: 10) (User: ) Description: Ereignisfilter mit Abfrage "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" konnte im Namespace "//./root/CIMV2" nicht reaktiviert werden aufgrund des Fehlers 0x80041003. Ereignisse können nicht durch diesen Filter geschickt werden, bis dieses Problem gelöst ist. Error: (04/18/2017 09:53:00 AM) (Source: WinMgmt) (EventID: 10) (User: ) Description: Ereignisfilter mit Abfrage "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" konnte im Namespace "//./root/CIMV2" nicht reaktiviert werden aufgrund des Fehlers 0x80041003. Ereignisse können nicht durch diesen Filter geschickt werden, bis dieses Problem gelöst ist. Error: (04/18/2017 01:52:32 AM) (Source: RIM MDNS) (EventID: 100) (User: ) Description: 676: ERROR: read_msg errno 0 (Der Vorgang wurde erfolgreich beendet.) Error: (04/18/2017 01:52:32 AM) (Source: RIM MDNS) (EventID: 100) (User: ) Description: ERROR: mDNSPlatformReadTCP - recv: 10053 Error: (04/18/2017 01:52:32 AM) (Source: RIM MDNS) (EventID: 100) (User: ) Description: 512: ERROR: read_msg errno 0 (Der Vorgang wurde erfolgreich beendet.) Error: (04/18/2017 01:52:31 AM) (Source: RIM MDNS) (EventID: 100) (User: ) Description: ERROR: mDNSPlatformReadTCP - recv: 10053 Error: (04/17/2017 07:41:07 PM) (Source: RIM MDNS) (EventID: 100) (User: ) Description: Task Scheduling Error: m->NextScheduledSPRetry 21153 Error: (04/17/2017 07:41:07 PM) (Source: RIM MDNS) (EventID: 100) (User: ) Description: Task Scheduling Error: m->NextScheduledEvent 21153 Error: (04/17/2017 07:41:07 PM) (Source: RIM MDNS) (EventID: 100) (User: ) Description: Task Scheduling Error: Continuously busy for more than a second Error: (04/17/2017 07:41:06 PM) (Source: RIM MDNS) (EventID: 100) (User: ) Description: Task Scheduling Error: m->NextScheduledSPRetry 20139 Systemfehler: ============= Error: (04/18/2017 01:52:45 AM) (Source: Disk) (EventID: 11) (User: ) Description: Der Treiber hat einen Controllerfehler auf \Device\Harddisk3\DR3 gefunden. Error: (04/18/2017 01:51:49 AM) (Source: Service Control Manager) (EventID: 7011) (User: ) Description: Das Zeitlimit (30000 ms) wurde beim Warten auf eine Transaktionsrückmeldung von Dienst ShellHWDetection erreicht. Error: (04/17/2017 01:15:06 PM) (Source: Disk) (EventID: 11) (User: ) Description: Der Treiber hat einen Controllerfehler auf \Device\Harddisk3\DR3 gefunden. Error: (04/16/2017 05:55:17 PM) (Source: Disk) (EventID: 11) (User: ) Description: Der Treiber hat einen Controllerfehler auf \Device\Harddisk3\DR3 gefunden. Error: (04/16/2017 10:31:21 AM) (Source: Service Control Manager) (EventID: 7001) (User: ) Description: Der Dienst "Client Virtualization Handler" ist vom Dienst "Application Virtualization Client" abhängig, der aufgrund folgenden Fehlers nicht gestartet wurde: Der Dienst antwortete nicht rechtzeitig auf die Start- oder Steuerungsanforderung. Error: (04/16/2017 10:31:11 AM) (Source: Service Control Manager) (EventID: 7000) (User: ) Description: Der Dienst "Application Virtualization Client" wurde aufgrund folgenden Fehlers nicht gestartet: Der Dienst antwortete nicht rechtzeitig auf die Start- oder Steuerungsanforderung. Error: (04/16/2017 10:31:11 AM) (Source: Service Control Manager) (EventID: 7009) (User: ) Description: Das Zeitlimit (30000 ms) wurde beim Verbindungsversuch mit dem Dienst Application Virtualization Client erreicht. Error: (04/15/2017 09:59:33 AM) (Source: Service Control Manager) (EventID: 7009) (User: ) Description: Das Zeitlimit (30000 ms) wurde beim Verbindungsversuch mit dem Dienst Microsoft .NET Framework NGEN v4.0.30319_X86 erreicht. Error: (04/15/2017 02:22:30 AM) (Source: Disk) (EventID: 11) (User: ) Description: Der Treiber hat einen Controllerfehler auf \Device\Harddisk3\DR3 gefunden. Error: (04/15/2017 02:22:15 AM) (Source: Service Control Manager) (EventID: 7011) (User: ) Description: Das Zeitlimit (30000 ms) wurde beim Warten auf eine Transaktionsrückmeldung von Dienst AudioEndpointBuilder erreicht. ==================== Speicherinformationen =========================== Prozessor: Intel(R) Core(TM) i3-2100 CPU @ 3.10GHz Prozentuale Nutzung des RAM: 95% Installierter physikalischer RAM: 1960.63 MB Verfügbarer physikalischer RAM: 80.06 MB Summe virtueller Speicher: 4008.63 MB Verfügbarer virtueller Speicher: 993.59 MB ==================== Laufwerke ================================ Drive c: (OS) (Fixed) (Total:283.24 GB) (Free:181.37 GB) NTFS Drive f: (F:) (Fixed) (Total:931.51 GB) (Free:544.58 GB) NTFS Drive g: (Volume) (Fixed) (Total:465.76 GB) (Free:117.34 GB) NTFS ==================== MBR & Partitionstabelle ================== ======================================================== Disk: 0 (MBR Code: Windows 7 or Vista) (Size: 298.1 GB) (Disk ID: 0EFD1785) Partition 1: (Not Active) - (Size=39 MB) - (Type=DE) Partition 2: (Active) - (Size=14.8 GB) - (Type=07 NTFS) Partition 3: (Not Active) - (Size=283.2 GB) - (Type=07 NTFS) ======================================================== Disk: 2 (MBR Code: Windows 7 or 8) (Size: 931.5 GB) (Disk ID: 93109591) Partition 1: (Not Active) - (Size=931.5 GB) - (Type=07 NTFS) ======================================================== Disk: 3 (MBR Code: Windows XP) (Size: 465.8 GB) (Disk ID: BF09AA0E) Partition 1: (Not Active) - (Size=465.8 GB) - (Type=07 NTFS) ==================== Ende von Addition.txt ============================ |
19.04.2017, 14:40 | #14 |
/// Winkelfunktion /// TB-Süch-Tiger™ | Windows-7-PC langsam, Avira findet Adware ohne Ende Bitte Avira deinstallieren. (am besten mit revo, siehe weiter unten) Das Teil empfehlen wir schon seit Jahren aus mehreren Gründen nicht mehr. Ein Grund ist ne rel. hohe Fehlalarmquote, der zweite Hauptgrund ist, dass die immer noch mit ASK zusammenarbeiten (Avira Suchfunktion geht über ASK). Auch andere Freewareanbieter wie AVG, Avast oder Panda sprangen auf diesen Zug auf; so was ist bei Sicherheitssoftware einfach inakzeptabel. Vgl. Antivirensoftware: Schutz Für Ihre Dateien, Aber Auf Kosten Ihrer Privatsphäre? | Emsisoft Blog Lade Dir bitte von hier Revo Uninstaller (alternativ portable Revo Uninstaller) herunter.
Gib Bescheid wenn Avira weg ist; wenn wir hier durch sind, kannst du auf einen anderen Virenscanner umsteigen, Infos folgen dann im Abschlussposting. Bitte JETZT nix mehr ohne Absprache installieren!
__________________ Logfiles bitte immer in CODE-Tags posten |
19.04.2017, 15:51 | #15 |
| Windows-7-PC langsam, Avira findet Adware ohne Ende Done. |
Themen zu Windows-7-PC langsam, Avira findet Adware ohne Ende |
.com, .dll, adware, avira, code, dateien, dll, firefox, free, google, icq, ics, kopieren, langsam, logfile, malwarebytes, microsoft, mozilla, registry, roaming, rootkits, software, system, system32, windows |