Die Forenrichtlinien sollten mal geupdatet werden; da steht drin, wenn Log zu lang für einen Post, dann als Anhang dranmachen.
Malwarebytes: Code:
Malwarebytes Anti-Malware
www.malwarebytes.org
Suchlauf Datum: 18.04.2017
Suchlauf-Zeit: 13:58:16
Logdatei: mbam-log-2017-04-18 (13-58-15).txt
Administrator: Ja
Version: 2.00.4.1028
Malware Datenbank: v2017.04.18.03
Rootkit Datenbank: v2017.04.02.01
Lizenz: Kostenlos
Malware Schutz: Deaktiviert
Bösartiger Webseiten Schutz: Deaktiviert
Selbstschutz: Deaktiviert
Betriebssystem: Windows 7 Service Pack 1
CPU: x64
Dateisystem: NTFS
Benutzer: Philipp
Suchlauf-Art: Bedrohungs-Suchlauf
Ergebnis: Abgeschlossen
Durchsuchte Objekte: 289202
Verstrichene Zeit: 35 Min, 5 Sek
Speicher: Aktiviert
Autostart: Aktiviert
Dateisystem: Aktiviert
Archive: Aktiviert
Rootkits: Aktiviert
Heuristik: Aktiviert
PUP: Warnen
PUM: Aktiviert
Prozesse: 0
(Keine schädliche Elemente erkannt)
Module: 0
(Keine schädliche Elemente erkannt)
Registrierungsschlüssel: 9
PUP.Optional.Sputnik, HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\ICQ, Löschen bei Neustart, [8cbde00c4563989e6d13a323a55b5ba5],
PUP.Optional.ExpressFiles, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Express Files Updater, Löschen bei Neustart, [0643bf2d7038af87fbfb90acf70955ab],
PUP.Optional.ExpressFiles, HKLM\SOFTWARE\WOW6432NODE\ExpressFiles, In Quarantäne, [c485b13bfaae67cfcd0158126799649c],
PUP.Optional.Reviser, HKLM\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\mmiopbgcekanlhpjkonogoljpfmhpkhf, In Quarantäne, [d574b735426657df025bc84810f0728e],
PUP.Optional.ExpressFiles, HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\ExpressFiles, Löschen bei Neustart, [d871905cbfe96bcb72437deb33cd2bd5],
PUP.Optional.MailRu, HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\Mail.Ru, Löschen bei Neustart, [54f578748e1aed491873c7e2a45df10f],
PUP.Optional.MailRu, HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\APPDATALOW\SOFTWARE\Mail.Ru, Löschen bei Neustart, [0742c22a792f64d20061f5c232cfc13f],
PUP.Optional.eSupportNTFSUndelete, HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\ESUPPORT.COM\NTFSUndelete, Löschen bei Neustart, [a8a1c527b4f490a6675c2b75a35dff01],
PUP.Optional.ConduitTB.Gen, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{3c471948-f874-49f5-b338-4f214a2ee0b1}, In Quarantäne, [7acfdb112e7aaf8728178f7aba48cd33],
Registrierungswerte: 1
PUP.Optional.AdLyrics, HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MOZILLA\FIREFOX\EXTENSIONS|{9309FA47-1B48-4768-AFA4-9E0556F5DC81}, C:\Program Files (x86)\LyricsPal\128.xpi, Löschen bei Neustart, [5dec1ad2505841f5bc22f897b15103fd]
Registrierungsdaten: 0
(Keine schädliche Elemente erkannt)
Ordner: 9
PUP.Optional.YoutubeUnblocker, C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\9s0hc6sl.default-1430862582424\extensions\youtubeunblocker__web@unblocker.yt\resources\unblocker-web\data, Keine Aktion durch Benutzer, [5ced8d5fbdeb42f4afeef02f7d85a25e],
PUP.Optional.ConduitTB.Gen, C:\Program Files (x86)\Conduit\Community Alerts, In Quarantäne, [7acfdb112e7aaf8728178f7aba48cd33],
PUP.Optional.Conduit, C:\Users\Philipp\AppData\Local\Conduit, In Quarantäne, [61e8509c9612a78f014c0d1171918878],
PUP.Optional.Conduit, C:\Users\Philipp\AppData\LocalLow\Conduit, In Quarantäne, [014898545058270f430ba07eb84ac53b],
PUP.Optional.Conduit, C:\Users\Philipp\AppData\LocalLow\Conduit\Community Alerts, In Quarantäne, [014898545058270f430ba07eb84ac53b],
PUP.Optional.Conduit, C:\Users\Philipp\AppData\LocalLow\Conduit\Community Alerts\Log, In Quarantäne, [014898545058270f430ba07eb84ac53b],
PUP.Optional.YoutubeUnblocker, C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\9s0hc6sl.default-1430862582424\extensions\youtubeunblocker__web@unblocker.yt, In Quarantäne, [5ced8d5fbdeb42f4afeef02f7d85a25e],
PUP.Optional.YoutubeUnblocker, C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\9s0hc6sl.default-1430862582424\extensions\youtubeunblocker__web@unblocker.yt\resources, In Quarantäne, [5ced8d5fbdeb42f4afeef02f7d85a25e],
PUP.Optional.YoutubeUnblocker, C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\9s0hc6sl.default-1430862582424\extensions\youtubeunblocker__web@unblocker.yt\resources\unblocker-web, In Quarantäne, [5ced8d5fbdeb42f4afeef02f7d85a25e],
Dateien: 5
PUP.Optional.Conduit, C:\Users\Philipp\Documents\Downloads\11CT2776682_BrotherSoft_Extreme.exe, In Quarantäne, [68e16983693feb4b1b78d50812ef37c9],
PUP.Optional.Sputnik, C:\Users\Philipp\AppData\Roaming\ICQM\icqsetup.exe, In Quarantäne, [8cbde00c4563989e6d13a323a55b5ba5],
PUP.Optional.Sputnik, C:\Users\Philipp\AppData\Roaming\ICQM\ICQ\dll\mailrusputnik.exe, In Quarantäne, [7dccdf0dd9cf68ce235df3d3748ce917],
PUP.Optional.ExpressFiles, C:\Windows\System32\Tasks\Express Files Updater, In Quarantäne, [f851c22a495f88ae0979a59a43bde11f],
PUP.Optional.ConduitTB.Gen, C:\Program Files (x86)\Conduit\Community Alerts\Alert.dll, In Quarantäne, [7acfdb112e7aaf8728178f7aba48cd33],
Physische Sektoren: 0
(Keine schädliche Elemente erkannt)
(end)
Avira, Teil 1: Code:
Free Antivirus
Report file date: Dienstag, 18. April 2017 14:40
The program is running as an unrestricted full version.
Online services are available.
Licensee : Free
Serial number : 0000149996-AVHOE-0000001
Platform : Windows 7 Home Premium
Windows version : (Service Pack 1) [6.1.7601]
Boot mode : Normally booted
Username : Philipp
Computer name : PHILIPP-PC
Version information:
build.dat : 15.0.25.172 92770 Bytes 21.03.2017 13:01:00
AVSCAN.EXE : 15.0.25.170 1526936 Bytes 22.03.2017 11:38:40
AVSCANRC.DLL : 15.0.25.102 64552 Bytes 22.03.2017 11:38:40
LUKE.DLL : 15.0.25.161 81120 Bytes 22.03.2017 11:39:01
AVSCPLR.DLL : 15.0.25.170 152840 Bytes 22.03.2017 11:38:41
REPAIR.DLL : 15.0.25.170 705648 Bytes 22.03.2017 11:38:38
repair.rdf : 1.0.26.78 1963035 Bytes 18.04.2017 11:02:15
AVREG.DLL : 15.0.25.170 447360 Bytes 22.03.2017 11:38:38
avlode.dll : 15.0.25.170 835000 Bytes 22.03.2017 11:38:37
avlode.rdf : 14.0.5.98 167944 Bytes 23.03.2017 17:34:23
XBV00014.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17
XBV00015.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17
XBV00016.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17
XBV00017.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17
XBV00018.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17
XBV00019.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17
XBV00020.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17
XBV00021.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17
XBV00022.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17
XBV00023.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17
XBV00024.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17
XBV00025.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17
XBV00026.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17
XBV00027.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17
XBV00028.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17
XBV00029.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17
XBV00030.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17
XBV00031.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:17
XBV00032.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:18
XBV00033.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:18
XBV00034.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:18
XBV00035.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:18
XBV00036.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:18
XBV00037.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:18
XBV00038.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:18
XBV00039.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:18
XBV00040.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:18
XBV00041.VDF : 8.12.107.34 2048 Bytes 27.07.2016 14:05:18
XBV00174.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29
XBV00175.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29
XBV00176.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29
XBV00177.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29
XBV00178.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29
XBV00179.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29
XBV00180.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29
XBV00181.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29
XBV00182.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29
XBV00183.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29
XBV00184.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29
XBV00185.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29
XBV00186.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29
XBV00187.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29
XBV00188.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29
XBV00189.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29
XBV00190.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:29
XBV00191.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00192.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00193.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00194.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00195.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00196.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00197.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00198.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00199.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00200.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00201.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00202.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00203.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00204.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00205.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00206.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00207.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00208.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00209.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00210.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00211.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00212.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00213.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00214.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00215.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00216.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00217.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00218.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00219.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00220.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00221.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00222.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:30
XBV00223.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00224.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00225.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00226.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00227.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00228.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00229.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00230.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00231.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00232.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00233.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00234.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00235.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00236.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00237.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00238.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00239.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00240.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00241.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00242.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00243.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00244.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00245.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00246.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00247.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00248.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00249.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00250.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00251.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00252.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00253.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:31
XBV00254.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:32
XBV00255.VDF : 8.12.162.26 2048 Bytes 03.04.2017 09:23:32
XBV00000.VDF : 7.11.70.0 66736640 Bytes 04.04.2013 12:02:04
XBV00001.VDF : 7.11.237.0 48041984 Bytes 02.06.2015 13:33:00
XBV00002.VDF : 7.12.106.228 44941312 Bytes 27.07.2016 14:05:16
XBV00003.VDF : 8.12.113.174 5299200 Bytes 22.08.2016 14:02:05
XBV00004.VDF : 8.12.118.140 3998720 Bytes 15.09.2016 18:30:38
XBV00005.VDF : 8.12.125.14 6024704 Bytes 11.10.2016 14:01:46
XBV00006.VDF : 8.12.132.226 5180928 Bytes 09.11.2016 15:03:07
XBV00007.VDF : 8.12.133.244 1884672 Bytes 16.11.2016 14:52:02
XBV00008.VDF : 8.12.137.174 2475008 Bytes 26.11.2016 10:27:20
XBV00009.VDF : 8.12.143.24 5520384 Bytes 25.12.2016 09:30:30
XBV00010.VDF : 8.12.149.62 6635008 Bytes 21.01.2017 14:28:20
XBV00011.VDF : 8.12.155.56 4918784 Bytes 16.02.2017 06:31:44
XBV00012.VDF : 8.12.158.250 3436544 Bytes 11.03.2017 16:28:23
XBV00013.VDF : 8.12.162.26 5479424 Bytes 03.04.2017 09:23:25
XBV00042.VDF : 8.12.162.40 41984 Bytes 03.04.2017 17:23:59
XBV00043.VDF : 8.12.162.42 24576 Bytes 03.04.2017 17:23:59
XBV00044.VDF : 8.12.162.44 14848 Bytes 03.04.2017 19:23:50
XBV00045.VDF : 8.12.162.46 10240 Bytes 03.04.2017 21:23:35
XBV00046.VDF : 8.12.162.50 77824 Bytes 04.04.2017 08:05:47
XBV00047.VDF : 8.12.162.52 9728 Bytes 04.04.2017 08:05:47
XBV00048.VDF : 8.12.162.54 9728 Bytes 04.04.2017 08:05:47
XBV00049.VDF : 8.12.162.58 10752 Bytes 04.04.2017 12:04:48
XBV00050.VDF : 8.12.162.60 18944 Bytes 04.04.2017 12:04:48
XBV00051.VDF : 8.12.162.62 23040 Bytes 04.04.2017 12:04:48
XBV00052.VDF : 8.12.162.64 2560 Bytes 04.04.2017 14:05:15
XBV00053.VDF : 8.12.162.66 28672 Bytes 04.04.2017 20:34:45
XBV00054.VDF : 8.12.162.68 14848 Bytes 04.04.2017 20:34:45
XBV00055.VDF : 8.12.162.70 9728 Bytes 04.04.2017 20:34:45
XBV00056.VDF : 8.12.162.72 33280 Bytes 04.04.2017 07:34:38
XBV00057.VDF : 8.12.162.76 77312 Bytes 05.04.2017 07:34:38
XBV00058.VDF : 8.12.162.84 52736 Bytes 05.04.2017 13:33:58
XBV00059.VDF : 8.12.162.90 9216 Bytes 05.04.2017 13:33:58
XBV00060.VDF : 8.12.162.96 15872 Bytes 05.04.2017 13:33:58
XBV00061.VDF : 8.12.162.102 13824 Bytes 05.04.2017 17:33:36
XBV00062.VDF : 8.12.162.108 11264 Bytes 05.04.2017 17:33:36
XBV00063.VDF : 8.12.162.114 20992 Bytes 05.04.2017 17:33:36
XBV00064.VDF : 8.12.162.120 19968 Bytes 05.04.2017 19:34:12
XBV00065.VDF : 8.12.162.122 7168 Bytes 05.04.2017 19:34:12
XBV00066.VDF : 8.12.162.126 93696 Bytes 06.04.2017 07:16:06
XBV00067.VDF : 8.12.162.128 11776 Bytes 06.04.2017 07:16:06
XBV00068.VDF : 8.12.162.130 32256 Bytes 06.04.2017 11:15:15
XBV00069.VDF : 8.12.162.132 15872 Bytes 06.04.2017 13:15:17
XBV00070.VDF : 8.12.162.134 8704 Bytes 06.04.2017 13:15:17
XBV00071.VDF : 8.12.162.136 13824 Bytes 06.04.2017 15:15:42
XBV00072.VDF : 8.12.162.138 8192 Bytes 06.04.2017 15:15:42
XBV00073.VDF : 8.12.162.140 13824 Bytes 06.04.2017 17:15:56
XBV00074.VDF : 8.12.162.142 17408 Bytes 06.04.2017 19:16:48
XBV00075.VDF : 8.12.162.144 9216 Bytes 06.04.2017 21:15:27
XBV00076.VDF : 8.12.162.146 11264 Bytes 06.04.2017 21:15:27
XBV00077.VDF : 8.12.162.150 98816 Bytes 07.04.2017 08:17:56
XBV00078.VDF : 8.12.162.152 12800 Bytes 07.04.2017 08:17:56
XBV00079.VDF : 8.12.162.158 5120 Bytes 07.04.2017 08:17:56
XBV00080.VDF : 8.12.162.162 9216 Bytes 07.04.2017 10:17:22
XBV00081.VDF : 8.12.162.166 12800 Bytes 07.04.2017 12:17:29
XBV00082.VDF : 8.12.162.170 21504 Bytes 07.04.2017 14:17:26
XBV00083.VDF : 8.12.162.174 27648 Bytes 07.04.2017 16:17:56
XBV00084.VDF : 8.12.162.176 6144 Bytes 07.04.2017 16:17:56
XBV00085.VDF : 8.12.162.178 14336 Bytes 07.04.2017 23:36:15
XBV00086.VDF : 8.12.162.180 24064 Bytes 07.04.2017 23:36:15
XBV00087.VDF : 8.12.162.182 10240 Bytes 07.04.2017 23:36:15
XBV00088.VDF : 8.12.162.184 13312 Bytes 07.04.2017 23:36:15
XBV00089.VDF : 8.12.162.188 101888 Bytes 08.04.2017 08:45:06
XBV00090.VDF : 8.12.162.190 11264 Bytes 08.04.2017 10:44:49
XBV00091.VDF : 8.12.162.192 26112 Bytes 08.04.2017 12:44:45
XBV00092.VDF : 8.12.162.194 16384 Bytes 08.04.2017 14:44:36
XBV00093.VDF : 8.12.162.196 26112 Bytes 08.04.2017 16:44:46
XBV00094.VDF : 8.12.162.198 109056 Bytes 09.04.2017 10:33:18
XBV00095.VDF : 8.12.162.202 13312 Bytes 09.04.2017 10:33:18
XBV00096.VDF : 8.12.162.206 3584 Bytes 09.04.2017 10:33:18
XBV00097.VDF : 8.12.162.210 7680 Bytes 09.04.2017 12:33:12
XBV00098.VDF : 8.12.162.214 5120 Bytes 09.04.2017 12:33:12
XBV00099.VDF : 8.12.162.218 14336 Bytes 09.04.2017 07:36:18
XBV00100.VDF : 8.12.162.222 122880 Bytes 10.04.2017 07:36:22
XBV00101.VDF : 8.12.162.224 11264 Bytes 10.04.2017 07:36:22
XBV00102.VDF : 8.12.162.226 6656 Bytes 10.04.2017 09:37:02
XBV00103.VDF : 8.12.162.228 7680 Bytes 10.04.2017 11:36:17
XBV00104.VDF : 8.12.162.230 4096 Bytes 10.04.2017 11:36:17
XBV00105.VDF : 8.12.162.232 16896 Bytes 10.04.2017 13:36:28
XBV00106.VDF : 8.12.162.242 2560 Bytes 10.04.2017 13:36:28
XBV00107.VDF : 8.12.162.252 24576 Bytes 10.04.2017 15:36:19
XBV00108.VDF : 8.12.163.6 9216 Bytes 10.04.2017 15:36:19
XBV00109.VDF : 8.12.163.16 19456 Bytes 10.04.2017 17:36:33
XBV00110.VDF : 8.12.163.18 11264 Bytes 10.04.2017 19:36:20
XBV00111.VDF : 8.12.163.20 13824 Bytes 10.04.2017 19:36:20
XBV00112.VDF : 8.12.163.22 7680 Bytes 10.04.2017 23:36:31
XBV00113.VDF : 8.12.163.28 81408 Bytes 11.04.2017 18:32:35
XBV00114.VDF : 8.12.163.30 9216 Bytes 11.04.2017 18:32:35
XBV00115.VDF : 8.12.163.32 9728 Bytes 11.04.2017 18:32:36
XBV00116.VDF : 8.12.163.34 8704 Bytes 11.04.2017 18:32:36
XBV00117.VDF : 8.12.163.36 27648 Bytes 11.04.2017 18:32:36
XBV00118.VDF : 8.12.163.38 10240 Bytes 11.04.2017 18:32:36
XBV00119.VDF : 8.12.163.40 16384 Bytes 11.04.2017 18:32:36
XBV00120.VDF : 8.12.163.42 9216 Bytes 11.04.2017 18:32:36
XBV00121.VDF : 8.12.163.44 8704 Bytes 11.04.2017 18:32:37
XBV00122.VDF : 8.12.163.46 19456 Bytes 11.04.2017 18:32:37
XBV00123.VDF : 8.12.163.48 9728 Bytes 11.04.2017 18:32:37
XBV00124.VDF : 8.12.163.52 80384 Bytes 12.04.2017 18:32:37
XBV00125.VDF : 8.12.163.54 76288 Bytes 12.04.2017 18:32:38
XBV00126.VDF : 8.12.163.64 23040 Bytes 12.04.2017 18:32:38
XBV00127.VDF : 8.12.163.72 15872 Bytes 12.04.2017 18:32:38
XBV00128.VDF : 8.12.163.80 16384 Bytes 12.04.2017 18:32:38
XBV00129.VDF : 8.12.163.88 6144 Bytes 12.04.2017 18:32:38
XBV00130.VDF : 8.12.163.104 43520 Bytes 13.04.2017 18:32:39
XBV00131.VDF : 8.12.163.112 6144 Bytes 13.04.2017 18:32:39
XBV00132.VDF : 8.12.163.120 4096 Bytes 13.04.2017 18:32:39
XBV00133.VDF : 8.12.163.128 60416 Bytes 13.04.2017 18:32:39
XBV00134.VDF : 8.12.163.130 14336 Bytes 13.04.2017 18:32:40
XBV00135.VDF : 8.12.163.132 16384 Bytes 13.04.2017 18:32:40
XBV00136.VDF : 8.12.163.134 13312 Bytes 13.04.2017 18:32:41
XBV00137.VDF : 8.12.163.136 14848 Bytes 13.04.2017 18:32:41
XBV00138.VDF : 8.12.163.138 22016 Bytes 13.04.2017 08:10:24
XBV00139.VDF : 8.12.163.142 81408 Bytes 14.04.2017 08:10:24
XBV00140.VDF : 8.12.163.144 8704 Bytes 14.04.2017 08:10:24
XBV00141.VDF : 8.12.163.146 9728 Bytes 14.04.2017 10:09:21
XBV00142.VDF : 8.12.163.148 3584 Bytes 14.04.2017 12:09:05
XBV00143.VDF : 8.12.163.150 22016 Bytes 14.04.2017 12:09:05
XBV00144.VDF : 8.12.163.152 5632 Bytes 14.04.2017 12:09:06
XBV00145.VDF : 8.12.163.154 28672 Bytes 14.04.2017 14:09:08
XBV00146.VDF : 8.12.163.156 18944 Bytes 14.04.2017 16:09:17
XBV00147.VDF : 8.12.163.158 8704 Bytes 14.04.2017 16:09:17
XBV00148.VDF : 8.12.163.160 10752 Bytes 14.04.2017 01:23:25
XBV00149.VDF : 8.12.163.162 15872 Bytes 14.04.2017 01:23:25
XBV00150.VDF : 8.12.163.164 10240 Bytes 14.04.2017 01:23:25
XBV00151.VDF : 8.12.163.174 73728 Bytes 15.04.2017 08:58:05
XBV00152.VDF : 8.12.163.182 27648 Bytes 15.04.2017 08:58:05
XBV00153.VDF : 8.12.163.190 4608 Bytes 15.04.2017 10:56:53
XBV00154.VDF : 8.12.163.198 9728 Bytes 15.04.2017 12:56:58
XBV00155.VDF : 8.12.163.206 22016 Bytes 15.04.2017 12:56:58
XBV00156.VDF : 8.12.163.208 9216 Bytes 15.04.2017 14:57:01
XBV00157.VDF : 8.12.163.212 113664 Bytes 16.04.2017 09:40:31
XBV00158.VDF : 8.12.163.214 7680 Bytes 16.04.2017 09:40:31
XBV00159.VDF : 8.12.163.216 6144 Bytes 16.04.2017 09:40:31
XBV00160.VDF : 8.12.163.218 7680 Bytes 16.04.2017 11:40:44
XBV00161.VDF : 8.12.163.220 11776 Bytes 16.04.2017 11:40:44
XBV00162.VDF : 8.12.163.222 9728 Bytes 16.04.2017 16:55:53
XBV00163.VDF : 8.12.163.226 110080 Bytes 17.04.2017 12:16:33
XBV00164.VDF : 8.12.163.230 16384 Bytes 17.04.2017 12:16:33
XBV00165.VDF : 8.12.163.232 7680 Bytes 17.04.2017 12:16:33
XBV00166.VDF : 8.12.163.234 10240 Bytes 17.04.2017 14:15:41
XBV00167.VDF : 8.12.163.236 12800 Bytes 17.04.2017 14:15:41
XBV00168.VDF : 8.12.163.240 91136 Bytes 18.04.2017 09:02:35
XBV00169.VDF : 8.12.163.248 8192 Bytes 18.04.2017 09:02:35
XBV00170.VDF : 8.12.163.254 10752 Bytes 18.04.2017 09:02:35
XBV00171.VDF : 8.12.164.4 6144 Bytes 18.04.2017 11:02:13
XBV00172.VDF : 8.12.164.10 12288 Bytes 18.04.2017 13:03:00
XBV00173.VDF : 8.12.164.16 5120 Bytes 18.04.2017 13:03:00
LOCAL000.VDF : 8.12.164.16 216251904 Bytes 18.04.2017 13:04:30
Engine version : 8.3.44.38
AEBB.DLL : 8.1.3.0 59296 Bytes 19.11.2015 16:05:45
AECORE.DLL : 8.3.12.8 262328 Bytes 13.03.2017 13:28:21
AECRYPTO.DLL : 8.2.1.0 129904 Bytes 14.10.2016 12:09:00
AEDROID.DLL : 8.4.3.392 2746280 Bytes 16.11.2016 14:52:11
AEEMU.DLL : 8.1.3.8 404328 Bytes 18.03.2016 12:08:41
AEEXP.DLL : 8.4.4.4 333728 Bytes 20.12.2016 15:18:45
AEGEN.DLL : 8.1.8.322 678648 Bytes 27.02.2017 06:31:56
AEHELP.DLL : 8.3.2.12 284584 Bytes 27.12.2016 13:26:56
AEHEUR.DLL : 8.1.4.2818 11101200 Bytes 13.04.2017 18:33:06
AELIBINF.DLL : 8.2.1.4 68464 Bytes 12.05.2016 09:22:38
AEMOBILE.DLL : 8.1.18.4 346872 Bytes 27.02.2017 06:32:04
AEOFFICE.DLL : 8.3.7.1 614096 Bytes 18.04.2017 11:02:13
AEPACK.DLL : 8.4.2.58 835856 Bytes 22.03.2017 15:38:39
AERDL.DLL : 8.2.1.54 813808 Bytes 27.02.2017 06:32:03
AESBX.DLL : 8.2.22.10 1665568 Bytes 12.03.2017 16:28:39
AESCN.DLL : 8.3.4.8 152768 Bytes 12.03.2017 16:28:37
AESCRIPT.DLL : 8.3.2.128 877416 Bytes 13.04.2017 18:33:09
AEVDF.DLL : 8.3.3.4 142184 Bytes 21.03.2016 12:11:43
AVWINLL.DLL : 15.0.25.161 37448 Bytes 22.03.2017 11:38:32
AVPREF.DLL : 15.0.25.161 63920 Bytes 22.03.2017 11:38:38
AVREP.DLL : 15.0.25.161 233400 Bytes 22.03.2017 11:38:38
AVARKT.DLL : 15.0.25.161 239600 Bytes 22.03.2017 11:38:33
SQLITE3.DLL : 15.0.25.161 473256 Bytes 22.03.2017 11:39:04
AVSMTP.DLL : 15.0.25.161 88904 Bytes 22.03.2017 11:38:41
NETNT.DLL : 15.0.25.161 26568 Bytes 22.03.2017 11:39:01
CommonImageRc.dll: 15.0.25.161 3878048 Bytes 22.03.2017 11:38:33
CommonTextRc.dll: 15.0.25.123 79976 Bytes 22.03.2017 11:38:33
Configuration settings for the scan:
Jobname.............................: Full scan
Configuration file..................: C:\Program Files (x86)\Avira\AntiVir Desktop\sysscan.avp
Reporting...........................: default
Primary action......................: Interactive
Secondary action....................: Ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:, F:, G:, Q:,
Process scan........................: on
Extended process scan...............: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Limit recursion depth...............: 20
Smart extensions....................: on
Macrovirus heuristic................: on
File heuristic......................: extended
Skipped files.......................:
Start of the scan: Dienstag, 18. April 2017 14:40
Start scanning boot sectors:
Boot sector 'HDD0(C:, Q:)'
[INFO] No virus was found!
Boot sector 'HDD1(F:)'
[INFO] No virus was found!
Boot sector 'HDD3(G:)'
[INFO] No virus was found!
Starting search for hidden objects.
The scan of running processes will be started:
Scan process 'svchost.exe' - '59' Module(s) have been scanned
Scan process 'svchost.exe' - '40' Module(s) have been scanned
Scan process 'svchost.exe' - '98' Module(s) have been scanned
Scan process 'svchost.exe' - '121' Module(s) have been scanned
Scan process 'svchost.exe' - '87' Module(s) have been scanned
Scan process 'svchost.exe' - '163' Module(s) have been scanned
Scan process 'svchost.exe' - '34' Module(s) have been scanned
Scan process 'svchost.exe' - '94' Module(s) have been scanned
Scan process 'svchost.exe' - '70' Module(s) have been scanned
Scan process 'spoolsv.exe' - '85' Module(s) have been scanned
Scan process 'sched.exe' - '70' Module(s) have been scanned
Scan process 'armsvc.exe' - '28' Module(s) have been scanned
Scan process 'avguard.exe' - '115' Module(s) have been scanned
Scan process 'Avira.VpnService.exe' - '137' Module(s) have been scanned
Scan process 'Dwm.exe' - '28' Module(s) have been scanned
Scan process 'taskhost.exe' - '71' Module(s) have been scanned
Scan process 'svchost.exe' - '36' Module(s) have been scanned
Scan process 'Explorer.EXE' - '165' Module(s) have been scanned
Scan process 'mDNSResponder.exe' - '40' Module(s) have been scanned
Scan process 'sftvsa.exe' - '32' Module(s) have been scanned
Scan process 'svchost.exe' - '32' Module(s) have been scanned
Scan process 'ImpWiFiSvc.exe' - '27' Module(s) have been scanned
Scan process 'WLIDSVC.EXE' - '56' Module(s) have been scanned
Scan process 'WLIDSvcM.exe' - '17' Module(s) have been scanned
Scan process 'Avira.ServiceHost.exe' - '127' Module(s) have been scanned
Scan process 'igfxpers.exe' - '38' Module(s) have been scanned
Scan process 'hkcmd.exe' - '27' Module(s) have been scanned
Scan process 'utorrent.exe' - '66' Module(s) have been scanned
Scan process 'Proxomitron.exe' - '32' Module(s) have been scanned
Scan process 'Telegram.exe' - '77' Module(s) have been scanned
Scan process 'avshadow.exe' - '43' Module(s) have been scanned
Scan process 'tunmgr.exe' - '62' Module(s) have been scanned
Scan process 'sftlist.exe' - '88' Module(s) have been scanned
Scan process 'avgnt.exe' - '99' Module(s) have been scanned
Scan process 'RIMBBLaunchAgent.exe' - '51' Module(s) have been scanned
Scan process 'PeerManager.exe' - '73' Module(s) have been scanned
Scan process 'CVHSVC.EXE' - '68' Module(s) have been scanned
Scan process 'SearchIndexer.exe' - '54' Module(s) have been scanned
Scan process 'BbDevMgr.exe' - '49' Module(s) have been scanned
Scan process 'svchost.exe' - '37' Module(s) have been scanned
Scan process 'nginx.exe' - '35' Module(s) have been scanned
Scan process 'nginx.exe' - '44' Module(s) have been scanned
Scan process 'conhost.exe' - '15' Module(s) have been scanned
Scan process 'WUDFHost.exe' - '34' Module(s) have been scanned
Scan process 'Avira.Systray.exe' - '140' Module(s) have been scanned
Scan process 'svchost.exe' - '62' Module(s) have been scanned
Scan process 'wmpnetwk.exe' - '118' Module(s) have been scanned
Scan process 'svchost.exe' - '59' Module(s) have been scanned
Scan process 'NASvc.exe' - '48' Module(s) have been scanned
Scan process 'DllHost.exe' - '45' Module(s) have been scanned
Scan process 'svchost.exe' - '28' Module(s) have been scanned
Scan process 'vivaldi.exe' - '159' Module(s) have been scanned
Scan process 'vivaldi.exe' - '29' Module(s) have been scanned
Scan process 'vivaldi.exe' - '77' Module(s) have been scanned
Scan process 'vivaldi.exe' - '58' Module(s) have been scanned
Scan process 'vivaldi.exe' - '58' Module(s) have been scanned
Scan process 'vivaldi.exe' - '58' Module(s) have been scanned
Scan process 'vivaldi.exe' - '58' Module(s) have been scanned
Scan process 'rundll32.exe' - '15' Module(s) have been scanned
Scan process 'vivaldi.exe' - '58' Module(s) have been scanned
Scan process 'RdrCEF.exe' - '93' Module(s) have been scanned
Scan process 'RdrCEF.exe' - '75' Module(s) have been scanned
Scan process 'avscan.exe' - '127' Module(s) have been scanned
Scan process 'vssvc.exe' - '47' Module(s) have been scanned
Scan process 'svchost.exe' - '28' Module(s) have been scanned
Scan process 'smss.exe' - '2' Module(s) have been scanned
Scan process 'csrss.exe' - '18' Module(s) have been scanned
Scan process 'wininit.exe' - '26' Module(s) have been scanned
Scan process 'csrss.exe' - '18' Module(s) have been scanned
Scan process 'services.exe' - '33' Module(s) have been scanned
Scan process 'lsass.exe' - '73' Module(s) have been scanned
Scan process 'lsm.exe' - '16' Module(s) have been scanned
Scan process 'winlogon.exe' - '31' Module(s) have been scanned
Starting to scan executable files (registry):
The file 'C:\Program Files (x86)\Image-Line\FL Studio 8\FL.exe' was found in the cache; the Protection Cloud scan was skipped. SHA256 = 7756ECF83040683CB52E02E05D21F166CA337BC9D819781AFF729D06CEED394B
The file 'C:\Program Files (x86)\Freeware Games\Giana Worlds 0.83 Preview\GianaSetup.exe' was found in the cache; the Protection Cloud scan was skipped. SHA256 = B4CE0AAF41018D64AE9AD61039A2E183C7E73B2A54FFA0BAFC668E5D4DB096C5
The file 'C:\Program Files (x86)\Freeware Games\Giana Worlds 0.83 Preview\GianaWorlds083.exe' was found in the cache; the Protection Cloud scan was skipped. SHA256 = FEC801DCE929DF4C9394139F69FFCFE9322EAD80D8C89F84542109A8D209257B
Successful Cloud SDK initialization and license check.
The file 'C:\Program Files (x86)\Power Undelete Wizard Demo\Power Undelete Wizard(Demo).exe' was scanned with the Protection Cloud. SHA256 = DA80C3887CDCD2C31EE53D0AB93482F6DF77039F87FC5E12CC7BE0963FA502C9
The registry was scanned ( '5027' files ).
Starting the file scan:
Begin scan in 'C:\' <OS>
The file 'C:\GOG Games\Tomb Raider 1+2+3\DOSBOX\Glide2x.dll' was scanned with the Protection Cloud. SHA256 = 380E20B9B812E247617CD6B60D898D9ACD97FD2BE141AAD54CC22A647787F7C7
The file 'C:\Program Files (x86)\Freeware Games\Giana Worlds 0.83 Preview\GianaSetup.exe' was found in the cache; the Protection Cloud scan was skipped. SHA256 = B4CE0AAF41018D64AE9AD61039A2E183C7E73B2A54FFA0BAFC668E5D4DB096C5
The file 'C:\Program Files (x86)\Freeware Games\Giana Worlds 0.83 Preview\GianaWorlds083.exe' was found in the cache; the Protection Cloud scan was skipped. SHA256 = FEC801DCE929DF4C9394139F69FFCFE9322EAD80D8C89F84542109A8D209257B
The file 'C:\Program Files (x86)\HUAWEI Modem Driver\DriverSetup.exe' was scanned with the Protection Cloud. SHA256 = 4C19BDA809D49FEEDBF95DCA45AC87624AAB3D4FAA91967708E0E9B2E8DB95B2
The file 'C:\Program Files (x86)\Image-Line\FL Studio 8\FL.exe' was found in the cache; the Protection Cloud scan was skipped. SHA256 = 7756ECF83040683CB52E02E05D21F166CA337BC9D819781AFF729D06CEED394B
The file 'C:\Program Files (x86)\lamedropXPd3.01-3.98.4\lamedropXPd3.exe' was scanned with the Protection Cloud. SHA256 = 559B84F50AFABE715C5F78C4352AD26A93B970E45119CF488E8A66ACBEDC44AC
The file 'C:\Program Files (x86)\o2\Mobile Connection Manager\PCMCIAs\HUAWEI\Setup.exe' was scanned with the Protection Cloud. SHA256 = C24046806EF66DF30A164CF763D22E9829DF79C44B502296D496B95647E3525A
The file 'C:\Program Files (x86)\Power Undelete Wizard Demo\Power Undelete Wizard(Demo).exe' was scanned with the Protection Cloud. SHA256 = DA80C3887CDCD2C31EE53D0AB93482F6DF77039F87FC5E12CC7BE0963FA502C9
The file 'C:\Program Files (x86)\Ubi Soft\Rayman3\Register\xmltok.dll' was scanned with the Protection Cloud. SHA256 = 2C33790514383FA508D2EEC3A6A5D11F2017B7E244C852ED8B6C021C06FFF752
C:\Users\Philipp\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\14\458aee8e-50c8aa6d
[0] Archive type: ZIP
--> Java_Security.class
[DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
[WARNING] Infected files in archives cannot be repaired
C:\Users\Philipp\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\23\690a7d57-633d556d
[0] Archive type: ZIP
--> Zanaxo.class
[DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
[WARNING] Infected files in archives cannot be repaired
--> Vii.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
[WARNING] Infected files in archives cannot be repaired
--> Third.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
[WARNING] Infected files in archives cannot be repaired
--> Stuc.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
[WARNING] Infected files in archives cannot be repaired
--> Seed.class
[DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
[WARNING] Infected files in archives cannot be repaired
--> Momos.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
[WARNING] Infected files in archives cannot be repaired
--> Kpcas.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
[WARNING] Infected files in archives cannot be repaired
--> Fai.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
[WARNING] Infected files in archives cannot be repaired
--> Atomic.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
[WARNING] Infected files in archives cannot be repaired
--> Accord.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
[WARNING] Infected files in archives cannot be repaired
--> u.class
[DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
[WARNING] Infected files in archives cannot be repaired
C:\Users\Philipp\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\31\5565fadf-5e43bc2a
[0] Archive type: ZIP
--> CBaiAEA.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
[WARNING] Infected files in archives cannot be repaired
--> FWBAhmA.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
[WARNING] Infected files in archives cannot be repaired
--> kCHXi.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
[WARNING] Infected files in archives cannot be repaired
--> uEjwBpl.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
[WARNING] Infected files in archives cannot be repaired
--> xlLxeUH.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
[WARNING] Infected files in archives cannot be repaired
C:\Users\Philipp\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\48\6f40e570-1d303383
[0] Archive type: ZIP
--> main.class
[DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
[WARNING] Infected files in archives cannot be repaired
Begin scan in 'F:\' <F:>
The file 'F:\Eff\Installers\5-8-igp_xp_gart_25203.exe' was scanned with the Protection Cloud. SHA256 = 4D04440E5EE80CD64E0B24CFDD189FD65D5597A7F3E650A3A7AE8AEF4FD8AC55
F:\Eff\Installers\agsetup183se.exe
[0] Archive type: NSIS
--> facemoods.exe
[1] Archive type: NSIS
--> ProgramFilesDir/install.rdf
[DETECTION] Contains virus patterns of Adware ADWARE/DealPly.Y
[WARNING] Infected files in archives cannot be repaired
The file 'F:\Eff\Installers\Firefox Setup 6.0.2.exe' was scanned with the Protection Cloud. SHA256 = 9F27AC5FAF243C9FFB86BE697773FBB84F9CB2CF939D91FF2DFC89E8E2F2E32C
Begin scan in 'G:\' <Volume>
[0] Archive type: Runtime Packed
--> G:\PHILIPP-PC\Backup Set 2012-10-07 190005\Backup Files 2012-10-07 190005\Backup files 2.zip
[1] Archive type: ZIP
--> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
[2] Archive type: ZIP
--> Zanaxo.class
[DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
[WARNING] Infected files in archives cannot be repaired
--> Vii.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
[WARNING] Infected files in archives cannot be repaired
--> Third.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
[WARNING] Infected files in archives cannot be repaired
--> Stuc.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
[WARNING] Infected files in archives cannot be repaired
--> Seed.class
[DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
[WARNING] Infected files in archives cannot be repaired
--> Momos.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
[WARNING] Infected files in archives cannot be repaired
--> Kpcas.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
[WARNING] Infected files in archives cannot be repaired
--> Fai.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
[WARNING] Infected files in archives cannot be repaired
--> Atomic.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
[WARNING] Infected files in archives cannot be repaired
--> Accord.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
[WARNING] Infected files in archives cannot be repaired
--> u.class
[DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
[WARNING] Infected files in archives cannot be repaired
--> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/24f3662f-1ab509e5
[2] Archive type: ZIP
--> a/javaww.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.215 exploit
[WARNING] Infected files in archives cannot be repaired
--> a/b.class
[DETECTION] Contains recognition pattern of the EXP/2012-0507.CN.3 exploit
[WARNING] Infected files in archives cannot be repaired
--> a/a.class
[DETECTION] Contains recognition pattern of the EXP/2012-0507.CO.3 exploit
[WARNING] Infected files in archives cannot be repaired
--> b.class
[DETECTION] Contains recognition pattern of the JAVA/Dldr.Lamar.CX Java virus
[WARNING] Infected files in archives cannot be repaired
--> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
[2] Archive type: ZIP
--> main.class
[DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
[WARNING] Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2012-10-07 190005\Backup Files 2012-10-07 190005\Backup files 2.zip
[DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
--> G:\PHILIPP-PC\Backup Set 2012-10-28 190002\Backup Files 2012-10-28 190002\Backup files 2.zip
[1] Archive type: ZIP
--> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
[2] Archive type: ZIP
--> Zanaxo.class
[DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
[WARNING] Infected files in archives cannot be repaired
--> Vii.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
[WARNING] Infected files in archives cannot be repaired
--> Third.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
[WARNING] Infected files in archives cannot be repaired
--> Stuc.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
[WARNING] Infected files in archives cannot be repaired
--> Seed.class
[DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
[WARNING] Infected files in archives cannot be repaired
--> Momos.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
[WARNING] Infected files in archives cannot be repaired
--> Kpcas.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
[WARNING] Infected files in archives cannot be repaired
--> Fai.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
[WARNING] Infected files in archives cannot be repaired
--> Atomic.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
[WARNING] Infected files in archives cannot be repaired
--> Accord.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
[WARNING] Infected files in archives cannot be repaired
--> u.class
[DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
[WARNING] Infected files in archives cannot be repaired
--> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/24f3662f-1ab509e5
[2] Archive type: ZIP
--> a/javaww.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.215 exploit
[WARNING] Infected files in archives cannot be repaired
--> a/b.class
[DETECTION] Contains recognition pattern of the EXP/2012-0507.CN.3 exploit
[WARNING] Infected files in archives cannot be repaired
--> a/a.class
[DETECTION] Contains recognition pattern of the EXP/2012-0507.CO.3 exploit
[WARNING] Infected files in archives cannot be repaired
--> b.class
[DETECTION] Contains recognition pattern of the JAVA/Dldr.Lamar.CX Java virus
[WARNING] Infected files in archives cannot be repaired
--> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
[2] Archive type: ZIP
--> main.class
[DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
[WARNING] Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2012-10-28 190002\Backup Files 2012-10-28 190002\Backup files 2.zip
[DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
--> G:\PHILIPP-PC\Backup Set 2012-11-18 190005\Backup Files 2012-11-18 190005\Backup files 2.zip
[1] Archive type: ZIP
--> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
[2] Archive type: ZIP
--> Zanaxo.class
[DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
[WARNING] Infected files in archives cannot be repaired
--> Vii.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
[WARNING] Infected files in archives cannot be repaired
--> Third.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
[WARNING] Infected files in archives cannot be repaired
--> Stuc.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
[WARNING] Infected files in archives cannot be repaired
--> Seed.class
[DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
[WARNING] Infected files in archives cannot be repaired
--> Momos.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
[WARNING] Infected files in archives cannot be repaired
--> Kpcas.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
[WARNING] Infected files in archives cannot be repaired
--> Fai.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
[WARNING] Infected files in archives cannot be repaired
--> Atomic.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
[WARNING] Infected files in archives cannot be repaired
--> Accord.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
[WARNING] Infected files in archives cannot be repaired
--> u.class
[DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
[WARNING] Infected files in archives cannot be repaired
--> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/24f3662f-1ab509e5
[2] Archive type: ZIP
--> a/javaww.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.215 exploit
[WARNING] Infected files in archives cannot be repaired
--> a/b.class
[DETECTION] Contains recognition pattern of the EXP/2012-0507.CN.3 exploit
[WARNING] Infected files in archives cannot be repaired
--> a/a.class
[DETECTION] Contains recognition pattern of the EXP/2012-0507.CO.3 exploit
[WARNING] Infected files in archives cannot be repaired
--> b.class
[DETECTION] Contains recognition pattern of the JAVA/Dldr.Lamar.CX Java virus
[WARNING] Infected files in archives cannot be repaired
--> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
[2] Archive type: ZIP
--> main.class
[DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
[WARNING] Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2012-11-18 190005\Backup Files 2012-11-18 190005\Backup files 2.zip
[DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
--> G:\PHILIPP-PC\Backup Set 2012-12-02 210546\Backup Files 2012-12-02 210546\Backup files 2.zip
[1] Archive type: ZIP
--> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
[2] Archive type: ZIP
--> Zanaxo.class
[DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
[WARNING] Infected files in archives cannot be repaired
--> Vii.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
[WARNING] Infected files in archives cannot be repaired
--> Third.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
[WARNING] Infected files in archives cannot be repaired
--> Stuc.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
[WARNING] Infected files in archives cannot be repaired
--> Seed.class
[DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
[WARNING] Infected files in archives cannot be repaired
--> Momos.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
[WARNING] Infected files in archives cannot be repaired
--> Kpcas.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
[WARNING] Infected files in archives cannot be repaired
--> Fai.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
[WARNING] Infected files in archives cannot be repaired
--> Atomic.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
[WARNING] Infected files in archives cannot be repaired
--> Accord.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
[WARNING] Infected files in archives cannot be repaired
--> u.class
[DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
[WARNING] Infected files in archives cannot be repaired
--> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/24f3662f-1ab509e5
[2] Archive type: ZIP
--> a/javaww.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.215 exploit
[WARNING] Infected files in archives cannot be repaired
--> a/b.class
[DETECTION] Contains recognition pattern of the EXP/2012-0507.CN.3 exploit
[WARNING] Infected files in archives cannot be repaired
--> a/a.class
[DETECTION] Contains recognition pattern of the EXP/2012-0507.CO.3 exploit
[WARNING] Infected files in archives cannot be repaired
--> b.class
[DETECTION] Contains recognition pattern of the JAVA/Dldr.Lamar.CX Java virus
[WARNING] Infected files in archives cannot be repaired
--> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
[2] Archive type: ZIP
--> main.class
[DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
[WARNING] Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2012-12-02 210546\Backup Files 2012-12-02 210546\Backup files 2.zip
[DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
--> G:\PHILIPP-PC\Backup Set 2012-12-02 210546\Backup Files 2012-12-10 140340\Backup files 1.zip
[1] Archive type: ZIP
--> G:\PHILIPP-PC\Backup Set 2012-12-24 124445\Backup Files 2012-12-24 124445\Backup files 1.zip
[2] Archive type: ZIP
--> G:\PHILIPP-PC\Backup Set 2012-12-24 124445\Backup Files 2012-12-24 124445\Backup files 2.zip
[3] Archive type: ZIP
--> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
[4] Archive type: ZIP
--> Zanaxo.class
[DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
[WARNING] Infected files in archives cannot be repaired
--> Vii.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
[WARNING] Infected files in archives cannot be repaired
--> Third.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
[WARNING] Infected files in archives cannot be repaired
--> Stuc.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
[WARNING] Infected files in archives cannot be repaired
--> Seed.class
[DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
[WARNING] Infected files in archives cannot be repaired
--> Momos.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
[WARNING] Infected files in archives cannot be repaired
--> Kpcas.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
[WARNING] Infected files in archives cannot be repaired
--> Fai.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
[WARNING] Infected files in archives cannot be repaired
--> Atomic.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
[WARNING] Infected files in archives cannot be repaired
--> Accord.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
[WARNING] Infected files in archives cannot be repaired
--> u.class
[DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
[WARNING] Infected files in archives cannot be repaired
--> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/24f3662f-1ab509e5
[4] Archive type: ZIP
--> a/javaww.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.215 exploit
[WARNING] Infected files in archives cannot be repaired
--> a/b.class
[DETECTION] Contains recognition pattern of the EXP/2012-0507.CN.3 exploit
[WARNING] Infected files in archives cannot be repaired
--> a/a.class
[DETECTION] Contains recognition pattern of the EXP/2012-0507.CO.3 exploit
[WARNING] Infected files in archives cannot be repaired
--> b.class
[DETECTION] Contains recognition pattern of the JAVA/Dldr.Lamar.CX Java virus
[WARNING] Infected files in archives cannot be repaired
--> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
[4] Archive type: ZIP
--> main.class
[DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
[WARNING] Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2012-12-24 124445\Backup Files 2012-12-24 124445\Backup files 2.zip
[DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
--> G:\PHILIPP-PC\Backup Set 2013-01-13 190004\Backup Files 2013-01-13 190004\Backup files 1.zip
[3] Archive type: ZIP
--> G:\PHILIPP-PC\Backup Set 2013-01-13 190004\Backup Files 2013-01-13 190004\Backup files 3.zip
[4] Archive type: ZIP
--> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
[5] Archive type: ZIP
--> Zanaxo.class
[DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
[WARNING] Infected files in archives cannot be repaired
--> Vii.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
[WARNING] Infected files in archives cannot be repaired
--> Third.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
[WARNING] Infected files in archives cannot be repaired
--> Stuc.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
[WARNING] Infected files in archives cannot be repaired
--> Seed.class
[DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
[WARNING] Infected files in archives cannot be repaired
--> Momos.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
[WARNING] Infected files in archives cannot be repaired
--> Kpcas.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
[WARNING] Infected files in archives cannot be repaired
--> Fai.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
[WARNING] Infected files in archives cannot be repaired
--> Atomic.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
[WARNING] Infected files in archives cannot be repaired
--> Accord.class
[DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
[WARNING] Infected files in archives cannot be repaired
--> u.class
[DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
[WARNING] Infected files in archives cannot be repaired
--> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/24f3662f-1ab509e5
[5] Archive type: ZIP
--> a/javaww.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.215 exploit
[WARNING] Infected files in archives cannot be repaired
--> a/b.class
[DETECTION] Contains recognition pattern of the EXP/2012-0507.CN.3 exploit
[WARNING] Infected files in archives cannot be repaired
--> a/a.class
[DETECTION] Contains recognition pattern of the EXP/2012-0507.CO.3 exploit
[WARNING] Infected files in archives cannot be repaired
--> b.class
[DETECTION] Contains recognition pattern of the JAVA/Dldr.Lamar.CX Java virus
[WARNING] Infected files in archives cannot be repaired
--> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
[5] Archive type: ZIP
--> main.class
[DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
[WARNING] Infected files in archives cannot be repaired
|