Zurück   Trojaner-Board > Malware entfernen > Plagegeister aller Art und deren Bekämpfung

Plagegeister aller Art und deren Bekämpfung: Windows-7-PC langsam, Avira findet Adware ohne Ende

Windows 7 Wenn Du nicht sicher bist, ob Du dir Malware oder Trojaner eingefangen hast, erstelle hier ein Thema. Ein Experte wird sich mit weiteren Anweisungen melden und Dir helfen die Malware zu entfernen oder Unerwünschte Software zu deinstallieren bzw. zu löschen. Bitte schildere dein Problem so genau wie möglich. Sollte es ein Trojaner oder Viren Problem sein wird ein Experte Dir bei der Beseitigug der Infektion helfen.

Antwort
Alt 18.04.2017, 23:40   #1
Melione
 
Windows-7-PC langsam, Avira findet Adware ohne Ende - Standard

Windows-7-PC langsam, Avira findet Adware ohne Ende



Hallo zusammen,

mein PC (mit Windows 7 64-bit) ist im Laufe der letzten Monate sehr langsam geworden. So langsam, dass ich heute aus Verdacht mal Antivirus-Scans hab laufen lassen. Als erstes Malwarebytes, ist auch direkt fündig geworden. Hier das Malwarebytes-Log (kopiert aus einer .xml-Datei):



Code:
ATTFilter
<?xml version="1.0" encoding="UTF-16"?>

-<mbam-log>


-<header>

<date>2017/04/18 13:58:16 +0100</date>

<logfile>mbam-log-2017-04-18 (13-58-15).xml</logfile>

<isadmin>yes</isadmin>

</header>


-<engine>

<version>2.00.4.1028</version>

<malware-database>v2017.04.18.03</malware-database>

<rootkit-database>v2017.04.02.01</rootkit-database>

<license>free</license>

<file-protection>disabled</file-protection>

<web-protection>disabled</web-protection>

<self-protection>disabled</self-protection>

</engine>


-<system>

<osversion>Windows 7 Service Pack 1</osversion>

<arch>x64</arch>

<username>Philipp</username>

<filesys>NTFS</filesys>

</system>


-<summary>

<type>threat</type>

<result>completed</result>

<objects>289202</objects>

<time>2105</time>

<processes>0</processes>

<modules>0</modules>

<keys>9</keys>

<values>1</values>

<datas>0</datas>

<folders>9</folders>

<files>5</files>

<sectors>0</sectors>

</summary>


-<options>

<memory>enabled</memory>

<startup>enabled</startup>

<filesystem>enabled</filesystem>

<archives>enabled</archives>

<rootkits>enabled</rootkits>

<deeprootkit>disabled</deeprootkit>

<heuristics>enabled</heuristics>

<pup>warn</pup>

<pum>enabled</pum>

</options>


-<items>


-<key>

<path>HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\ICQ</path>

<vendor>PUP.Optional.Sputnik</vendor>

<action>delete-on-reboot</action>

<hash>8cbde00c4563989e6d13a323a55b5ba5</hash>

</key>


-<key>

<path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Express Files Updater</path>

<vendor>PUP.Optional.ExpressFiles</vendor>

<action>delete-on-reboot</action>

<hash>0643bf2d7038af87fbfb90acf70955ab</hash>

</key>


-<key>

<path>HKLM\SOFTWARE\WOW6432NODE\ExpressFiles</path>

<vendor>PUP.Optional.ExpressFiles</vendor>

<action>success</action>

<hash>c485b13bfaae67cfcd0158126799649c</hash>

</key>


-<key>

<path>HKLM\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\mmiopbgcekanlhpjkonogoljpfmhpkhf</path>

<vendor>PUP.Optional.Reviser</vendor>

<action>success</action>

<hash>d574b735426657df025bc84810f0728e</hash>

</key>


-<key>

<path>HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\ExpressFiles</path>

<vendor>PUP.Optional.ExpressFiles</vendor>

<action>delete-on-reboot</action>

<hash>d871905cbfe96bcb72437deb33cd2bd5</hash>

</key>


-<key>

<path>HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\Mail.Ru</path>

<vendor>PUP.Optional.MailRu</vendor>

<action>delete-on-reboot</action>

<hash>54f578748e1aed491873c7e2a45df10f</hash>

</key>


-<key>

<path>HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\APPDATALOW\SOFTWARE\Mail.Ru</path>

<vendor>PUP.Optional.MailRu</vendor>

<action>delete-on-reboot</action>

<hash>0742c22a792f64d20061f5c232cfc13f</hash>

</key>


-<key>

<path>HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\ESUPPORT.COM\NTFSUndelete</path>

<vendor>PUP.Optional.eSupportNTFSUndelete</vendor>

<action>delete-on-reboot</action>

<hash>a8a1c527b4f490a6675c2b75a35dff01</hash>

</key>


-<key>

<path>HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{3c471948-f874-49f5-b338-4f214a2ee0b1}</path>

<vendor>PUP.Optional.ConduitTB.Gen</vendor>

<action>success</action>

<hash>7acfdb112e7aaf8728178f7aba48cd33</hash>

</key>


-<value>

<path>HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MOZILLA\FIREFOX\EXTENSIONS</path>

<valuename>{9309FA47-1B48-4768-AFA4-9E0556F5DC81}</valuename>

<vendor>PUP.Optional.AdLyrics</vendor>

<action>delete-on-reboot</action>

<valuedata>C:\Program Files (x86)\LyricsPal\128.xpi</valuedata>

<hash>5dec1ad2505841f5bc22f897b15103fd</hash>

</value>


-<folder>

<path>C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\9s0hc6sl.default-1430862582424\extensions\youtubeunblocker__web@unblocker.yt\resources\unblocker-web\data</path>

<vendor>PUP.Optional.YoutubeUnblocker</vendor>

<action>none</action>

<hash>5ced8d5fbdeb42f4afeef02f7d85a25e</hash>

</folder>


-<folder>

<path>C:\Program Files (x86)\Conduit\Community Alerts</path>

<vendor>PUP.Optional.ConduitTB.Gen</vendor>

<action>success</action>

<hash>7acfdb112e7aaf8728178f7aba48cd33</hash>

</folder>


-<folder>

<path>C:\Users\Philipp\AppData\Local\Conduit</path>

<vendor>PUP.Optional.Conduit</vendor>

<action>success</action>

<hash>61e8509c9612a78f014c0d1171918878</hash>

</folder>


-<folder>

<path>C:\Users\Philipp\AppData\LocalLow\Conduit</path>

<vendor>PUP.Optional.Conduit</vendor>

<action>success</action>

<hash>014898545058270f430ba07eb84ac53b</hash>

</folder>


-<folder>

<path>C:\Users\Philipp\AppData\LocalLow\Conduit\Community Alerts</path>

<vendor>PUP.Optional.Conduit</vendor>

<action>success</action>

<hash>014898545058270f430ba07eb84ac53b</hash>

</folder>


-<folder>

<path>C:\Users\Philipp\AppData\LocalLow\Conduit\Community Alerts\Log</path>

<vendor>PUP.Optional.Conduit</vendor>

<action>success</action>

<hash>014898545058270f430ba07eb84ac53b</hash>

</folder>


-<folder>

<path>C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\9s0hc6sl.default-1430862582424\extensions\youtubeunblocker__web@unblocker.yt</path>

<vendor>PUP.Optional.YoutubeUnblocker</vendor>

<action>success</action>

<hash>5ced8d5fbdeb42f4afeef02f7d85a25e</hash>

</folder>


-<folder>

<path>C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\9s0hc6sl.default-1430862582424\extensions\youtubeunblocker__web@unblocker.yt\resources</path>

<vendor>PUP.Optional.YoutubeUnblocker</vendor>

<action>success</action>

<hash>5ced8d5fbdeb42f4afeef02f7d85a25e</hash>

</folder>


-<folder>

<path>C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\9s0hc6sl.default-1430862582424\extensions\youtubeunblocker__web@unblocker.yt\resources\unblocker-web</path>

<vendor>PUP.Optional.YoutubeUnblocker</vendor>

<action>success</action>

<hash>5ced8d5fbdeb42f4afeef02f7d85a25e</hash>

</folder>


-<file>

<path>C:\Users\Philipp\Documents\Downloads\11CT2776682_BrotherSoft_Extreme.exe</path>

<vendor>PUP.Optional.Conduit</vendor>

<action>success</action>

<hash>68e16983693feb4b1b78d50812ef37c9</hash>

</file>


-<file>

<path>C:\Users\Philipp\AppData\Roaming\ICQM\icqsetup.exe</path>

<vendor>PUP.Optional.Sputnik</vendor>

<action>success</action>

<hash>8cbde00c4563989e6d13a323a55b5ba5</hash>

</file>


-<file>

<path>C:\Users\Philipp\AppData\Roaming\ICQM\ICQ\dll\mailrusputnik.exe</path>

<vendor>PUP.Optional.Sputnik</vendor>

<action>success</action>

<hash>7dccdf0dd9cf68ce235df3d3748ce917</hash>

</file>


-<file>

<path>C:\Windows\System32\Tasks\Express Files Updater</path>

<vendor>PUP.Optional.ExpressFiles</vendor>

<action>success</action>

<hash>f851c22a495f88ae0979a59a43bde11f</hash>

</file>


-<file>

<path>C:\Program Files (x86)\Conduit\Community Alerts\Alert.dll</path>

<vendor>PUP.Optional.ConduitTB.Gen</vendor>

<action>success</action>

<hash>7acfdb112e7aaf8728178f7aba48cd33</hash>

</file>

</items>

</mbam-log>
         


Habe versucht, die Funde in Quarantäne zu verschieben, wobei dann allerdings Avira gemeldet hat, dass es einen Eingriff in die Registry verhindert hat. Ich war dann deswegen nicht sicher, ob tatsächlich alles in der Quarantäne gelandet ist, was da rein sollte, also hab ich auch noch einen Avira-Scan laufen lassen. Ich lasse routinemäßig immer wieder einen Schnellsuchlauf machen, hat noch nie angeschlagen, aber jetzt beim Vollscan direkt mal 1404 Treffer, davon allerdings kein einziger als "suspicious" eingestuft. 98 Dateien wurden in die Quarantäne verschoben. Das Logfile ist deutlich zu lang zum Kopieren, daher als Anhang hochgeladen.



Was haltet ihr von alldem?

Liebe Grüße,
- Melione

Alt 19.04.2017, 12:27   #2
cosinus
/// Winkelfunktion
/// TB-Süch-Tiger™
 
Windows-7-PC langsam, Avira findet Adware ohne Ende - Standard

Windows-7-PC langsam, Avira findet Adware ohne Ende



Log bitte NICHT im XML Format posten, das ist fast unlesbar, MBAM bietet extra den Export als TXT an. Auerßdem sind alle Logs vollständig in CODE-Tags zu posten.


Lesestoff:
Posten in CODE-Tags
Die Logfiles anzuhängen oder sogar vorher in ein ZIP, RAR oder 7Z-Archiv zu packen erschwert mir massiv die Arbeit.
Auch wenn die Logs für einen Beitrag zu groß sein sollten, bitte ich dich die Logs direkt und notfalls über mehrere Beiträge verteilt zu posten.
Um die Logfiles in eine CODE-Box zu stellen gehe so vor:
  • Markiere das gesamte Logfile (geht meist mit STRG+A) und kopiere es in die Zwischenablage mit STRG+C.
  • Klicke im Editor auf das #-Symbol. Es erscheinen zwei Klammerausdrücke [CODE] [/CODE].
  • Setze den Curser zwischen die CODE-Tags und drücke STRG+V.
  • Klicke auf Erweitert/Vorschau, um so prüfen, ob du es richtig gemacht hast. Wenn alles stimmt ... auf Antworten.
__________________

__________________

Alt 19.04.2017, 13:19   #3
Melione
 
Windows-7-PC langsam, Avira findet Adware ohne Ende - Standard

Windows-7-PC langsam, Avira findet Adware ohne Ende



Die Forenrichtlinien sollten mal geupdatet werden; da steht drin, wenn Log zu lang für einen Post, dann als Anhang dranmachen.



Malwarebytes:



Code:
ATTFilter
 Malwarebytes Anti-Malware 
www.malwarebytes.org

Suchlauf Datum: 18.04.2017
Suchlauf-Zeit: 13:58:16
Logdatei: mbam-log-2017-04-18 (13-58-15).txt
Administrator: Ja

Version: 2.00.4.1028
Malware Datenbank: v2017.04.18.03
Rootkit Datenbank: v2017.04.02.01
Lizenz: Kostenlos
Malware Schutz: Deaktiviert
Bösartiger Webseiten Schutz: Deaktiviert
Selbstschutz: Deaktiviert

Betriebssystem: Windows 7 Service Pack 1
CPU: x64
Dateisystem: NTFS
Benutzer: Philipp

Suchlauf-Art: Bedrohungs-Suchlauf
Ergebnis: Abgeschlossen
Durchsuchte Objekte: 289202
Verstrichene Zeit: 35 Min, 5 Sek

Speicher: Aktiviert
Autostart: Aktiviert
Dateisystem: Aktiviert
Archive: Aktiviert
Rootkits: Aktiviert
Heuristik: Aktiviert
PUP: Warnen
PUM: Aktiviert

Prozesse: 0
(Keine schädliche Elemente erkannt)

Module: 0
(Keine schädliche Elemente erkannt)

Registrierungsschlüssel: 9
PUP.Optional.Sputnik, HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\ICQ, Löschen bei Neustart, [8cbde00c4563989e6d13a323a55b5ba5], 
PUP.Optional.ExpressFiles, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Express Files Updater, Löschen bei Neustart, [0643bf2d7038af87fbfb90acf70955ab], 
PUP.Optional.ExpressFiles, HKLM\SOFTWARE\WOW6432NODE\ExpressFiles, In Quarantäne, [c485b13bfaae67cfcd0158126799649c], 
PUP.Optional.Reviser, HKLM\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\mmiopbgcekanlhpjkonogoljpfmhpkhf, In Quarantäne, [d574b735426657df025bc84810f0728e], 
PUP.Optional.ExpressFiles, HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\ExpressFiles, Löschen bei Neustart, [d871905cbfe96bcb72437deb33cd2bd5], 
PUP.Optional.MailRu, HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\Mail.Ru, Löschen bei Neustart, [54f578748e1aed491873c7e2a45df10f], 
PUP.Optional.MailRu, HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\APPDATALOW\SOFTWARE\Mail.Ru, Löschen bei Neustart, [0742c22a792f64d20061f5c232cfc13f], 
PUP.Optional.eSupportNTFSUndelete, HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\ESUPPORT.COM\NTFSUndelete, Löschen bei Neustart, [a8a1c527b4f490a6675c2b75a35dff01], 
PUP.Optional.ConduitTB.Gen, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{3c471948-f874-49f5-b338-4f214a2ee0b1}, In Quarantäne, [7acfdb112e7aaf8728178f7aba48cd33], 

Registrierungswerte: 1
PUP.Optional.AdLyrics, HKU\S-1-5-21-3455811494-3201091269-2129086357-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MOZILLA\FIREFOX\EXTENSIONS|{9309FA47-1B48-4768-AFA4-9E0556F5DC81}, C:\Program Files (x86)\LyricsPal\128.xpi, Löschen bei Neustart, [5dec1ad2505841f5bc22f897b15103fd]

Registrierungsdaten: 0
(Keine schädliche Elemente erkannt)

Ordner: 9
PUP.Optional.YoutubeUnblocker, C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\9s0hc6sl.default-1430862582424\extensions\youtubeunblocker__web@unblocker.yt\resources\unblocker-web\data, Keine Aktion durch Benutzer, [5ced8d5fbdeb42f4afeef02f7d85a25e], 
PUP.Optional.ConduitTB.Gen, C:\Program Files (x86)\Conduit\Community Alerts, In Quarantäne, [7acfdb112e7aaf8728178f7aba48cd33], 
PUP.Optional.Conduit, C:\Users\Philipp\AppData\Local\Conduit, In Quarantäne, [61e8509c9612a78f014c0d1171918878], 
PUP.Optional.Conduit, C:\Users\Philipp\AppData\LocalLow\Conduit, In Quarantäne, [014898545058270f430ba07eb84ac53b], 
PUP.Optional.Conduit, C:\Users\Philipp\AppData\LocalLow\Conduit\Community Alerts, In Quarantäne, [014898545058270f430ba07eb84ac53b], 
PUP.Optional.Conduit, C:\Users\Philipp\AppData\LocalLow\Conduit\Community Alerts\Log, In Quarantäne, [014898545058270f430ba07eb84ac53b], 
PUP.Optional.YoutubeUnblocker, C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\9s0hc6sl.default-1430862582424\extensions\youtubeunblocker__web@unblocker.yt, In Quarantäne, [5ced8d5fbdeb42f4afeef02f7d85a25e], 
PUP.Optional.YoutubeUnblocker, C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\9s0hc6sl.default-1430862582424\extensions\youtubeunblocker__web@unblocker.yt\resources, In Quarantäne, [5ced8d5fbdeb42f4afeef02f7d85a25e], 
PUP.Optional.YoutubeUnblocker, C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\9s0hc6sl.default-1430862582424\extensions\youtubeunblocker__web@unblocker.yt\resources\unblocker-web, In Quarantäne, [5ced8d5fbdeb42f4afeef02f7d85a25e], 

Dateien: 5
PUP.Optional.Conduit, C:\Users\Philipp\Documents\Downloads\11CT2776682_BrotherSoft_Extreme.exe, In Quarantäne, [68e16983693feb4b1b78d50812ef37c9], 
PUP.Optional.Sputnik, C:\Users\Philipp\AppData\Roaming\ICQM\icqsetup.exe, In Quarantäne, [8cbde00c4563989e6d13a323a55b5ba5], 
PUP.Optional.Sputnik, C:\Users\Philipp\AppData\Roaming\ICQM\ICQ\dll\mailrusputnik.exe, In Quarantäne, [7dccdf0dd9cf68ce235df3d3748ce917], 
PUP.Optional.ExpressFiles, C:\Windows\System32\Tasks\Express Files Updater, In Quarantäne, [f851c22a495f88ae0979a59a43bde11f], 
PUP.Optional.ConduitTB.Gen, C:\Program Files (x86)\Conduit\Community Alerts\Alert.dll, In Quarantäne, [7acfdb112e7aaf8728178f7aba48cd33], 

Physische Sektoren: 0
(Keine schädliche Elemente erkannt)


(end)
         


Avira, Teil 1:



Code:
ATTFilter
Free Antivirus
Report file date: Dienstag, 18. April 2017  14:40


The program is running as an unrestricted full version.
Online services are available.

Licensee        : Free
Serial number   : 0000149996-AVHOE-0000001
Platform        : Windows 7 Home Premium
Windows version : (Service Pack 1)  [6.1.7601]
Boot mode       : Normally booted
Username        : Philipp
Computer name   : PHILIPP-PC

Version information:
build.dat       : 15.0.25.172    92770 Bytes  21.03.2017 13:01:00
AVSCAN.EXE      : 15.0.25.170  1526936 Bytes  22.03.2017 11:38:40
AVSCANRC.DLL    : 15.0.25.102    64552 Bytes  22.03.2017 11:38:40
LUKE.DLL        : 15.0.25.161    81120 Bytes  22.03.2017 11:39:01
AVSCPLR.DLL     : 15.0.25.170   152840 Bytes  22.03.2017 11:38:41
REPAIR.DLL      : 15.0.25.170   705648 Bytes  22.03.2017 11:38:38
repair.rdf      : 1.0.26.78    1963035 Bytes  18.04.2017 11:02:15
AVREG.DLL       : 15.0.25.170   447360 Bytes  22.03.2017 11:38:38
avlode.dll      : 15.0.25.170   835000 Bytes  22.03.2017 11:38:37
avlode.rdf      : 14.0.5.98     167944 Bytes  23.03.2017 17:34:23
XBV00014.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:17
XBV00015.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:17
XBV00016.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:17
XBV00017.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:17
XBV00018.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:17
XBV00019.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:17
XBV00020.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:17
XBV00021.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:17
XBV00022.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:17
XBV00023.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:17
XBV00024.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:17
XBV00025.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:17
XBV00026.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:17
XBV00027.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:17
XBV00028.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:17
XBV00029.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:17
XBV00030.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:17
XBV00031.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:17
XBV00032.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:18
XBV00033.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:18
XBV00034.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:18
XBV00035.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:18
XBV00036.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:18
XBV00037.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:18
XBV00038.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:18
XBV00039.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:18
XBV00040.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:18
XBV00041.VDF    : 8.12.107.34     2048 Bytes  27.07.2016 14:05:18
XBV00174.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:29
XBV00175.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:29
XBV00176.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:29
XBV00177.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:29
XBV00178.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:29
XBV00179.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:29
XBV00180.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:29
XBV00181.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:29
XBV00182.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:29
XBV00183.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:29
XBV00184.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:29
XBV00185.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:29
XBV00186.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:29
XBV00187.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:29
XBV00188.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:29
XBV00189.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:29
XBV00190.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:29
XBV00191.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00192.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00193.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00194.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00195.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00196.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00197.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00198.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00199.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00200.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00201.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00202.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00203.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00204.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00205.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00206.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00207.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00208.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00209.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00210.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00211.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00212.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00213.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00214.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00215.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00216.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00217.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00218.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00219.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00220.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00221.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00222.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:30
XBV00223.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00224.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00225.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00226.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00227.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00228.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00229.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00230.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00231.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00232.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00233.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00234.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00235.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00236.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00237.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00238.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00239.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00240.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00241.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00242.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00243.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00244.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00245.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00246.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00247.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00248.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00249.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00250.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00251.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00252.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00253.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:31
XBV00254.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:32
XBV00255.VDF    : 8.12.162.26     2048 Bytes  03.04.2017 09:23:32
XBV00000.VDF    : 7.11.70.0   66736640 Bytes  04.04.2013 12:02:04
XBV00001.VDF    : 7.11.237.0  48041984 Bytes  02.06.2015 13:33:00
XBV00002.VDF    : 7.12.106.228 44941312 Bytes  27.07.2016 14:05:16
XBV00003.VDF    : 8.12.113.174  5299200 Bytes  22.08.2016 14:02:05
XBV00004.VDF    : 8.12.118.140  3998720 Bytes  15.09.2016 18:30:38
XBV00005.VDF    : 8.12.125.14  6024704 Bytes  11.10.2016 14:01:46
XBV00006.VDF    : 8.12.132.226  5180928 Bytes  09.11.2016 15:03:07
XBV00007.VDF    : 8.12.133.244  1884672 Bytes  16.11.2016 14:52:02
XBV00008.VDF    : 8.12.137.174  2475008 Bytes  26.11.2016 10:27:20
XBV00009.VDF    : 8.12.143.24  5520384 Bytes  25.12.2016 09:30:30
XBV00010.VDF    : 8.12.149.62  6635008 Bytes  21.01.2017 14:28:20
XBV00011.VDF    : 8.12.155.56  4918784 Bytes  16.02.2017 06:31:44
XBV00012.VDF    : 8.12.158.250  3436544 Bytes  11.03.2017 16:28:23
XBV00013.VDF    : 8.12.162.26  5479424 Bytes  03.04.2017 09:23:25
XBV00042.VDF    : 8.12.162.40    41984 Bytes  03.04.2017 17:23:59
XBV00043.VDF    : 8.12.162.42    24576 Bytes  03.04.2017 17:23:59
XBV00044.VDF    : 8.12.162.44    14848 Bytes  03.04.2017 19:23:50
XBV00045.VDF    : 8.12.162.46    10240 Bytes  03.04.2017 21:23:35
XBV00046.VDF    : 8.12.162.50    77824 Bytes  04.04.2017 08:05:47
XBV00047.VDF    : 8.12.162.52     9728 Bytes  04.04.2017 08:05:47
XBV00048.VDF    : 8.12.162.54     9728 Bytes  04.04.2017 08:05:47
XBV00049.VDF    : 8.12.162.58    10752 Bytes  04.04.2017 12:04:48
XBV00050.VDF    : 8.12.162.60    18944 Bytes  04.04.2017 12:04:48
XBV00051.VDF    : 8.12.162.62    23040 Bytes  04.04.2017 12:04:48
XBV00052.VDF    : 8.12.162.64     2560 Bytes  04.04.2017 14:05:15
XBV00053.VDF    : 8.12.162.66    28672 Bytes  04.04.2017 20:34:45
XBV00054.VDF    : 8.12.162.68    14848 Bytes  04.04.2017 20:34:45
XBV00055.VDF    : 8.12.162.70     9728 Bytes  04.04.2017 20:34:45
XBV00056.VDF    : 8.12.162.72    33280 Bytes  04.04.2017 07:34:38
XBV00057.VDF    : 8.12.162.76    77312 Bytes  05.04.2017 07:34:38
XBV00058.VDF    : 8.12.162.84    52736 Bytes  05.04.2017 13:33:58
XBV00059.VDF    : 8.12.162.90     9216 Bytes  05.04.2017 13:33:58
XBV00060.VDF    : 8.12.162.96    15872 Bytes  05.04.2017 13:33:58
XBV00061.VDF    : 8.12.162.102    13824 Bytes  05.04.2017 17:33:36
XBV00062.VDF    : 8.12.162.108    11264 Bytes  05.04.2017 17:33:36
XBV00063.VDF    : 8.12.162.114    20992 Bytes  05.04.2017 17:33:36
XBV00064.VDF    : 8.12.162.120    19968 Bytes  05.04.2017 19:34:12
XBV00065.VDF    : 8.12.162.122     7168 Bytes  05.04.2017 19:34:12
XBV00066.VDF    : 8.12.162.126    93696 Bytes  06.04.2017 07:16:06
XBV00067.VDF    : 8.12.162.128    11776 Bytes  06.04.2017 07:16:06
XBV00068.VDF    : 8.12.162.130    32256 Bytes  06.04.2017 11:15:15
XBV00069.VDF    : 8.12.162.132    15872 Bytes  06.04.2017 13:15:17
XBV00070.VDF    : 8.12.162.134     8704 Bytes  06.04.2017 13:15:17
XBV00071.VDF    : 8.12.162.136    13824 Bytes  06.04.2017 15:15:42
XBV00072.VDF    : 8.12.162.138     8192 Bytes  06.04.2017 15:15:42
XBV00073.VDF    : 8.12.162.140    13824 Bytes  06.04.2017 17:15:56
XBV00074.VDF    : 8.12.162.142    17408 Bytes  06.04.2017 19:16:48
XBV00075.VDF    : 8.12.162.144     9216 Bytes  06.04.2017 21:15:27
XBV00076.VDF    : 8.12.162.146    11264 Bytes  06.04.2017 21:15:27
XBV00077.VDF    : 8.12.162.150    98816 Bytes  07.04.2017 08:17:56
XBV00078.VDF    : 8.12.162.152    12800 Bytes  07.04.2017 08:17:56
XBV00079.VDF    : 8.12.162.158     5120 Bytes  07.04.2017 08:17:56
XBV00080.VDF    : 8.12.162.162     9216 Bytes  07.04.2017 10:17:22
XBV00081.VDF    : 8.12.162.166    12800 Bytes  07.04.2017 12:17:29
XBV00082.VDF    : 8.12.162.170    21504 Bytes  07.04.2017 14:17:26
XBV00083.VDF    : 8.12.162.174    27648 Bytes  07.04.2017 16:17:56
XBV00084.VDF    : 8.12.162.176     6144 Bytes  07.04.2017 16:17:56
XBV00085.VDF    : 8.12.162.178    14336 Bytes  07.04.2017 23:36:15
XBV00086.VDF    : 8.12.162.180    24064 Bytes  07.04.2017 23:36:15
XBV00087.VDF    : 8.12.162.182    10240 Bytes  07.04.2017 23:36:15
XBV00088.VDF    : 8.12.162.184    13312 Bytes  07.04.2017 23:36:15
XBV00089.VDF    : 8.12.162.188   101888 Bytes  08.04.2017 08:45:06
XBV00090.VDF    : 8.12.162.190    11264 Bytes  08.04.2017 10:44:49
XBV00091.VDF    : 8.12.162.192    26112 Bytes  08.04.2017 12:44:45
XBV00092.VDF    : 8.12.162.194    16384 Bytes  08.04.2017 14:44:36
XBV00093.VDF    : 8.12.162.196    26112 Bytes  08.04.2017 16:44:46
XBV00094.VDF    : 8.12.162.198   109056 Bytes  09.04.2017 10:33:18
XBV00095.VDF    : 8.12.162.202    13312 Bytes  09.04.2017 10:33:18
XBV00096.VDF    : 8.12.162.206     3584 Bytes  09.04.2017 10:33:18
XBV00097.VDF    : 8.12.162.210     7680 Bytes  09.04.2017 12:33:12
XBV00098.VDF    : 8.12.162.214     5120 Bytes  09.04.2017 12:33:12
XBV00099.VDF    : 8.12.162.218    14336 Bytes  09.04.2017 07:36:18
XBV00100.VDF    : 8.12.162.222   122880 Bytes  10.04.2017 07:36:22
XBV00101.VDF    : 8.12.162.224    11264 Bytes  10.04.2017 07:36:22
XBV00102.VDF    : 8.12.162.226     6656 Bytes  10.04.2017 09:37:02
XBV00103.VDF    : 8.12.162.228     7680 Bytes  10.04.2017 11:36:17
XBV00104.VDF    : 8.12.162.230     4096 Bytes  10.04.2017 11:36:17
XBV00105.VDF    : 8.12.162.232    16896 Bytes  10.04.2017 13:36:28
XBV00106.VDF    : 8.12.162.242     2560 Bytes  10.04.2017 13:36:28
XBV00107.VDF    : 8.12.162.252    24576 Bytes  10.04.2017 15:36:19
XBV00108.VDF    : 8.12.163.6      9216 Bytes  10.04.2017 15:36:19
XBV00109.VDF    : 8.12.163.16    19456 Bytes  10.04.2017 17:36:33
XBV00110.VDF    : 8.12.163.18    11264 Bytes  10.04.2017 19:36:20
XBV00111.VDF    : 8.12.163.20    13824 Bytes  10.04.2017 19:36:20
XBV00112.VDF    : 8.12.163.22     7680 Bytes  10.04.2017 23:36:31
XBV00113.VDF    : 8.12.163.28    81408 Bytes  11.04.2017 18:32:35
XBV00114.VDF    : 8.12.163.30     9216 Bytes  11.04.2017 18:32:35
XBV00115.VDF    : 8.12.163.32     9728 Bytes  11.04.2017 18:32:36
XBV00116.VDF    : 8.12.163.34     8704 Bytes  11.04.2017 18:32:36
XBV00117.VDF    : 8.12.163.36    27648 Bytes  11.04.2017 18:32:36
XBV00118.VDF    : 8.12.163.38    10240 Bytes  11.04.2017 18:32:36
XBV00119.VDF    : 8.12.163.40    16384 Bytes  11.04.2017 18:32:36
XBV00120.VDF    : 8.12.163.42     9216 Bytes  11.04.2017 18:32:36
XBV00121.VDF    : 8.12.163.44     8704 Bytes  11.04.2017 18:32:37
XBV00122.VDF    : 8.12.163.46    19456 Bytes  11.04.2017 18:32:37
XBV00123.VDF    : 8.12.163.48     9728 Bytes  11.04.2017 18:32:37
XBV00124.VDF    : 8.12.163.52    80384 Bytes  12.04.2017 18:32:37
XBV00125.VDF    : 8.12.163.54    76288 Bytes  12.04.2017 18:32:38
XBV00126.VDF    : 8.12.163.64    23040 Bytes  12.04.2017 18:32:38
XBV00127.VDF    : 8.12.163.72    15872 Bytes  12.04.2017 18:32:38
XBV00128.VDF    : 8.12.163.80    16384 Bytes  12.04.2017 18:32:38
XBV00129.VDF    : 8.12.163.88     6144 Bytes  12.04.2017 18:32:38
XBV00130.VDF    : 8.12.163.104    43520 Bytes  13.04.2017 18:32:39
XBV00131.VDF    : 8.12.163.112     6144 Bytes  13.04.2017 18:32:39
XBV00132.VDF    : 8.12.163.120     4096 Bytes  13.04.2017 18:32:39
XBV00133.VDF    : 8.12.163.128    60416 Bytes  13.04.2017 18:32:39
XBV00134.VDF    : 8.12.163.130    14336 Bytes  13.04.2017 18:32:40
XBV00135.VDF    : 8.12.163.132    16384 Bytes  13.04.2017 18:32:40
XBV00136.VDF    : 8.12.163.134    13312 Bytes  13.04.2017 18:32:41
XBV00137.VDF    : 8.12.163.136    14848 Bytes  13.04.2017 18:32:41
XBV00138.VDF    : 8.12.163.138    22016 Bytes  13.04.2017 08:10:24
XBV00139.VDF    : 8.12.163.142    81408 Bytes  14.04.2017 08:10:24
XBV00140.VDF    : 8.12.163.144     8704 Bytes  14.04.2017 08:10:24
XBV00141.VDF    : 8.12.163.146     9728 Bytes  14.04.2017 10:09:21
XBV00142.VDF    : 8.12.163.148     3584 Bytes  14.04.2017 12:09:05
XBV00143.VDF    : 8.12.163.150    22016 Bytes  14.04.2017 12:09:05
XBV00144.VDF    : 8.12.163.152     5632 Bytes  14.04.2017 12:09:06
XBV00145.VDF    : 8.12.163.154    28672 Bytes  14.04.2017 14:09:08
XBV00146.VDF    : 8.12.163.156    18944 Bytes  14.04.2017 16:09:17
XBV00147.VDF    : 8.12.163.158     8704 Bytes  14.04.2017 16:09:17
XBV00148.VDF    : 8.12.163.160    10752 Bytes  14.04.2017 01:23:25
XBV00149.VDF    : 8.12.163.162    15872 Bytes  14.04.2017 01:23:25
XBV00150.VDF    : 8.12.163.164    10240 Bytes  14.04.2017 01:23:25
XBV00151.VDF    : 8.12.163.174    73728 Bytes  15.04.2017 08:58:05
XBV00152.VDF    : 8.12.163.182    27648 Bytes  15.04.2017 08:58:05
XBV00153.VDF    : 8.12.163.190     4608 Bytes  15.04.2017 10:56:53
XBV00154.VDF    : 8.12.163.198     9728 Bytes  15.04.2017 12:56:58
XBV00155.VDF    : 8.12.163.206    22016 Bytes  15.04.2017 12:56:58
XBV00156.VDF    : 8.12.163.208     9216 Bytes  15.04.2017 14:57:01
XBV00157.VDF    : 8.12.163.212   113664 Bytes  16.04.2017 09:40:31
XBV00158.VDF    : 8.12.163.214     7680 Bytes  16.04.2017 09:40:31
XBV00159.VDF    : 8.12.163.216     6144 Bytes  16.04.2017 09:40:31
XBV00160.VDF    : 8.12.163.218     7680 Bytes  16.04.2017 11:40:44
XBV00161.VDF    : 8.12.163.220    11776 Bytes  16.04.2017 11:40:44
XBV00162.VDF    : 8.12.163.222     9728 Bytes  16.04.2017 16:55:53
XBV00163.VDF    : 8.12.163.226   110080 Bytes  17.04.2017 12:16:33
XBV00164.VDF    : 8.12.163.230    16384 Bytes  17.04.2017 12:16:33
XBV00165.VDF    : 8.12.163.232     7680 Bytes  17.04.2017 12:16:33
XBV00166.VDF    : 8.12.163.234    10240 Bytes  17.04.2017 14:15:41
XBV00167.VDF    : 8.12.163.236    12800 Bytes  17.04.2017 14:15:41
XBV00168.VDF    : 8.12.163.240    91136 Bytes  18.04.2017 09:02:35
XBV00169.VDF    : 8.12.163.248     8192 Bytes  18.04.2017 09:02:35
XBV00170.VDF    : 8.12.163.254    10752 Bytes  18.04.2017 09:02:35
XBV00171.VDF    : 8.12.164.4      6144 Bytes  18.04.2017 11:02:13
XBV00172.VDF    : 8.12.164.10    12288 Bytes  18.04.2017 13:03:00
XBV00173.VDF    : 8.12.164.16     5120 Bytes  18.04.2017 13:03:00
LOCAL000.VDF    : 8.12.164.16 216251904 Bytes  18.04.2017 13:04:30
Engine version  : 8.3.44.38 
AEBB.DLL        : 8.1.3.0        59296 Bytes  19.11.2015 16:05:45
AECORE.DLL      : 8.3.12.8      262328 Bytes  13.03.2017 13:28:21
AECRYPTO.DLL    : 8.2.1.0       129904 Bytes  14.10.2016 12:09:00
AEDROID.DLL     : 8.4.3.392    2746280 Bytes  16.11.2016 14:52:11
AEEMU.DLL       : 8.1.3.8       404328 Bytes  18.03.2016 12:08:41
AEEXP.DLL       : 8.4.4.4       333728 Bytes  20.12.2016 15:18:45
AEGEN.DLL       : 8.1.8.322     678648 Bytes  27.02.2017 06:31:56
AEHELP.DLL      : 8.3.2.12      284584 Bytes  27.12.2016 13:26:56
AEHEUR.DLL      : 8.1.4.2818  11101200 Bytes  13.04.2017 18:33:06
AELIBINF.DLL    : 8.2.1.4        68464 Bytes  12.05.2016 09:22:38
AEMOBILE.DLL    : 8.1.18.4      346872 Bytes  27.02.2017 06:32:04
AEOFFICE.DLL    : 8.3.7.1       614096 Bytes  18.04.2017 11:02:13
AEPACK.DLL      : 8.4.2.58      835856 Bytes  22.03.2017 15:38:39
AERDL.DLL       : 8.2.1.54      813808 Bytes  27.02.2017 06:32:03
AESBX.DLL       : 8.2.22.10    1665568 Bytes  12.03.2017 16:28:39
AESCN.DLL       : 8.3.4.8       152768 Bytes  12.03.2017 16:28:37
AESCRIPT.DLL    : 8.3.2.128     877416 Bytes  13.04.2017 18:33:09
AEVDF.DLL       : 8.3.3.4       142184 Bytes  21.03.2016 12:11:43
AVWINLL.DLL     : 15.0.25.161    37448 Bytes  22.03.2017 11:38:32
AVPREF.DLL      : 15.0.25.161    63920 Bytes  22.03.2017 11:38:38
AVREP.DLL       : 15.0.25.161   233400 Bytes  22.03.2017 11:38:38
AVARKT.DLL      : 15.0.25.161   239600 Bytes  22.03.2017 11:38:33
SQLITE3.DLL     : 15.0.25.161   473256 Bytes  22.03.2017 11:39:04
AVSMTP.DLL      : 15.0.25.161    88904 Bytes  22.03.2017 11:38:41
NETNT.DLL       : 15.0.25.161    26568 Bytes  22.03.2017 11:39:01
CommonImageRc.dll: 15.0.25.161  3878048 Bytes  22.03.2017 11:38:33
CommonTextRc.dll: 15.0.25.123    79976 Bytes  22.03.2017 11:38:33

Configuration settings for the scan:
Jobname.............................: Full scan
Configuration file..................: C:\Program Files (x86)\Avira\AntiVir Desktop\sysscan.avp
Reporting...........................: default
Primary action......................: Interactive
Secondary action....................: Ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:, F:, G:, Q:, 
Process scan........................: on
Extended process scan...............: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Limit recursion depth...............: 20
Smart extensions....................: on
Macrovirus heuristic................: on
File heuristic......................: extended
Skipped files.......................: 

Start of the scan: Dienstag, 18. April 2017  14:40

Start scanning boot sectors:
Boot sector 'HDD0(C:, Q:)'
    [INFO]      No virus was found!
Boot sector 'HDD1(F:)'
    [INFO]      No virus was found!
Boot sector 'HDD3(G:)'
    [INFO]      No virus was found!

Starting search for hidden objects.

The scan of running processes will be started:
Scan process 'svchost.exe' - '59' Module(s) have been scanned
Scan process 'svchost.exe' - '40' Module(s) have been scanned
Scan process 'svchost.exe' - '98' Module(s) have been scanned
Scan process 'svchost.exe' - '121' Module(s) have been scanned
Scan process 'svchost.exe' - '87' Module(s) have been scanned
Scan process 'svchost.exe' - '163' Module(s) have been scanned
Scan process 'svchost.exe' - '34' Module(s) have been scanned
Scan process 'svchost.exe' - '94' Module(s) have been scanned
Scan process 'svchost.exe' - '70' Module(s) have been scanned
Scan process 'spoolsv.exe' - '85' Module(s) have been scanned
Scan process 'sched.exe' - '70' Module(s) have been scanned
Scan process 'armsvc.exe' - '28' Module(s) have been scanned
Scan process 'avguard.exe' - '115' Module(s) have been scanned
Scan process 'Avira.VpnService.exe' - '137' Module(s) have been scanned
Scan process 'Dwm.exe' - '28' Module(s) have been scanned
Scan process 'taskhost.exe' - '71' Module(s) have been scanned
Scan process 'svchost.exe' - '36' Module(s) have been scanned
Scan process 'Explorer.EXE' - '165' Module(s) have been scanned
Scan process 'mDNSResponder.exe' - '40' Module(s) have been scanned
Scan process 'sftvsa.exe' - '32' Module(s) have been scanned
Scan process 'svchost.exe' - '32' Module(s) have been scanned
Scan process 'ImpWiFiSvc.exe' - '27' Module(s) have been scanned
Scan process 'WLIDSVC.EXE' - '56' Module(s) have been scanned
Scan process 'WLIDSvcM.exe' - '17' Module(s) have been scanned
Scan process 'Avira.ServiceHost.exe' - '127' Module(s) have been scanned
Scan process 'igfxpers.exe' - '38' Module(s) have been scanned
Scan process 'hkcmd.exe' - '27' Module(s) have been scanned
Scan process 'utorrent.exe' - '66' Module(s) have been scanned
Scan process 'Proxomitron.exe' - '32' Module(s) have been scanned
Scan process 'Telegram.exe' - '77' Module(s) have been scanned
Scan process 'avshadow.exe' - '43' Module(s) have been scanned
Scan process 'tunmgr.exe' - '62' Module(s) have been scanned
Scan process 'sftlist.exe' - '88' Module(s) have been scanned
Scan process 'avgnt.exe' - '99' Module(s) have been scanned
Scan process 'RIMBBLaunchAgent.exe' - '51' Module(s) have been scanned
Scan process 'PeerManager.exe' - '73' Module(s) have been scanned
Scan process 'CVHSVC.EXE' - '68' Module(s) have been scanned
Scan process 'SearchIndexer.exe' - '54' Module(s) have been scanned
Scan process 'BbDevMgr.exe' - '49' Module(s) have been scanned
Scan process 'svchost.exe' - '37' Module(s) have been scanned
Scan process 'nginx.exe' - '35' Module(s) have been scanned
Scan process 'nginx.exe' - '44' Module(s) have been scanned
Scan process 'conhost.exe' - '15' Module(s) have been scanned
Scan process 'WUDFHost.exe' - '34' Module(s) have been scanned
Scan process 'Avira.Systray.exe' - '140' Module(s) have been scanned
Scan process 'svchost.exe' - '62' Module(s) have been scanned
Scan process 'wmpnetwk.exe' - '118' Module(s) have been scanned
Scan process 'svchost.exe' - '59' Module(s) have been scanned
Scan process 'NASvc.exe' - '48' Module(s) have been scanned
Scan process 'DllHost.exe' - '45' Module(s) have been scanned
Scan process 'svchost.exe' - '28' Module(s) have been scanned
Scan process 'vivaldi.exe' - '159' Module(s) have been scanned
Scan process 'vivaldi.exe' - '29' Module(s) have been scanned
Scan process 'vivaldi.exe' - '77' Module(s) have been scanned
Scan process 'vivaldi.exe' - '58' Module(s) have been scanned
Scan process 'vivaldi.exe' - '58' Module(s) have been scanned
Scan process 'vivaldi.exe' - '58' Module(s) have been scanned
Scan process 'vivaldi.exe' - '58' Module(s) have been scanned
Scan process 'rundll32.exe' - '15' Module(s) have been scanned
Scan process 'vivaldi.exe' - '58' Module(s) have been scanned
Scan process 'RdrCEF.exe' - '93' Module(s) have been scanned
Scan process 'RdrCEF.exe' - '75' Module(s) have been scanned
Scan process 'avscan.exe' - '127' Module(s) have been scanned
Scan process 'vssvc.exe' - '47' Module(s) have been scanned
Scan process 'svchost.exe' - '28' Module(s) have been scanned
Scan process 'smss.exe' - '2' Module(s) have been scanned
Scan process 'csrss.exe' - '18' Module(s) have been scanned
Scan process 'wininit.exe' - '26' Module(s) have been scanned
Scan process 'csrss.exe' - '18' Module(s) have been scanned
Scan process 'services.exe' - '33' Module(s) have been scanned
Scan process 'lsass.exe' - '73' Module(s) have been scanned
Scan process 'lsm.exe' - '16' Module(s) have been scanned
Scan process 'winlogon.exe' - '31' Module(s) have been scanned

Starting to scan executable files (registry):
The file 'C:\Program Files (x86)\Image-Line\FL Studio 8\FL.exe' was found in the cache; the Protection Cloud scan was skipped. SHA256 = 7756ECF83040683CB52E02E05D21F166CA337BC9D819781AFF729D06CEED394B
The file 'C:\Program Files (x86)\Freeware Games\Giana Worlds 0.83 Preview\GianaSetup.exe' was found in the cache; the Protection Cloud scan was skipped. SHA256 = B4CE0AAF41018D64AE9AD61039A2E183C7E73B2A54FFA0BAFC668E5D4DB096C5
The file 'C:\Program Files (x86)\Freeware Games\Giana Worlds 0.83 Preview\GianaWorlds083.exe' was found in the cache; the Protection Cloud scan was skipped. SHA256 = FEC801DCE929DF4C9394139F69FFCFE9322EAD80D8C89F84542109A8D209257B
Successful Cloud SDK initialization and license check.
The file 'C:\Program Files (x86)\Power Undelete Wizard Demo\Power Undelete Wizard(Demo).exe' was scanned with the Protection Cloud. SHA256 = DA80C3887CDCD2C31EE53D0AB93482F6DF77039F87FC5E12CC7BE0963FA502C9
The registry was scanned ( '5027' files ).


Starting the file scan:

Begin scan in 'C:\' <OS>
The file 'C:\GOG Games\Tomb Raider 1+2+3\DOSBOX\Glide2x.dll' was scanned with the Protection Cloud. SHA256 = 380E20B9B812E247617CD6B60D898D9ACD97FD2BE141AAD54CC22A647787F7C7
The file 'C:\Program Files (x86)\Freeware Games\Giana Worlds 0.83 Preview\GianaSetup.exe' was found in the cache; the Protection Cloud scan was skipped. SHA256 = B4CE0AAF41018D64AE9AD61039A2E183C7E73B2A54FFA0BAFC668E5D4DB096C5
The file 'C:\Program Files (x86)\Freeware Games\Giana Worlds 0.83 Preview\GianaWorlds083.exe' was found in the cache; the Protection Cloud scan was skipped. SHA256 = FEC801DCE929DF4C9394139F69FFCFE9322EAD80D8C89F84542109A8D209257B
The file 'C:\Program Files (x86)\HUAWEI Modem Driver\DriverSetup.exe' was scanned with the Protection Cloud. SHA256 = 4C19BDA809D49FEEDBF95DCA45AC87624AAB3D4FAA91967708E0E9B2E8DB95B2
The file 'C:\Program Files (x86)\Image-Line\FL Studio 8\FL.exe' was found in the cache; the Protection Cloud scan was skipped. SHA256 = 7756ECF83040683CB52E02E05D21F166CA337BC9D819781AFF729D06CEED394B
The file 'C:\Program Files (x86)\lamedropXPd3.01-3.98.4\lamedropXPd3.exe' was scanned with the Protection Cloud. SHA256 = 559B84F50AFABE715C5F78C4352AD26A93B970E45119CF488E8A66ACBEDC44AC
The file 'C:\Program Files (x86)\o2\Mobile Connection Manager\PCMCIAs\HUAWEI\Setup.exe' was scanned with the Protection Cloud. SHA256 = C24046806EF66DF30A164CF763D22E9829DF79C44B502296D496B95647E3525A
The file 'C:\Program Files (x86)\Power Undelete Wizard Demo\Power Undelete Wizard(Demo).exe' was scanned with the Protection Cloud. SHA256 = DA80C3887CDCD2C31EE53D0AB93482F6DF77039F87FC5E12CC7BE0963FA502C9
The file 'C:\Program Files (x86)\Ubi Soft\Rayman3\Register\xmltok.dll' was scanned with the Protection Cloud. SHA256 = 2C33790514383FA508D2EEC3A6A5D11F2017B7E244C852ED8B6C021C06FFF752
C:\Users\Philipp\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\14\458aee8e-50c8aa6d
    [0] Archive type: ZIP
    --> Java_Security.class
        [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
        [WARNING]   Infected files in archives cannot be repaired
C:\Users\Philipp\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\23\690a7d57-633d556d
    [0] Archive type: ZIP
    --> Zanaxo.class
        [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
        [WARNING]   Infected files in archives cannot be repaired
    --> Vii.class
        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
        [WARNING]   Infected files in archives cannot be repaired
    --> Third.class
        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
        [WARNING]   Infected files in archives cannot be repaired
    --> Stuc.class
        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
        [WARNING]   Infected files in archives cannot be repaired
    --> Seed.class
        [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
        [WARNING]   Infected files in archives cannot be repaired
    --> Momos.class
        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
        [WARNING]   Infected files in archives cannot be repaired
    --> Kpcas.class
        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
        [WARNING]   Infected files in archives cannot be repaired
    --> Fai.class
        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
        [WARNING]   Infected files in archives cannot be repaired
    --> Atomic.class
        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
        [WARNING]   Infected files in archives cannot be repaired
    --> Accord.class
        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
        [WARNING]   Infected files in archives cannot be repaired
    --> u.class
        [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
        [WARNING]   Infected files in archives cannot be repaired
C:\Users\Philipp\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\31\5565fadf-5e43bc2a
    [0] Archive type: ZIP
    --> CBaiAEA.class
        [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
        [WARNING]   Infected files in archives cannot be repaired
    --> FWBAhmA.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> kCHXi.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> uEjwBpl.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> xlLxeUH.class
        [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
        [WARNING]   Infected files in archives cannot be repaired
C:\Users\Philipp\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\48\6f40e570-1d303383
    [0] Archive type: ZIP
    --> main.class
        [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
        [WARNING]   Infected files in archives cannot be repaired
Begin scan in 'F:\' <F:>
The file 'F:\Eff\Installers\5-8-igp_xp_gart_25203.exe' was scanned with the Protection Cloud. SHA256 = 4D04440E5EE80CD64E0B24CFDD189FD65D5597A7F3E650A3A7AE8AEF4FD8AC55
F:\Eff\Installers\agsetup183se.exe
    [0] Archive type: NSIS
    --> facemoods.exe
        [1] Archive type: NSIS
      --> ProgramFilesDir/install.rdf
          [DETECTION] Contains virus patterns of Adware ADWARE/DealPly.Y
          [WARNING]   Infected files in archives cannot be repaired
The file 'F:\Eff\Installers\Firefox Setup 6.0.2.exe' was scanned with the Protection Cloud. SHA256 = 9F27AC5FAF243C9FFB86BE697773FBB84F9CB2CF939D91FF2DFC89E8E2F2E32C
Begin scan in 'G:\' <Volume>
    [0] Archive type: Runtime Packed
    --> G:\PHILIPP-PC\Backup Set 2012-10-07 190005\Backup Files 2012-10-07 190005\Backup files 2.zip
        [1] Archive type: ZIP
      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
          [2] Archive type: ZIP
        --> Zanaxo.class
            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Vii.class
            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Third.class
            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Stuc.class
            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Seed.class
            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Momos.class
            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Kpcas.class
            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Fai.class
            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Atomic.class
            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Accord.class
            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> u.class
            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
            [WARNING]   Infected files in archives cannot be repaired
      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/24f3662f-1ab509e5
          [2] Archive type: ZIP
        --> a/javaww.class
            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.215 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> a/b.class
            [DETECTION] Contains recognition pattern of the EXP/2012-0507.CN.3 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> a/a.class
            [DETECTION] Contains recognition pattern of the EXP/2012-0507.CO.3 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> b.class
            [DETECTION] Contains recognition pattern of the JAVA/Dldr.Lamar.CX Java virus
            [WARNING]   Infected files in archives cannot be repaired
      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
          [2] Archive type: ZIP
        --> main.class
            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2012-10-07 190005\Backup Files 2012-10-07 190005\Backup files 2.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
    --> G:\PHILIPP-PC\Backup Set 2012-10-28 190002\Backup Files 2012-10-28 190002\Backup files 2.zip
        [1] Archive type: ZIP
      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
          [2] Archive type: ZIP
        --> Zanaxo.class
            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Vii.class
            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Third.class
            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Stuc.class
            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Seed.class
            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Momos.class
            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Kpcas.class
            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Fai.class
            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Atomic.class
            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Accord.class
            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> u.class
            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
            [WARNING]   Infected files in archives cannot be repaired
      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/24f3662f-1ab509e5
          [2] Archive type: ZIP
        --> a/javaww.class
            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.215 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> a/b.class
            [DETECTION] Contains recognition pattern of the EXP/2012-0507.CN.3 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> a/a.class
            [DETECTION] Contains recognition pattern of the EXP/2012-0507.CO.3 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> b.class
            [DETECTION] Contains recognition pattern of the JAVA/Dldr.Lamar.CX Java virus
            [WARNING]   Infected files in archives cannot be repaired
      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
          [2] Archive type: ZIP
        --> main.class
            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2012-10-28 190002\Backup Files 2012-10-28 190002\Backup files 2.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
    --> G:\PHILIPP-PC\Backup Set 2012-11-18 190005\Backup Files 2012-11-18 190005\Backup files 2.zip
        [1] Archive type: ZIP
      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
          [2] Archive type: ZIP
        --> Zanaxo.class
            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Vii.class
            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Third.class
            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Stuc.class
            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Seed.class
            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Momos.class
            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Kpcas.class
            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Fai.class
            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Atomic.class
            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Accord.class
            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> u.class
            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
            [WARNING]   Infected files in archives cannot be repaired
      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/24f3662f-1ab509e5
          [2] Archive type: ZIP
        --> a/javaww.class
            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.215 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> a/b.class
            [DETECTION] Contains recognition pattern of the EXP/2012-0507.CN.3 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> a/a.class
            [DETECTION] Contains recognition pattern of the EXP/2012-0507.CO.3 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> b.class
            [DETECTION] Contains recognition pattern of the JAVA/Dldr.Lamar.CX Java virus
            [WARNING]   Infected files in archives cannot be repaired
      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
          [2] Archive type: ZIP
        --> main.class
            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2012-11-18 190005\Backup Files 2012-11-18 190005\Backup files 2.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
    --> G:\PHILIPP-PC\Backup Set 2012-12-02 210546\Backup Files 2012-12-02 210546\Backup files 2.zip
        [1] Archive type: ZIP
      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
          [2] Archive type: ZIP
        --> Zanaxo.class
            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Vii.class
            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Third.class
            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Stuc.class
            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Seed.class
            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Momos.class
            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Kpcas.class
            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Fai.class
            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Atomic.class
            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> Accord.class
            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> u.class
            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
            [WARNING]   Infected files in archives cannot be repaired
      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/24f3662f-1ab509e5
          [2] Archive type: ZIP
        --> a/javaww.class
            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.215 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> a/b.class
            [DETECTION] Contains recognition pattern of the EXP/2012-0507.CN.3 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> a/a.class
            [DETECTION] Contains recognition pattern of the EXP/2012-0507.CO.3 exploit
            [WARNING]   Infected files in archives cannot be repaired
        --> b.class
            [DETECTION] Contains recognition pattern of the JAVA/Dldr.Lamar.CX Java virus
            [WARNING]   Infected files in archives cannot be repaired
      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
          [2] Archive type: ZIP
        --> main.class
            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2012-12-02 210546\Backup Files 2012-12-02 210546\Backup files 2.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
    --> G:\PHILIPP-PC\Backup Set 2012-12-02 210546\Backup Files 2012-12-10 140340\Backup files 1.zip
        [1] Archive type: ZIP
      --> G:\PHILIPP-PC\Backup Set 2012-12-24 124445\Backup Files 2012-12-24 124445\Backup files 1.zip
          [2] Archive type: ZIP
        --> G:\PHILIPP-PC\Backup Set 2012-12-24 124445\Backup Files 2012-12-24 124445\Backup files 2.zip
            [3] Archive type: ZIP
          --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
              [4] Archive type: ZIP
            --> Zanaxo.class
                [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                [WARNING]   Infected files in archives cannot be repaired
            --> Vii.class
                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                [WARNING]   Infected files in archives cannot be repaired
            --> Third.class
                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                [WARNING]   Infected files in archives cannot be repaired
            --> Stuc.class
                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                [WARNING]   Infected files in archives cannot be repaired
            --> Seed.class
                [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                [WARNING]   Infected files in archives cannot be repaired
            --> Momos.class
                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                [WARNING]   Infected files in archives cannot be repaired
            --> Kpcas.class
                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                [WARNING]   Infected files in archives cannot be repaired
            --> Fai.class
                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                [WARNING]   Infected files in archives cannot be repaired
            --> Atomic.class
                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                [WARNING]   Infected files in archives cannot be repaired
            --> Accord.class
                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                [WARNING]   Infected files in archives cannot be repaired
            --> u.class
                [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                [WARNING]   Infected files in archives cannot be repaired
          --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/24f3662f-1ab509e5
              [4] Archive type: ZIP
            --> a/javaww.class
                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.215 exploit
                [WARNING]   Infected files in archives cannot be repaired
            --> a/b.class
                [DETECTION] Contains recognition pattern of the EXP/2012-0507.CN.3 exploit
                [WARNING]   Infected files in archives cannot be repaired
            --> a/a.class
                [DETECTION] Contains recognition pattern of the EXP/2012-0507.CO.3 exploit
                [WARNING]   Infected files in archives cannot be repaired
            --> b.class
                [DETECTION] Contains recognition pattern of the JAVA/Dldr.Lamar.CX Java virus
                [WARNING]   Infected files in archives cannot be repaired
          --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
              [4] Archive type: ZIP
            --> main.class
                [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2012-12-24 124445\Backup Files 2012-12-24 124445\Backup files 2.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
        --> G:\PHILIPP-PC\Backup Set 2013-01-13 190004\Backup Files 2013-01-13 190004\Backup files 1.zip
            [3] Archive type: ZIP
          --> G:\PHILIPP-PC\Backup Set 2013-01-13 190004\Backup Files 2013-01-13 190004\Backup files 3.zip
              [4] Archive type: ZIP
            --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                [5] Archive type: ZIP
              --> Zanaxo.class
                  [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                  [WARNING]   Infected files in archives cannot be repaired
              --> Vii.class
                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                  [WARNING]   Infected files in archives cannot be repaired
              --> Third.class
                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                  [WARNING]   Infected files in archives cannot be repaired
              --> Stuc.class
                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                  [WARNING]   Infected files in archives cannot be repaired
              --> Seed.class
                  [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                  [WARNING]   Infected files in archives cannot be repaired
              --> Momos.class
                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                  [WARNING]   Infected files in archives cannot be repaired
              --> Kpcas.class
                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                  [WARNING]   Infected files in archives cannot be repaired
              --> Fai.class
                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                  [WARNING]   Infected files in archives cannot be repaired
              --> Atomic.class
                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                  [WARNING]   Infected files in archives cannot be repaired
              --> Accord.class
                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                  [WARNING]   Infected files in archives cannot be repaired
              --> u.class
                  [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                  [WARNING]   Infected files in archives cannot be repaired
            --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/24f3662f-1ab509e5
                [5] Archive type: ZIP
              --> a/javaww.class
                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.215 exploit
                  [WARNING]   Infected files in archives cannot be repaired
              --> a/b.class
                  [DETECTION] Contains recognition pattern of the EXP/2012-0507.CN.3 exploit
                  [WARNING]   Infected files in archives cannot be repaired
              --> a/a.class
                  [DETECTION] Contains recognition pattern of the EXP/2012-0507.CO.3 exploit
                  [WARNING]   Infected files in archives cannot be repaired
              --> b.class
                  [DETECTION] Contains recognition pattern of the JAVA/Dldr.Lamar.CX Java virus
                  [WARNING]   Infected files in archives cannot be repaired
            --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                [5] Archive type: ZIP
              --> main.class
                  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                  [WARNING]   Infected files in archives cannot be repaired
         
__________________

Alt 19.04.2017, 13:21   #4
Melione
 
Windows-7-PC langsam, Avira findet Adware ohne Ende - Standard

Windows-7-PC langsam, Avira findet Adware ohne Ende



Avira, Teil 2:



Code:
ATTFilter
G:\PHILIPP-PC\Backup Set 2013-01-13 190004\Backup Files 2013-01-13 190004\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
          --> G:\PHILIPP-PC\Backup Set 2013-02-03 190007\Backup Files 2013-02-03 190007\Backup files 1.zip
              [4] Archive type: ZIP
            --> G:\PHILIPP-PC\Backup Set 2013-02-03 190007\Backup Files 2013-02-03 190007\Backup files 3.zip
                [5] Archive type: ZIP
              --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                  [6] Archive type: ZIP
                --> Zanaxo.class
                    [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                    [WARNING]   Infected files in archives cannot be repaired
                --> Vii.class
                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                    [WARNING]   Infected files in archives cannot be repaired
                --> Third.class
                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                    [WARNING]   Infected files in archives cannot be repaired
                --> Stuc.class
                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                    [WARNING]   Infected files in archives cannot be repaired
                --> Seed.class
                    [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                    [WARNING]   Infected files in archives cannot be repaired
                --> Momos.class
                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                    [WARNING]   Infected files in archives cannot be repaired
                --> Kpcas.class
                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                    [WARNING]   Infected files in archives cannot be repaired
                --> Fai.class
                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                    [WARNING]   Infected files in archives cannot be repaired
                --> Atomic.class
                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                    [WARNING]   Infected files in archives cannot be repaired
                --> Accord.class
                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                    [WARNING]   Infected files in archives cannot be repaired
                --> u.class
                    [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                    [WARNING]   Infected files in archives cannot be repaired
              --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/24f3662f-1ab509e5
                  [6] Archive type: ZIP
                --> a/javaww.class
                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.215 exploit
                    [WARNING]   Infected files in archives cannot be repaired
                --> a/b.class
                    [DETECTION] Contains recognition pattern of the EXP/2012-0507.CN.3 exploit
                    [WARNING]   Infected files in archives cannot be repaired
                --> a/a.class
                    [DETECTION] Contains recognition pattern of the EXP/2012-0507.CO.3 exploit
                    [WARNING]   Infected files in archives cannot be repaired
                --> b.class
                    [DETECTION] Contains recognition pattern of the JAVA/Dldr.Lamar.CX Java virus
                    [WARNING]   Infected files in archives cannot be repaired
              --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                  [6] Archive type: ZIP
                --> main.class
                    [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                    [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2013-02-03 190007\Backup Files 2013-02-03 190007\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
            --> G:\PHILIPP-PC\Backup Set 2013-02-03 190007\Backup Files 2013-02-10 190004\Backup files 1.zip
                [5] Archive type: ZIP
              --> C/Users/Philipp/AppData/Local/Opera/Opera/cache/g_0015/opr1Q7SE.tmp
                  [6] Archive type: GZ
                --> Object
                    [DETECTION] Contains recognition pattern of the HTML/Redirect.00 HTML script virus
                    [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2013-02-03 190007\Backup Files 2013-02-10 190004\Backup files 1.zip
  [DETECTION] Contains recognition pattern of the HTML/Redirect.00 HTML script virus
            --> G:\PHILIPP-PC\Backup Set 2013-02-03 190007\Backup Files 2013-02-17 190006\Backup files 1.zip
                [5] Archive type: ZIP
              --> C/Users/Philipp/AppData/Local/Opera/Opera/cache/g_0062/opr1RTVT.tmp
                  [6] Archive type: RAR
                --> GALAS_VIDEO_DIARY_2.4_BY_GALA.mp4
                    [WARNING]   The file could not be read!
              --> C/Users/Philipp/AppData/Local/Opera/Opera/cache/g_0062/opr1RTW0.tmp
                  [6] Archive type: RAR
                --> sss213-\abclider.bmp
                    [WARNING]   The file could not be read!
            --> G:\PHILIPP-PC\Backup Set 2013-03-03 230723\Backup Files 2013-03-03 230723\Backup files 1.zip
                [5] Archive type: ZIP
              --> G:\PHILIPP-PC\Backup Set 2013-03-03 230723\Backup Files 2013-03-03 230723\Backup files 3.zip
                  [6] Archive type: ZIP
                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                    [7] Archive type: ZIP
                  --> Zanaxo.class
                      [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                      [WARNING]   Infected files in archives cannot be repaired
                  --> Vii.class
                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                      [WARNING]   Infected files in archives cannot be repaired
                  --> Third.class
                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                      [WARNING]   Infected files in archives cannot be repaired
                  --> Stuc.class
                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                      [WARNING]   Infected files in archives cannot be repaired
                  --> Seed.class
                      [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                      [WARNING]   Infected files in archives cannot be repaired
                  --> Momos.class
                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                      [WARNING]   Infected files in archives cannot be repaired
                  --> Kpcas.class
                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                      [WARNING]   Infected files in archives cannot be repaired
                  --> Fai.class
                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                      [WARNING]   Infected files in archives cannot be repaired
                  --> Atomic.class
                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                      [WARNING]   Infected files in archives cannot be repaired
                  --> Accord.class
                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                      [WARNING]   Infected files in archives cannot be repaired
                  --> u.class
                      [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                      [WARNING]   Infected files in archives cannot be repaired
                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/24f3662f-1ab509e5
                    [7] Archive type: ZIP
                  --> a/javaww.class
                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.215 exploit
                      [WARNING]   Infected files in archives cannot be repaired
                  --> a/b.class
                      [DETECTION] Contains recognition pattern of the EXP/2012-0507.CN.3 exploit
                      [WARNING]   Infected files in archives cannot be repaired
                  --> a/a.class
                      [DETECTION] Contains recognition pattern of the EXP/2012-0507.CO.3 exploit
                      [WARNING]   Infected files in archives cannot be repaired
                  --> b.class
                      [DETECTION] Contains recognition pattern of the JAVA/Dldr.Lamar.CX Java virus
                      [WARNING]   Infected files in archives cannot be repaired
                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                    [7] Archive type: ZIP
                  --> main.class
                      [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                      [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2013-03-03 230723\Backup Files 2013-03-03 230723\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
              --> G:\PHILIPP-PC\Backup Set 2013-03-27 140706\Backup Files 2013-03-27 140706\Backup files 1.zip
                  [6] Archive type: ZIP
                --> G:\PHILIPP-PC\Backup Set 2013-03-27 140706\Backup Files 2013-03-27 140706\Backup files 3.zip
                    [7] Archive type: ZIP
                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                      [8] Archive type: ZIP
                    --> Zanaxo.class
                        [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                        [WARNING]   Infected files in archives cannot be repaired
                    --> Vii.class
                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                        [WARNING]   Infected files in archives cannot be repaired
                    --> Third.class
                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                        [WARNING]   Infected files in archives cannot be repaired
                    --> Stuc.class
                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                        [WARNING]   Infected files in archives cannot be repaired
                    --> Seed.class
                        [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                        [WARNING]   Infected files in archives cannot be repaired
                    --> Momos.class
                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                        [WARNING]   Infected files in archives cannot be repaired
                    --> Kpcas.class
                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                        [WARNING]   Infected files in archives cannot be repaired
                    --> Fai.class
                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                        [WARNING]   Infected files in archives cannot be repaired
                    --> Atomic.class
                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                        [WARNING]   Infected files in archives cannot be repaired
                    --> Accord.class
                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                        [WARNING]   Infected files in archives cannot be repaired
                    --> u.class
                        [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                        [WARNING]   Infected files in archives cannot be repaired
                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                      [8] Archive type: ZIP
                    --> main.class
                        [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                        [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2013-03-27 140706\Backup Files 2013-03-27 140706\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                --> G:\PHILIPP-PC\Backup Set 2013-04-14 190002\Backup Files 2013-04-14 190002\Backup files 1.zip
                    [7] Archive type: ZIP
                  --> G:\PHILIPP-PC\Backup Set 2013-04-14 190002\Backup Files 2013-04-14 190002\Backup files 3.zip
                      [8] Archive type: ZIP
                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                        [9] Archive type: ZIP
                      --> Zanaxo.class
                          [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                          [WARNING]   Infected files in archives cannot be repaired
                      --> Vii.class
                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                          [WARNING]   Infected files in archives cannot be repaired
                      --> Third.class
                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                          [WARNING]   Infected files in archives cannot be repaired
                      --> Stuc.class
                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                          [WARNING]   Infected files in archives cannot be repaired
                      --> Seed.class
                          [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                          [WARNING]   Infected files in archives cannot be repaired
                      --> Momos.class
                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                          [WARNING]   Infected files in archives cannot be repaired
                      --> Kpcas.class
                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                          [WARNING]   Infected files in archives cannot be repaired
                      --> Fai.class
                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                          [WARNING]   Infected files in archives cannot be repaired
                      --> Atomic.class
                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                          [WARNING]   Infected files in archives cannot be repaired
                      --> Accord.class
                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                          [WARNING]   Infected files in archives cannot be repaired
                      --> u.class
                          [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                          [WARNING]   Infected files in archives cannot be repaired
                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                        [9] Archive type: ZIP
                      --> main.class
                          [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                          [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2013-04-14 190002\Backup Files 2013-04-14 190002\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                  --> G:\PHILIPP-PC\Backup Set 2013-05-06 172759\Backup Files 2013-05-06 172759\Backup files 1.zip
                      [8] Archive type: ZIP
                    --> G:\PHILIPP-PC\Backup Set 2013-05-06 172759\Backup Files 2013-05-06 172759\Backup files 3.zip
                        [9] Archive type: ZIP
                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                          [10] Archive type: ZIP
                        --> Zanaxo.class
                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                            [WARNING]   Infected files in archives cannot be repaired
                        --> Vii.class
                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                            [WARNING]   Infected files in archives cannot be repaired
                        --> Third.class
                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                            [WARNING]   Infected files in archives cannot be repaired
                        --> Stuc.class
                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                            [WARNING]   Infected files in archives cannot be repaired
                        --> Seed.class
                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                            [WARNING]   Infected files in archives cannot be repaired
                        --> Momos.class
                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                            [WARNING]   Infected files in archives cannot be repaired
                        --> Kpcas.class
                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                            [WARNING]   Infected files in archives cannot be repaired
                        --> Fai.class
                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                            [WARNING]   Infected files in archives cannot be repaired
                        --> Atomic.class
                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                            [WARNING]   Infected files in archives cannot be repaired
                        --> Accord.class
                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                            [WARNING]   Infected files in archives cannot be repaired
                        --> u.class
                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                            [WARNING]   Infected files in archives cannot be repaired
                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                          [10] Archive type: ZIP
                        --> main.class
                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2013-05-06 172759\Backup Files 2013-05-06 172759\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                    --> G:\PHILIPP-PC\Backup Set 2013-05-26 190009\Backup Files 2013-05-26 190009\Backup files 1.zip
                        [9] Archive type: ZIP
                      --> G:\PHILIPP-PC\Backup Set 2013-05-26 190009\Backup Files 2013-05-26 190009\Backup files 3.zip
                          [10] Archive type: ZIP
                        --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                            [11] Archive type: ZIP
                          --> Zanaxo.class
                              [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                              [WARNING]   Infected files in archives cannot be repaired
                          --> Vii.class
                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                              [WARNING]   Infected files in archives cannot be repaired
                          --> Third.class
                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                              [WARNING]   Infected files in archives cannot be repaired
                          --> Stuc.class
                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                              [WARNING]   Infected files in archives cannot be repaired
                          --> Seed.class
                              [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                              [WARNING]   Infected files in archives cannot be repaired
                          --> Momos.class
                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                              [WARNING]   Infected files in archives cannot be repaired
                          --> Kpcas.class
                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                              [WARNING]   Infected files in archives cannot be repaired
                          --> Fai.class
                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                              [WARNING]   Infected files in archives cannot be repaired
                          --> Atomic.class
                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                              [WARNING]   Infected files in archives cannot be repaired
                          --> Accord.class
                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                              [WARNING]   Infected files in archives cannot be repaired
                          --> u.class
                              [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                              [WARNING]   Infected files in archives cannot be repaired
                        --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                            [11] Archive type: ZIP
                          --> main.class
                              [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                              [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2013-05-26 190009\Backup Files 2013-05-26 190009\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                      --> G:\PHILIPP-PC\Backup Set 2013-06-09 194227\Backup Files 2013-06-09 194227\Backup files 1.zip
                          [10] Archive type: ZIP
                        --> G:\PHILIPP-PC\Backup Set 2013-06-09 194227\Backup Files 2013-06-09 194227\Backup files 3.zip
                            [11] Archive type: ZIP
                          --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                              [12] Archive type: ZIP
                            --> Zanaxo.class
                                [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                [WARNING]   Infected files in archives cannot be repaired
                            --> Vii.class
                                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                [WARNING]   Infected files in archives cannot be repaired
                            --> Third.class
                                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                [WARNING]   Infected files in archives cannot be repaired
                            --> Stuc.class
                                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                [WARNING]   Infected files in archives cannot be repaired
                            --> Seed.class
                                [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                [WARNING]   Infected files in archives cannot be repaired
                            --> Momos.class
                                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                [WARNING]   Infected files in archives cannot be repaired
                            --> Kpcas.class
                                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                [WARNING]   Infected files in archives cannot be repaired
                            --> Fai.class
                                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                [WARNING]   Infected files in archives cannot be repaired
                            --> Atomic.class
                                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                [WARNING]   Infected files in archives cannot be repaired
                            --> Accord.class
                                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                [WARNING]   Infected files in archives cannot be repaired
                            --> u.class
                                [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                [WARNING]   Infected files in archives cannot be repaired
                          --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                              [12] Archive type: ZIP
                            --> main.class
                                [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2013-06-09 194227\Backup Files 2013-06-09 194227\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                        --> G:\PHILIPP-PC\Backup Set 2013-06-09 194227\Backup Files 2013-06-24 174918\Backup files 1.zip
                            [11] Archive type: ZIP
                          --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                              [12] Archive type: ZIP
                            --> CBaiAEA.class
                                [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                [WARNING]   Infected files in archives cannot be repaired
                            --> FWBAhmA.class
                                [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                [WARNING]   Infected files in archives cannot be repaired
                            --> kCHXi.class
                                [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                [WARNING]   Infected files in archives cannot be repaired
                            --> uEjwBpl.class
                                [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                [WARNING]   Infected files in archives cannot be repaired
                            --> xlLxeUH.class
                                [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2013-06-09 194227\Backup Files 2013-06-24 174918\Backup files 1.zip
  [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                        --> G:\PHILIPP-PC\Backup Set 2013-06-30 213122\Backup Files 2013-06-30 213122\Backup files 1.zip
                            [11] Archive type: ZIP
                          --> G:\PHILIPP-PC\Backup Set 2013-06-30 213122\Backup Files 2013-06-30 213122\Backup files 3.zip
                              [12] Archive type: ZIP
                            --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                [13] Archive type: ZIP
                              --> Zanaxo.class
                                  [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                  [WARNING]   Infected files in archives cannot be repaired
                              --> Vii.class
                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                  [WARNING]   Infected files in archives cannot be repaired
                              --> Third.class
                                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                  [WARNING]   Infected files in archives cannot be repaired
                              --> Stuc.class
                                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                  [WARNING]   Infected files in archives cannot be repaired
                              --> Seed.class
                                  [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                  [WARNING]   Infected files in archives cannot be repaired
                              --> Momos.class
                                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                  [WARNING]   Infected files in archives cannot be repaired
                              --> Kpcas.class
                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                  [WARNING]   Infected files in archives cannot be repaired
                              --> Fai.class
                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                  [WARNING]   Infected files in archives cannot be repaired
                              --> Atomic.class
                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                  [WARNING]   Infected files in archives cannot be repaired
                              --> Accord.class
                                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                  [WARNING]   Infected files in archives cannot be repaired
                              --> u.class
                                  [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                  [WARNING]   Infected files in archives cannot be repaired
                            --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                [13] Archive type: ZIP
                              --> CBaiAEA.class
                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                  [WARNING]   Infected files in archives cannot be repaired
                              --> FWBAhmA.class
                                  [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                  [WARNING]   Infected files in archives cannot be repaired
                              --> kCHXi.class
                                  [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                  [WARNING]   Infected files in archives cannot be repaired
                              --> uEjwBpl.class
                                  [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                  [WARNING]   Infected files in archives cannot be repaired
                              --> xlLxeUH.class
                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                  [WARNING]   Infected files in archives cannot be repaired
                            --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                [13] Archive type: ZIP
                              --> main.class
                                  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                  [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2013-06-30 213122\Backup Files 2013-06-30 213122\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                          --> G:\PHILIPP-PC\Backup Set 2013-07-14 190009\Backup Files 2013-07-14 190009\Backup files 1.zip
                              [12] Archive type: ZIP
                            --> G:\PHILIPP-PC\Backup Set 2013-07-14 190009\Backup Files 2013-07-14 190009\Backup files 3.zip
                                [13] Archive type: ZIP
                              --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                  [14] Archive type: ZIP
                                --> Zanaxo.class
                                    [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                    [WARNING]   Infected files in archives cannot be repaired
                                --> Vii.class
                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                    [WARNING]   Infected files in archives cannot be repaired
                                --> Third.class
                                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                    [WARNING]   Infected files in archives cannot be repaired
                                --> Stuc.class
                                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                    [WARNING]   Infected files in archives cannot be repaired
                                --> Seed.class
                                    [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                    [WARNING]   Infected files in archives cannot be repaired
                                --> Momos.class
                                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                    [WARNING]   Infected files in archives cannot be repaired
                                --> Kpcas.class
                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                    [WARNING]   Infected files in archives cannot be repaired
                                --> Fai.class
                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                    [WARNING]   Infected files in archives cannot be repaired
                                --> Atomic.class
                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                    [WARNING]   Infected files in archives cannot be repaired
                                --> Accord.class
                                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                    [WARNING]   Infected files in archives cannot be repaired
                                --> u.class
                                    [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                    [WARNING]   Infected files in archives cannot be repaired
                              --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                  [14] Archive type: ZIP
                                --> CBaiAEA.class
                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                    [WARNING]   Infected files in archives cannot be repaired
                                --> FWBAhmA.class
                                    [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                    [WARNING]   Infected files in archives cannot be repaired
                                --> kCHXi.class
                                    [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                    [WARNING]   Infected files in archives cannot be repaired
                                --> uEjwBpl.class
                                    [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                    [WARNING]   Infected files in archives cannot be repaired
                                --> xlLxeUH.class
                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                    [WARNING]   Infected files in archives cannot be repaired
                              --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                  [14] Archive type: ZIP
                                --> main.class
                                    [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                    [WARNING]   Infected files in archives cannot be repaired
                              --> C/Users/Philipp/Desktop/furry/Furry.exe
                                  [DETECTION] Contains recognition pattern of a probably damaged CC/00256 sample
                                  [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2013-07-14 190009\Backup Files 2013-07-14 190009\Backup files 3.zip
  [DETECTION] Contains recognition pattern of a probably damaged CC/00256 sample
                            --> G:\PHILIPP-PC\Backup Set 2013-08-04 190004\Backup Files 2013-08-04 190004\Backup files 1.zip
                                [13] Archive type: ZIP
                              --> G:\PHILIPP-PC\Backup Set 2013-08-04 190004\Backup Files 2013-08-04 190004\Backup files 3.zip
                                  [14] Archive type: ZIP
                                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                    [15] Archive type: ZIP
                                  --> Zanaxo.class
                                      [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                      [WARNING]   Infected files in archives cannot be repaired
                                  --> Vii.class
                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                      [WARNING]   Infected files in archives cannot be repaired
                                  --> Third.class
                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                      [WARNING]   Infected files in archives cannot be repaired
                                  --> Stuc.class
                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                      [WARNING]   Infected files in archives cannot be repaired
                                  --> Seed.class
                                      [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                      [WARNING]   Infected files in archives cannot be repaired
                                  --> Momos.class
                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                      [WARNING]   Infected files in archives cannot be repaired
                                  --> Kpcas.class
                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                      [WARNING]   Infected files in archives cannot be repaired
                                  --> Fai.class
                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                      [WARNING]   Infected files in archives cannot be repaired
                                  --> Atomic.class
                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                      [WARNING]   Infected files in archives cannot be repaired
                                  --> Accord.class
                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                      [WARNING]   Infected files in archives cannot be repaired
                                  --> u.class
                                      [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                      [WARNING]   Infected files in archives cannot be repaired
                                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                    [15] Archive type: ZIP
                                  --> CBaiAEA.class
                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                      [WARNING]   Infected files in archives cannot be repaired
                                  --> FWBAhmA.class
                                      [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                      [WARNING]   Infected files in archives cannot be repaired
                                  --> kCHXi.class
                                      [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                      [WARNING]   Infected files in archives cannot be repaired
                                  --> uEjwBpl.class
                                      [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                      [WARNING]   Infected files in archives cannot be repaired
                                  --> xlLxeUH.class
                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                      [WARNING]   Infected files in archives cannot be repaired
                                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                    [15] Archive type: ZIP
                                  --> main.class
                                      [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                      [WARNING]   Infected files in archives cannot be repaired
                                --> C/Users/Philipp/Desktop/furry/Furry.exe
                                    [DETECTION] Contains recognition pattern of a probably damaged CC/00256 sample
                                    [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2013-08-04 190004\Backup Files 2013-08-04 190004\Backup files 3.zip
  [DETECTION] Contains recognition pattern of a probably damaged CC/00256 sample
                              --> G:\PHILIPP-PC\Backup Set 2013-09-01 190003\Backup Files 2013-09-01 190003\Backup files 1.zip
                                  [14] Archive type: ZIP
                                --> G:\PHILIPP-PC\Backup Set 2013-09-01 190003\Backup Files 2013-09-01 190003\Backup files 3.zip
                                    [15] Archive type: ZIP
                                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                      [16] Archive type: ZIP
                                    --> Zanaxo.class
                                        [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                        [WARNING]   Infected files in archives cannot be repaired
                                    --> Vii.class
                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                        [WARNING]   Infected files in archives cannot be repaired
                                    --> Third.class
                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                        [WARNING]   Infected files in archives cannot be repaired
                                    --> Stuc.class
                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                        [WARNING]   Infected files in archives cannot be repaired
                                    --> Seed.class
                                        [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                        [WARNING]   Infected files in archives cannot be repaired
                                    --> Momos.class
                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                        [WARNING]   Infected files in archives cannot be repaired
                                    --> Kpcas.class
                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                        [WARNING]   Infected files in archives cannot be repaired
                                    --> Fai.class
                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                        [WARNING]   Infected files in archives cannot be repaired
                                    --> Atomic.class
                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                        [WARNING]   Infected files in archives cannot be repaired
                                    --> Accord.class
                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                        [WARNING]   Infected files in archives cannot be repaired
                                    --> u.class
                                        [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                        [WARNING]   Infected files in archives cannot be repaired
                                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                      [16] Archive type: ZIP
                                    --> CBaiAEA.class
                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                        [WARNING]   Infected files in archives cannot be repaired
                                    --> FWBAhmA.class
                                        [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                        [WARNING]   Infected files in archives cannot be repaired
                                    --> kCHXi.class
                                        [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                        [WARNING]   Infected files in archives cannot be repaired
                                    --> uEjwBpl.class
                                        [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                        [WARNING]   Infected files in archives cannot be repaired
                                    --> xlLxeUH.class
                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                        [WARNING]   Infected files in archives cannot be repaired
                                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                      [16] Archive type: ZIP
                                    --> main.class
                                        [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                        [WARNING]   Infected files in archives cannot be repaired
                                  --> C/Users/Philipp/Desktop/furry/Furry.exe
                                      [DETECTION] Contains recognition pattern of a probably damaged CC/00256 sample
                                      [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2013-09-01 190003\Backup Files 2013-09-01 190003\Backup files 3.zip
  [DETECTION] Contains recognition pattern of a probably damaged CC/00256 sample
                                --> G:\PHILIPP-PC\Backup Set 2013-09-27 192833\Backup Files 2013-09-27 192833\Backup files 1.zip
                                    [15] Archive type: ZIP
                                  --> G:\PHILIPP-PC\Backup Set 2013-09-27 192833\Backup Files 2013-09-27 192833\Backup files 3.zip
                                      [16] Archive type: ZIP
                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                        [17] Archive type: ZIP
                                      --> Zanaxo.class
                                          [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                          [WARNING]   Infected files in archives cannot be repaired
                                      --> Vii.class
                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                          [WARNING]   Infected files in archives cannot be repaired
                                      --> Third.class
                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                          [WARNING]   Infected files in archives cannot be repaired
                                      --> Stuc.class
                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                          [WARNING]   Infected files in archives cannot be repaired
                                      --> Seed.class
                                          [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                          [WARNING]   Infected files in archives cannot be repaired
                                      --> Momos.class
                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                          [WARNING]   Infected files in archives cannot be repaired
                                      --> Kpcas.class
                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                          [WARNING]   Infected files in archives cannot be repaired
                                      --> Fai.class
                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                          [WARNING]   Infected files in archives cannot be repaired
                                      --> Atomic.class
                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                          [WARNING]   Infected files in archives cannot be repaired
                                      --> Accord.class
                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                          [WARNING]   Infected files in archives cannot be repaired
                                      --> u.class
                                          [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                          [WARNING]   Infected files in archives cannot be repaired
                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                        [17] Archive type: ZIP
                                      --> CBaiAEA.class
                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                          [WARNING]   Infected files in archives cannot be repaired
                                      --> FWBAhmA.class
                                          [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                          [WARNING]   Infected files in archives cannot be repaired
                                      --> kCHXi.class
                                          [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                          [WARNING]   Infected files in archives cannot be repaired
                                      --> uEjwBpl.class
                                          [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                          [WARNING]   Infected files in archives cannot be repaired
                                      --> xlLxeUH.class
                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                          [WARNING]   Infected files in archives cannot be repaired
                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                        [17] Archive type: ZIP
                                      --> main.class
                                          [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                          [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2013-09-27 192833\Backup Files 2013-09-27 192833\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                  --> G:\PHILIPP-PC\Backup Set 2013-11-03 190004\Backup Files 2013-11-03 190004\Backup files 1.zip
                                      [16] Archive type: ZIP
                                    --> G:\PHILIPP-PC\Backup Set 2013-11-03 190004\Backup Files 2013-11-03 190004\Backup files 3.zip
                                        [17] Archive type: ZIP
                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                          [18] Archive type: ZIP
                                        --> Zanaxo.class
                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                            [WARNING]   Infected files in archives cannot be repaired
                                        --> Vii.class
                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                            [WARNING]   Infected files in archives cannot be repaired
                                        --> Third.class
                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                            [WARNING]   Infected files in archives cannot be repaired
                                        --> Stuc.class
                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                            [WARNING]   Infected files in archives cannot be repaired
                                        --> Seed.class
                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                            [WARNING]   Infected files in archives cannot be repaired
                                        --> Momos.class
                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                            [WARNING]   Infected files in archives cannot be repaired
                                        --> Kpcas.class
                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                            [WARNING]   Infected files in archives cannot be repaired
                                        --> Fai.class
                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                            [WARNING]   Infected files in archives cannot be repaired
                                        --> Atomic.class
                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                            [WARNING]   Infected files in archives cannot be repaired
                                        --> Accord.class
                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                            [WARNING]   Infected files in archives cannot be repaired
                                        --> u.class
                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                            [WARNING]   Infected files in archives cannot be repaired
                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                          [18] Archive type: ZIP
                                        --> CBaiAEA.class
                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                            [WARNING]   Infected files in archives cannot be repaired
                                        --> FWBAhmA.class
                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                            [WARNING]   Infected files in archives cannot be repaired
                                        --> kCHXi.class
                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                            [WARNING]   Infected files in archives cannot be repaired
                                        --> uEjwBpl.class
                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                            [WARNING]   Infected files in archives cannot be repaired
                                        --> xlLxeUH.class
                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                            [WARNING]   Infected files in archives cannot be repaired
                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                          [18] Archive type: ZIP
                                        --> main.class
                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2013-11-03 190004\Backup Files 2013-11-03 190004\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                    --> G:\PHILIPP-PC\Backup Set 2013-11-24 190006\Backup Files 2013-11-24 190006\Backup files 1.zip
                                        [17] Archive type: ZIP
                                      --> G:\PHILIPP-PC\Backup Set 2013-11-24 190006\Backup Files 2013-11-24 190006\Backup files 3.zip
                                          [18] Archive type: ZIP
                                        --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                            [19] Archive type: ZIP
                                          --> Zanaxo.class
                                              [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                              [WARNING]   Infected files in archives cannot be repaired
                                          --> Vii.class
                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                              [WARNING]   Infected files in archives cannot be repaired
                                          --> Third.class
                                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                              [WARNING]   Infected files in archives cannot be repaired
                                          --> Stuc.class
                                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                              [WARNING]   Infected files in archives cannot be repaired
                                          --> Seed.class
                                              [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                              [WARNING]   Infected files in archives cannot be repaired
                                          --> Momos.class
                                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                              [WARNING]   Infected files in archives cannot be repaired
                                          --> Kpcas.class
                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                              [WARNING]   Infected files in archives cannot be repaired
                                          --> Fai.class
                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                              [WARNING]   Infected files in archives cannot be repaired
                                          --> Atomic.class
                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                              [WARNING]   Infected files in archives cannot be repaired
                                          --> Accord.class
                                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                              [WARNING]   Infected files in archives cannot be repaired
                                          --> u.class
                                              [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                              [WARNING]   Infected files in archives cannot be repaired
                                        --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                            [19] Archive type: ZIP
                                          --> CBaiAEA.class
                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                              [WARNING]   Infected files in archives cannot be repaired
                                          --> FWBAhmA.class
                                              [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                              [WARNING]   Infected files in archives cannot be repaired
                                          --> kCHXi.class
                                              [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                              [WARNING]   Infected files in archives cannot be repaired
                                          --> uEjwBpl.class
                                              [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                              [WARNING]   Infected files in archives cannot be repaired
                                          --> xlLxeUH.class
                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                              [WARNING]   Infected files in archives cannot be repaired
                                        --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                            [19] Archive type: ZIP
                                          --> main.class
                                              [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                              [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2013-11-24 190006\Backup Files 2013-11-24 190006\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                      --> G:\PHILIPP-PC\Backup Set 2013-12-15 190011\Backup Files 2013-12-15 190011\Backup files 1.zip
                                          [18] Archive type: ZIP
                                        --> G:\PHILIPP-PC\Backup Set 2013-12-15 190011\Backup Files 2013-12-15 190011\Backup files 4.zip
                                            [19] Archive type: ZIP
                                          --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                              [20] Archive type: ZIP
                                            --> Zanaxo.class
                                                [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                [WARNING]   Infected files in archives cannot be repaired
                                            --> Vii.class
                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                [WARNING]   Infected files in archives cannot be repaired
                                            --> Third.class
                                                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                [WARNING]   Infected files in archives cannot be repaired
                                            --> Stuc.class
                                                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                [WARNING]   Infected files in archives cannot be repaired
                                            --> Seed.class
                                                [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                [WARNING]   Infected files in archives cannot be repaired
                                            --> Momos.class
                                                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                [WARNING]   Infected files in archives cannot be repaired
                                            --> Kpcas.class
                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                [WARNING]   Infected files in archives cannot be repaired
                                            --> Fai.class
                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                [WARNING]   Infected files in archives cannot be repaired
                                            --> Atomic.class
                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                [WARNING]   Infected files in archives cannot be repaired
                                            --> Accord.class
                                                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                [WARNING]   Infected files in archives cannot be repaired
                                            --> u.class
                                                [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                [WARNING]   Infected files in archives cannot be repaired
                                          --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                              [20] Archive type: ZIP
                                            --> CBaiAEA.class
                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                [WARNING]   Infected files in archives cannot be repaired
                                            --> FWBAhmA.class
                                                [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                [WARNING]   Infected files in archives cannot be repaired
                                            --> kCHXi.class
                                                [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                [WARNING]   Infected files in archives cannot be repaired
                                            --> uEjwBpl.class
                                                [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                [WARNING]   Infected files in archives cannot be repaired
                                            --> xlLxeUH.class
                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                [WARNING]   Infected files in archives cannot be repaired
                                          --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                              [20] Archive type: ZIP
                                            --> main.class
                                                [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2013-12-15 190011\Backup Files 2013-12-15 190011\Backup files 4.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                        --> G:\PHILIPP-PC\Backup Set 2014-01-26 190004\Backup Files 2014-01-26 190004\Backup files 1.zip
                                            [19] Archive type: ZIP
                                          --> G:\PHILIPP-PC\Backup Set 2014-01-26 190004\Backup Files 2014-01-26 190004\Backup files 5.zip
                                              [20] Archive type: ZIP
                                            --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                [21] Archive type: ZIP
                                              --> Zanaxo.class
                                                  [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                  [WARNING]   Infected files in archives cannot be repaired
                                              --> Vii.class
                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                  [WARNING]   Infected files in archives cannot be repaired
                                              --> Third.class
                                                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                  [WARNING]   Infected files in archives cannot be repaired
                                              --> Stuc.class
                                                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                  [WARNING]   Infected files in archives cannot be repaired
                                              --> Seed.class
                                                  [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                  [WARNING]   Infected files in archives cannot be repaired
                                              --> Momos.class
                                                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                  [WARNING]   Infected files in archives cannot be repaired
                                              --> Kpcas.class
                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                  [WARNING]   Infected files in archives cannot be repaired
                                              --> Fai.class
                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                  [WARNING]   Infected files in archives cannot be repaired
                                              --> Atomic.class
                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                  [WARNING]   Infected files in archives cannot be repaired
                                              --> Accord.class
                                                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                  [WARNING]   Infected files in archives cannot be repaired
                                              --> u.class
                                                  [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                  [WARNING]   Infected files in archives cannot be repaired
                                            --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                [21] Archive type: ZIP
                                              --> CBaiAEA.class
                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                  [WARNING]   Infected files in archives cannot be repaired
                                              --> FWBAhmA.class
                                                  [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                  [WARNING]   Infected files in archives cannot be repaired
                                              --> kCHXi.class
                                                  [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                  [WARNING]   Infected files in archives cannot be repaired
                                              --> uEjwBpl.class
                                                  [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                  [WARNING]   Infected files in archives cannot be repaired
                                              --> xlLxeUH.class
                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                  [WARNING]   Infected files in archives cannot be repaired
                                            --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                [21] Archive type: ZIP
                                              --> main.class
                                                  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                  [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-01-26 190004\Backup Files 2014-01-26 190004\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                          --> G:\PHILIPP-PC\Backup Set 2014-01-26 190004\Backup Files 2014-02-02 190007\Backup files 1.zip
                                              [20] Archive type: ZIP
                                            --> C/Users/Philipp/AppData/Local/Google/Chrome/User Data/Default/Extensions/pnbbffeddnekkhjmokkhdebbfbibbflc/1.128_0/cs.js
                                                [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen
                                                [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-01-26 190004\Backup Files 2014-02-02 190007\Backup files 1.zip
  [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen
                                          --> G:\PHILIPP-PC\Backup Set 2014-02-09 190003\Backup Files 2014-02-09 190003\Backup files 1.zip
                                              [20] Archive type: ZIP
                                            --> G:\PHILIPP-PC\Backup Set 2014-02-09 190003\Backup Files 2014-02-09 190003\Backup files 3.zip
                                                [21] Archive type: ZIP
                                              --> C/Users/Philipp/AppData/Local/Google/Chrome/User Data/Default/Extensions/pnbbffeddnekkhjmokkhdebbfbibbflc/1.128_0/cs.js
                                                  [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen
                                                  [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-02-09 190003\Backup Files 2014-02-09 190003\Backup files 3.zip
  [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen
                                            --> G:\PHILIPP-PC\Backup Set 2014-02-09 190003\Backup Files 2014-02-09 190003\Backup files 4.zip
                                                [21] Archive type: ZIP
                                              --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                  [22] Archive type: ZIP
                                                --> Zanaxo.class
                                                    [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                    [WARNING]   Infected files in archives cannot be repaired
                                                --> Vii.class
                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                    [WARNING]   Infected files in archives cannot be repaired
                                                --> Third.class
                                                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                    [WARNING]   Infected files in archives cannot be repaired
                                                --> Stuc.class
                                                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                    [WARNING]   Infected files in archives cannot be repaired
                                                --> Seed.class
                                                    [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                    [WARNING]   Infected files in archives cannot be repaired
                                                --> Momos.class
                                                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                    [WARNING]   Infected files in archives cannot be repaired
                                                --> Kpcas.class
                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                    [WARNING]   Infected files in archives cannot be repaired
                                                --> Fai.class
                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                    [WARNING]   Infected files in archives cannot be repaired
                                                --> Atomic.class
                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                    [WARNING]   Infected files in archives cannot be repaired
                                                --> Accord.class
                                                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                    [WARNING]   Infected files in archives cannot be repaired
                                                --> u.class
                                                    [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                    [WARNING]   Infected files in archives cannot be repaired
                                              --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                  [22] Archive type: ZIP
                                                --> CBaiAEA.class
                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                    [WARNING]   Infected files in archives cannot be repaired
                                                --> FWBAhmA.class
                                                    [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                    [WARNING]   Infected files in archives cannot be repaired
                                                --> kCHXi.class
                                                    [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                    [WARNING]   Infected files in archives cannot be repaired
                                                --> uEjwBpl.class
                                                    [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                    [WARNING]   Infected files in archives cannot be repaired
                                                --> xlLxeUH.class
                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                    [WARNING]   Infected files in archives cannot be repaired
                                              --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                  [22] Archive type: ZIP
                                                --> main.class
                                                    [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                    [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-02-09 190003\Backup Files 2014-02-09 190003\Backup files 4.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                            --> G:\PHILIPP-PC\Backup Set 2014-03-02 190003\Backup Files 2014-03-02 190003\Backup files 1.zip
                                                [21] Archive type: ZIP
                                              --> G:\PHILIPP-PC\Backup Set 2014-03-02 190003\Backup Files 2014-03-02 190003\Backup files 3.zip
                                                  [22] Archive type: ZIP
                                                --> C/Users/Philipp/AppData/Local/Google/Chrome/User Data/Default/Extensions/pnbbffeddnekkhjmokkhdebbfbibbflc/1.128_0/cs.js
                                                    [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen
                                                    [WARNING]   Infected files in archives cannot be repaired
         

Alt 19.04.2017, 13:22   #5
Melione
 
Windows-7-PC langsam, Avira findet Adware ohne Ende - Standard

Windows-7-PC langsam, Avira findet Adware ohne Ende



Avira, Teil 3:



Code:
ATTFilter
G:\PHILIPP-PC\Backup Set 2014-03-02 190003\Backup Files 2014-03-02 190003\Backup files 3.zip
  [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen
                                              --> G:\PHILIPP-PC\Backup Set 2014-03-02 190003\Backup Files 2014-03-02 190003\Backup files 6.zip
                                                  [22] Archive type: ZIP
                                                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                    [23] Archive type: ZIP
                                                  --> Zanaxo.class
                                                      [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> Vii.class
                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> Third.class
                                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> Stuc.class
                                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> Seed.class
                                                      [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> Momos.class
                                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> Kpcas.class
                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> Fai.class
                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> Atomic.class
                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> Accord.class
                                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> u.class
                                                      [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                    [23] Archive type: ZIP
                                                  --> CBaiAEA.class
                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> FWBAhmA.class
                                                      [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> kCHXi.class
                                                      [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> uEjwBpl.class
                                                      [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> xlLxeUH.class
                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                    [23] Archive type: ZIP
                                                  --> main.class
                                                      [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-03-02 190003\Backup Files 2014-03-02 190003\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                              --> G:\PHILIPP-PC\Backup Set 2014-03-30 190008\Backup Files 2014-03-30 190008\Backup files 1.zip
                                                  [22] Archive type: ZIP
                                                --> G:\PHILIPP-PC\Backup Set 2014-03-30 190008\Backup Files 2014-03-30 190008\Backup files 3.zip
                                                    [23] Archive type: ZIP
                                                  --> C/Users/Philipp/AppData/Local/Google/Chrome/User Data/Default/Extensions/pnbbffeddnekkhjmokkhdebbfbibbflc/1.128_0/cs.js
                                                      [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen
                                                      [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-03-30 190008\Backup Files 2014-03-30 190008\Backup files 3.zip
  [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen
                                                --> G:\PHILIPP-PC\Backup Set 2014-03-30 190008\Backup Files 2014-03-30 190008\Backup files 5.zip
                                                    [23] Archive type: ZIP
                                                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                      [24] Archive type: ZIP
                                                    --> Zanaxo.class
                                                        [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> Vii.class
                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> Third.class
                                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> Stuc.class
                                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> Seed.class
                                                        [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> Momos.class
                                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> Kpcas.class
                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> Fai.class
                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> Atomic.class
                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> Accord.class
                                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> u.class
                                                        [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                      [24] Archive type: ZIP
                                                    --> CBaiAEA.class
                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> FWBAhmA.class
                                                        [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> kCHXi.class
                                                        [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> uEjwBpl.class
                                                        [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> xlLxeUH.class
                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                      [24] Archive type: ZIP
                                                    --> main.class
                                                        [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-03-30 190008\Backup Files 2014-03-30 190008\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                --> G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-04-13 190009\Backup files 1.zip
                                                    [23] Archive type: ZIP
                                                  --> G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-04-13 190009\Backup files 3.zip
                                                      [24] Archive type: ZIP
                                                    --> C/Users/Philipp/AppData/Local/Google/Chrome/User Data/Default/Extensions/pnbbffeddnekkhjmokkhdebbfbibbflc/1.128_0/cs.js
                                                        [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen
                                                        [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-04-13 190009\Backup files 3.zip
  [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen
                                                  --> G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-04-13 190009\Backup files 6.zip
                                                      [24] Archive type: ZIP
                                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                        [25] Archive type: ZIP
                                                      --> Zanaxo.class
                                                          [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> Vii.class
                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> Third.class
                                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> Stuc.class
                                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> Seed.class
                                                          [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> Momos.class
                                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> Kpcas.class
                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> Fai.class
                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> Atomic.class
                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> Accord.class
                                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> u.class
                                                          [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                        [25] Archive type: ZIP
                                                      --> CBaiAEA.class
                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> FWBAhmA.class
                                                          [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> kCHXi.class
                                                          [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> uEjwBpl.class
                                                          [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> xlLxeUH.class
                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                        [25] Archive type: ZIP
                                                      --> main.class
                                                          [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-04-13 190009\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                  --> G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-05-11 190007\Backup files 9.zip
                                                      [24] Archive type: ZIP
                                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                        [25] Archive type: ZIP
                                                      --> Java_Security.class
                                                          [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                          [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-05-11 190007\Backup files 9.zip
  [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                  --> G:\PHILIPP-PC\Backup Set 2014-05-25 190010\Backup Files 2014-05-25 190010\Backup files 1.zip
                                                      [24] Archive type: ZIP
                                                    --> G:\PHILIPP-PC\Backup Set 2014-05-25 190010\Backup Files 2014-05-25 190010\Backup files 4.zip
                                                        [25] Archive type: ZIP
                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                          [26] Archive type: ZIP
                                                        --> Java_Security.class
                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                          [26] Archive type: ZIP
                                                        --> Zanaxo.class
                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> Vii.class
                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> Third.class
                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> Stuc.class
                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> Seed.class
                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> Momos.class
                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> Kpcas.class
                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> Fai.class
                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> Atomic.class
                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> Accord.class
                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> u.class
                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                          [26] Archive type: ZIP
                                                        --> CBaiAEA.class
                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> FWBAhmA.class
                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> kCHXi.class
                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> uEjwBpl.class
                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> xlLxeUH.class
                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                          [26] Archive type: ZIP
                                                        --> main.class
                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-05-25 190010\Backup Files 2014-05-25 190010\Backup files 4.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                    --> G:\PHILIPP-PC\Backup Set 2014-06-15 190009\Backup Files 2014-06-15 190009\Backup files 1.zip
                                                        [25] Archive type: ZIP
                                                      --> G:\PHILIPP-PC\Backup Set 2014-06-15 190009\Backup Files 2014-06-15 190009\Backup files 6.zip
                                                          [26] Archive type: ZIP
                                                        --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                            [27] Archive type: ZIP
                                                          --> Java_Security.class
                                                              [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                        --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                            [27] Archive type: ZIP
                                                          --> Zanaxo.class
                                                              [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> Vii.class
                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> Third.class
                                                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> Stuc.class
                                                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> Seed.class
                                                              [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> Momos.class
                                                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> Kpcas.class
                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> Fai.class
                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> Atomic.class
                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> Accord.class
                                                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> u.class
                                                              [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                        --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                            [27] Archive type: ZIP
                                                          --> CBaiAEA.class
                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> FWBAhmA.class
                                                              [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> kCHXi.class
                                                              [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> uEjwBpl.class
                                                              [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> xlLxeUH.class
                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                        --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                            [27] Archive type: ZIP
                                                          --> main.class
                                                              [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-06-15 190009\Backup Files 2014-06-15 190009\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                      --> G:\PHILIPP-PC\Backup Set 2014-07-06 190011\Backup Files 2014-07-06 190011\Backup files 1.zip
                                                          [26] Archive type: ZIP
                                                        --> G:\PHILIPP-PC\Backup Set 2014-07-06 190011\Backup Files 2014-07-06 190011\Backup files 5.zip
                                                            [27] Archive type: ZIP
                                                          --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                              [28] Archive type: ZIP
                                                            --> Java_Security.class
                                                                [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                          --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                              [28] Archive type: ZIP
                                                            --> Zanaxo.class
                                                                [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> Vii.class
                                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> Third.class
                                                                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> Stuc.class
                                                                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> Seed.class
                                                                [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> Momos.class
                                                                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> Kpcas.class
                                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> Fai.class
                                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> Atomic.class
                                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> Accord.class
                                                                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> u.class
                                                                [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                          --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                              [28] Archive type: ZIP
                                                            --> CBaiAEA.class
                                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> FWBAhmA.class
                                                                [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> kCHXi.class
                                                                [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> uEjwBpl.class
                                                                [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> xlLxeUH.class
                                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                          --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                              [28] Archive type: ZIP
                                                            --> main.class
                                                                [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-07-06 190011\Backup Files 2014-07-06 190011\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                        --> G:\PHILIPP-PC\Backup Set 2014-07-27 190007\Backup Files 2014-07-27 190007\Backup files 1.zip
                                                            [27] Archive type: ZIP
                                                          --> G:\PHILIPP-PC\Backup Set 2014-07-27 190007\Backup Files 2014-07-27 190007\Backup files 6.zip
                                                              [28] Archive type: ZIP
                                                            --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                [29] Archive type: ZIP
                                                              --> Java_Security.class
                                                                  [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                            --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                [29] Archive type: ZIP
                                                              --> Zanaxo.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> Vii.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> Third.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> Stuc.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> Seed.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> Momos.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> Kpcas.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> Fai.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> Atomic.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> Accord.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> u.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                            --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                [29] Archive type: ZIP
                                                              --> CBaiAEA.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> FWBAhmA.class
                                                                  [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> kCHXi.class
                                                                  [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> uEjwBpl.class
                                                                  [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> xlLxeUH.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                            --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                [29] Archive type: ZIP
                                                              --> main.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-07-27 190007\Backup Files 2014-07-27 190007\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                          --> G:\PHILIPP-PC\Backup Set 2014-08-17 190003\Backup Files 2014-08-17 190003\Backup files 1.zip
                                                              [28] Archive type: ZIP
                                                            --> G:\PHILIPP-PC\Backup Set 2014-08-17 190003\Backup Files 2014-08-17 190003\Backup files 4.zip
                                                                [29] Archive type: ZIP
                                                              --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                  [30] Archive type: ZIP
                                                                --> Java_Security.class
                                                                    [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                              --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                  [30] Archive type: ZIP
                                                                --> Zanaxo.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> Vii.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> Third.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> Stuc.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> Seed.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> Momos.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> Kpcas.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> Fai.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> Atomic.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> Accord.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> u.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                              --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                  [30] Archive type: ZIP
                                                                --> CBaiAEA.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> FWBAhmA.class
                                                                    [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> kCHXi.class
                                                                    [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> uEjwBpl.class
                                                                    [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> xlLxeUH.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                              --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                  [30] Archive type: ZIP
                                                                --> main.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-08-17 190003\Backup Files 2014-08-17 190003\Backup files 4.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                            --> G:\PHILIPP-PC\Backup Set 2014-09-08 150856\Backup Files 2014-09-08 150856\Backup files 1.zip
                                                                [29] Archive type: ZIP
                                                              --> G:\PHILIPP-PC\Backup Set 2014-09-08 150856\Backup Files 2014-09-08 150856\Backup files 6.zip
                                                                  [30] Archive type: ZIP
                                                                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                    [31] Archive type: ZIP
                                                                  --> Java_Security.class
                                                                      [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                    [31] Archive type: ZIP
                                                                  --> Zanaxo.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> Vii.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> Third.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> Stuc.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> Seed.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> Momos.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> Kpcas.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> Fai.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> Atomic.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> Accord.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> u.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                    [31] Archive type: ZIP
                                                                  --> CBaiAEA.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> FWBAhmA.class
                                                                      [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> kCHXi.class
                                                                      [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> uEjwBpl.class
                                                                      [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> xlLxeUH.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                    [31] Archive type: ZIP
                                                                  --> main.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-09-08 150856\Backup Files 2014-09-08 150856\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                              --> G:\PHILIPP-PC\Backup Set 2014-09-21 190018\Backup Files 2014-09-21 190018\Backup files 1.zip
                                                                  [30] Archive type: ZIP
                                                                --> G:\PHILIPP-PC\Backup Set 2014-09-21 190018\Backup Files 2014-09-21 190018\Backup files 5.zip
                                                                    [31] Archive type: ZIP
                                                                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                      [32] Archive type: ZIP
                                                                    --> Java_Security.class
                                                                        [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                      [32] Archive type: ZIP
                                                                    --> Zanaxo.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> Vii.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> Third.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> Stuc.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> Seed.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> Momos.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> Kpcas.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> Fai.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> Atomic.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> Accord.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> u.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                      [32] Archive type: ZIP
                                                                    --> CBaiAEA.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> FWBAhmA.class
                                                                        [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> kCHXi.class
                                                                        [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> uEjwBpl.class
                                                                        [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> xlLxeUH.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                      [32] Archive type: ZIP
                                                                    --> main.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-09-21 190018\Backup Files 2014-09-21 190018\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                --> G:\PHILIPP-PC\Backup Set 2014-10-05 190006\Backup Files 2014-10-05 190006\Backup files 1.zip
                                                                    [31] Archive type: ZIP
                                                                  --> G:\PHILIPP-PC\Backup Set 2014-10-05 190006\Backup Files 2014-10-05 190006\Backup files 4.zip
                                                                      [32] Archive type: ZIP
                                                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                        [33] Archive type: ZIP
                                                                      --> Java_Security.class
                                                                          [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                        [33] Archive type: ZIP
                                                                      --> Zanaxo.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> Vii.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> Third.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> Stuc.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> Seed.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> Momos.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> Kpcas.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> Fai.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> Atomic.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> Accord.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> u.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                        [33] Archive type: ZIP
                                                                      --> CBaiAEA.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> FWBAhmA.class
                                                                          [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> kCHXi.class
                                                                          [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> uEjwBpl.class
                                                                          [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> xlLxeUH.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                        [33] Archive type: ZIP
                                                                      --> main.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-10-05 190006\Backup Files 2014-10-05 190006\Backup files 4.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                  --> G:\PHILIPP-PC\Backup Set 2014-12-10 221250\Backup Files 2014-12-10 221250\Backup files 1.zip
                                                                      [32] Archive type: ZIP
                                                                    --> G:\PHILIPP-PC\Backup Set 2014-12-10 221250\Backup Files 2014-12-10 221250\Backup files 4.zip
                                                                        [33] Archive type: ZIP
                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                          [34] Archive type: ZIP
                                                                        --> Java_Security.class
                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                          [34] Archive type: ZIP
                                                                        --> Zanaxo.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> Vii.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> Third.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> Stuc.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> Seed.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> Momos.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> Kpcas.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> Fai.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> Atomic.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> Accord.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> u.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                          [34] Archive type: ZIP
                                                                        --> CBaiAEA.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> FWBAhmA.class
                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> kCHXi.class
                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> uEjwBpl.class
                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> xlLxeUH.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                          [34] Archive type: ZIP
                                                                        --> main.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-12-10 221250\Backup Files 2014-12-10 221250\Backup files 4.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                    --> G:\PHILIPP-PC\Backup Set 2014-12-10 221250\Backup Files 2014-12-21 190006\Backup files 1.zip
                                                                        [33] Archive type: ZIP
                                                                      --> C/Users/Philipp/AppData/Roaming/Mozilla/Firefox/Profiles/x58wzstd.default-1401113928928/extensions/{d6f4f1c0-77a5-4681-b173-dc623691f111}.xpi
                                                                          [34] Archive type: ZIP
                                                                        --> bootstrap.js
                                                                            [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> lib/AddonObserver.js
                                                                            [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-12-10 221250\Backup Files 2014-12-21 190006\Backup files 1.zip
  [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                    --> G:\PHILIPP-PC\Backup Set 2014-12-28 190007\Backup Files 2014-12-28 190007\Backup files 1.zip
                                                                        [33] Archive type: ZIP
                                                                      --> G:\PHILIPP-PC\Backup Set 2014-12-28 190007\Backup Files 2014-12-28 190007\Backup files 2.zip
                                                                          [34] Archive type: ZIP
                                                                        --> C/Users/Philipp/AppData/Roaming/Mozilla/Firefox/Profiles/x58wzstd.default-1401113928928/extensions/{d6f4f1c0-77a5-4681-b173-dc623691f111}.xpi
                                                                            [35] Archive type: ZIP
                                                                          --> bootstrap.js
                                                                              [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> lib/AddonObserver.js
                                                                              [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                              [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-12-28 190007\Backup Files 2014-12-28 190007\Backup files 2.zip
  [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                      --> G:\PHILIPP-PC\Backup Set 2014-12-28 190007\Backup Files 2014-12-28 190007\Backup files 5.zip
                                                                          [34] Archive type: ZIP
                                                                        --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                            [35] Archive type: ZIP
                                                                          --> Java_Security.class
                                                                              [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                        --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                            [35] Archive type: ZIP
                                                                          --> Zanaxo.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> Vii.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> Third.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> Stuc.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> Seed.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> Momos.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> Kpcas.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> Fai.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> Atomic.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> Accord.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> u.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                        --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                            [35] Archive type: ZIP
                                                                          --> CBaiAEA.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> FWBAhmA.class
                                                                              [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> kCHXi.class
                                                                              [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> uEjwBpl.class
                                                                              [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> xlLxeUH.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                        --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                            [35] Archive type: ZIP
                                                                          --> main.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
         


Alt 19.04.2017, 13:23   #6
Melione
 
Windows-7-PC langsam, Avira findet Adware ohne Ende - Standard

Windows-7-PC langsam, Avira findet Adware ohne Ende



Avira, Teil 4:



Code:
ATTFilter
G:\PHILIPP-PC\Backup Set 2014-03-02 190003\Backup Files 2014-03-02 190003\Backup files 3.zip
  [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen
                                              --> G:\PHILIPP-PC\Backup Set 2014-03-02 190003\Backup Files 2014-03-02 190003\Backup files 6.zip
                                                  [22] Archive type: ZIP
                                                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                    [23] Archive type: ZIP
                                                  --> Zanaxo.class
                                                      [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> Vii.class
                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> Third.class
                                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> Stuc.class
                                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> Seed.class
                                                      [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> Momos.class
                                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> Kpcas.class
                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> Fai.class
                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> Atomic.class
                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> Accord.class
                                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> u.class
                                                      [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                    [23] Archive type: ZIP
                                                  --> CBaiAEA.class
                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> FWBAhmA.class
                                                      [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> kCHXi.class
                                                      [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> uEjwBpl.class
                                                      [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                  --> xlLxeUH.class
                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
                                                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                    [23] Archive type: ZIP
                                                  --> main.class
                                                      [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                      [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-03-02 190003\Backup Files 2014-03-02 190003\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                              --> G:\PHILIPP-PC\Backup Set 2014-03-30 190008\Backup Files 2014-03-30 190008\Backup files 1.zip
                                                  [22] Archive type: ZIP
                                                --> G:\PHILIPP-PC\Backup Set 2014-03-30 190008\Backup Files 2014-03-30 190008\Backup files 3.zip
                                                    [23] Archive type: ZIP
                                                  --> C/Users/Philipp/AppData/Local/Google/Chrome/User Data/Default/Extensions/pnbbffeddnekkhjmokkhdebbfbibbflc/1.128_0/cs.js
                                                      [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen
                                                      [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-03-30 190008\Backup Files 2014-03-30 190008\Backup files 3.zip
  [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen
                                                --> G:\PHILIPP-PC\Backup Set 2014-03-30 190008\Backup Files 2014-03-30 190008\Backup files 5.zip
                                                    [23] Archive type: ZIP
                                                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                      [24] Archive type: ZIP
                                                    --> Zanaxo.class
                                                        [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> Vii.class
                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> Third.class
                                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> Stuc.class
                                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> Seed.class
                                                        [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> Momos.class
                                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> Kpcas.class
                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> Fai.class
                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> Atomic.class
                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> Accord.class
                                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> u.class
                                                        [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                      [24] Archive type: ZIP
                                                    --> CBaiAEA.class
                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> FWBAhmA.class
                                                        [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> kCHXi.class
                                                        [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> uEjwBpl.class
                                                        [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                    --> xlLxeUH.class
                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
                                                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                      [24] Archive type: ZIP
                                                    --> main.class
                                                        [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                        [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-03-30 190008\Backup Files 2014-03-30 190008\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                --> G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-04-13 190009\Backup files 1.zip
                                                    [23] Archive type: ZIP
                                                  --> G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-04-13 190009\Backup files 3.zip
                                                      [24] Archive type: ZIP
                                                    --> C/Users/Philipp/AppData/Local/Google/Chrome/User Data/Default/Extensions/pnbbffeddnekkhjmokkhdebbfbibbflc/1.128_0/cs.js
                                                        [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen
                                                        [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-04-13 190009\Backup files 3.zip
  [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen
                                                  --> G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-04-13 190009\Backup files 6.zip
                                                      [24] Archive type: ZIP
                                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                        [25] Archive type: ZIP
                                                      --> Zanaxo.class
                                                          [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> Vii.class
                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> Third.class
                                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> Stuc.class
                                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> Seed.class
                                                          [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> Momos.class
                                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> Kpcas.class
                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> Fai.class
                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> Atomic.class
                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> Accord.class
                                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> u.class
                                                          [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                        [25] Archive type: ZIP
                                                      --> CBaiAEA.class
                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> FWBAhmA.class
                                                          [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> kCHXi.class
                                                          [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> uEjwBpl.class
                                                          [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                      --> xlLxeUH.class
                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
                                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                        [25] Archive type: ZIP
                                                      --> main.class
                                                          [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                          [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-04-13 190009\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                  --> G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-05-11 190007\Backup files 9.zip
                                                      [24] Archive type: ZIP
                                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                        [25] Archive type: ZIP
                                                      --> Java_Security.class
                                                          [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                          [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-05-11 190007\Backup files 9.zip
  [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                  --> G:\PHILIPP-PC\Backup Set 2014-05-25 190010\Backup Files 2014-05-25 190010\Backup files 1.zip
                                                      [24] Archive type: ZIP
                                                    --> G:\PHILIPP-PC\Backup Set 2014-05-25 190010\Backup Files 2014-05-25 190010\Backup files 4.zip
                                                        [25] Archive type: ZIP
                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                          [26] Archive type: ZIP
                                                        --> Java_Security.class
                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                          [26] Archive type: ZIP
                                                        --> Zanaxo.class
                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> Vii.class
                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> Third.class
                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> Stuc.class
                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> Seed.class
                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> Momos.class
                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> Kpcas.class
                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> Fai.class
                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> Atomic.class
                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> Accord.class
                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> u.class
                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                          [26] Archive type: ZIP
                                                        --> CBaiAEA.class
                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> FWBAhmA.class
                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> kCHXi.class
                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> uEjwBpl.class
                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                        --> xlLxeUH.class
                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                          [26] Archive type: ZIP
                                                        --> main.class
                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-05-25 190010\Backup Files 2014-05-25 190010\Backup files 4.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                    --> G:\PHILIPP-PC\Backup Set 2014-06-15 190009\Backup Files 2014-06-15 190009\Backup files 1.zip
                                                        [25] Archive type: ZIP
                                                      --> G:\PHILIPP-PC\Backup Set 2014-06-15 190009\Backup Files 2014-06-15 190009\Backup files 6.zip
                                                          [26] Archive type: ZIP
                                                        --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                            [27] Archive type: ZIP
                                                          --> Java_Security.class
                                                              [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                        --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                            [27] Archive type: ZIP
                                                          --> Zanaxo.class
                                                              [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> Vii.class
                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> Third.class
                                                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> Stuc.class
                                                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> Seed.class
                                                              [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> Momos.class
                                                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> Kpcas.class
                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> Fai.class
                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> Atomic.class
                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> Accord.class
                                                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> u.class
                                                              [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                        --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                            [27] Archive type: ZIP
                                                          --> CBaiAEA.class
                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> FWBAhmA.class
                                                              [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> kCHXi.class
                                                              [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> uEjwBpl.class
                                                              [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                          --> xlLxeUH.class
                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
                                                        --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                            [27] Archive type: ZIP
                                                          --> main.class
                                                              [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                              [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-06-15 190009\Backup Files 2014-06-15 190009\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                      --> G:\PHILIPP-PC\Backup Set 2014-07-06 190011\Backup Files 2014-07-06 190011\Backup files 1.zip
                                                          [26] Archive type: ZIP
                                                        --> G:\PHILIPP-PC\Backup Set 2014-07-06 190011\Backup Files 2014-07-06 190011\Backup files 5.zip
                                                            [27] Archive type: ZIP
                                                          --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                              [28] Archive type: ZIP
                                                            --> Java_Security.class
                                                                [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                          --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                              [28] Archive type: ZIP
                                                            --> Zanaxo.class
                                                                [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> Vii.class
                                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> Third.class
                                                                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> Stuc.class
                                                                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> Seed.class
                                                                [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> Momos.class
                                                                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> Kpcas.class
                                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> Fai.class
                                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> Atomic.class
                                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> Accord.class
                                                                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> u.class
                                                                [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                          --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                              [28] Archive type: ZIP
                                                            --> CBaiAEA.class
                                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> FWBAhmA.class
                                                                [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> kCHXi.class
                                                                [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> uEjwBpl.class
                                                                [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                            --> xlLxeUH.class
                                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
                                                          --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                              [28] Archive type: ZIP
                                                            --> main.class
                                                                [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-07-06 190011\Backup Files 2014-07-06 190011\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                        --> G:\PHILIPP-PC\Backup Set 2014-07-27 190007\Backup Files 2014-07-27 190007\Backup files 1.zip
                                                            [27] Archive type: ZIP
                                                          --> G:\PHILIPP-PC\Backup Set 2014-07-27 190007\Backup Files 2014-07-27 190007\Backup files 6.zip
                                                              [28] Archive type: ZIP
                                                            --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                [29] Archive type: ZIP
                                                              --> Java_Security.class
                                                                  [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                            --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                [29] Archive type: ZIP
                                                              --> Zanaxo.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> Vii.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> Third.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> Stuc.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> Seed.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> Momos.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> Kpcas.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> Fai.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> Atomic.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> Accord.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> u.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                            --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                [29] Archive type: ZIP
                                                              --> CBaiAEA.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> FWBAhmA.class
                                                                  [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> kCHXi.class
                                                                  [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> uEjwBpl.class
                                                                  [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                              --> xlLxeUH.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                            --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                [29] Archive type: ZIP
                                                              --> main.class
                                                                  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                  [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-07-27 190007\Backup Files 2014-07-27 190007\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                          --> G:\PHILIPP-PC\Backup Set 2014-08-17 190003\Backup Files 2014-08-17 190003\Backup files 1.zip
                                                              [28] Archive type: ZIP
                                                            --> G:\PHILIPP-PC\Backup Set 2014-08-17 190003\Backup Files 2014-08-17 190003\Backup files 4.zip
                                                                [29] Archive type: ZIP
                                                              --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                  [30] Archive type: ZIP
                                                                --> Java_Security.class
                                                                    [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                              --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                  [30] Archive type: ZIP
                                                                --> Zanaxo.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> Vii.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> Third.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> Stuc.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> Seed.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> Momos.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> Kpcas.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> Fai.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> Atomic.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> Accord.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> u.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                              --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                  [30] Archive type: ZIP
                                                                --> CBaiAEA.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> FWBAhmA.class
                                                                    [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> kCHXi.class
                                                                    [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> uEjwBpl.class
                                                                    [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                --> xlLxeUH.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                              --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                  [30] Archive type: ZIP
                                                                --> main.class
                                                                    [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                    [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-08-17 190003\Backup Files 2014-08-17 190003\Backup files 4.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                            --> G:\PHILIPP-PC\Backup Set 2014-09-08 150856\Backup Files 2014-09-08 150856\Backup files 1.zip
                                                                [29] Archive type: ZIP
                                                              --> G:\PHILIPP-PC\Backup Set 2014-09-08 150856\Backup Files 2014-09-08 150856\Backup files 6.zip
                                                                  [30] Archive type: ZIP
                                                                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                    [31] Archive type: ZIP
                                                                  --> Java_Security.class
                                                                      [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                    [31] Archive type: ZIP
                                                                  --> Zanaxo.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> Vii.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> Third.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> Stuc.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> Seed.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> Momos.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> Kpcas.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> Fai.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> Atomic.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> Accord.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> u.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                    [31] Archive type: ZIP
                                                                  --> CBaiAEA.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> FWBAhmA.class
                                                                      [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> kCHXi.class
                                                                      [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> uEjwBpl.class
                                                                      [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                  --> xlLxeUH.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                    [31] Archive type: ZIP
                                                                  --> main.class
                                                                      [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                      [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-09-08 150856\Backup Files 2014-09-08 150856\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                              --> G:\PHILIPP-PC\Backup Set 2014-09-21 190018\Backup Files 2014-09-21 190018\Backup files 1.zip
                                                                  [30] Archive type: ZIP
                                                                --> G:\PHILIPP-PC\Backup Set 2014-09-21 190018\Backup Files 2014-09-21 190018\Backup files 5.zip
                                                                    [31] Archive type: ZIP
                                                                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                      [32] Archive type: ZIP
                                                                    --> Java_Security.class
                                                                        [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                      [32] Archive type: ZIP
                                                                    --> Zanaxo.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> Vii.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> Third.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> Stuc.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> Seed.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> Momos.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> Kpcas.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> Fai.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> Atomic.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> Accord.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> u.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                      [32] Archive type: ZIP
                                                                    --> CBaiAEA.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> FWBAhmA.class
                                                                        [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> kCHXi.class
                                                                        [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> uEjwBpl.class
                                                                        [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                    --> xlLxeUH.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                      [32] Archive type: ZIP
                                                                    --> main.class
                                                                        [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                        [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-09-21 190018\Backup Files 2014-09-21 190018\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                --> G:\PHILIPP-PC\Backup Set 2014-10-05 190006\Backup Files 2014-10-05 190006\Backup files 1.zip
                                                                    [31] Archive type: ZIP
                                                                  --> G:\PHILIPP-PC\Backup Set 2014-10-05 190006\Backup Files 2014-10-05 190006\Backup files 4.zip
                                                                      [32] Archive type: ZIP
                                                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                        [33] Archive type: ZIP
                                                                      --> Java_Security.class
                                                                          [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                        [33] Archive type: ZIP
                                                                      --> Zanaxo.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> Vii.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> Third.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> Stuc.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> Seed.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> Momos.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> Kpcas.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> Fai.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> Atomic.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> Accord.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> u.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                        [33] Archive type: ZIP
                                                                      --> CBaiAEA.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> FWBAhmA.class
                                                                          [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> kCHXi.class
                                                                          [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> uEjwBpl.class
                                                                          [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                      --> xlLxeUH.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                        [33] Archive type: ZIP
                                                                      --> main.class
                                                                          [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                          [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-10-05 190006\Backup Files 2014-10-05 190006\Backup files 4.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                  --> G:\PHILIPP-PC\Backup Set 2014-12-10 221250\Backup Files 2014-12-10 221250\Backup files 1.zip
                                                                      [32] Archive type: ZIP
                                                                    --> G:\PHILIPP-PC\Backup Set 2014-12-10 221250\Backup Files 2014-12-10 221250\Backup files 4.zip
                                                                        [33] Archive type: ZIP
                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                          [34] Archive type: ZIP
                                                                        --> Java_Security.class
                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                          [34] Archive type: ZIP
                                                                        --> Zanaxo.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> Vii.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> Third.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> Stuc.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> Seed.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> Momos.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> Kpcas.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> Fai.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> Atomic.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> Accord.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> u.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                          [34] Archive type: ZIP
                                                                        --> CBaiAEA.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> FWBAhmA.class
                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> kCHXi.class
                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> uEjwBpl.class
                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> xlLxeUH.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                          [34] Archive type: ZIP
                                                                        --> main.class
                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-12-10 221250\Backup Files 2014-12-10 221250\Backup files 4.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                    --> G:\PHILIPP-PC\Backup Set 2014-12-10 221250\Backup Files 2014-12-21 190006\Backup files 1.zip
                                                                        [33] Archive type: ZIP
                                                                      --> C/Users/Philipp/AppData/Roaming/Mozilla/Firefox/Profiles/x58wzstd.default-1401113928928/extensions/{d6f4f1c0-77a5-4681-b173-dc623691f111}.xpi
                                                                          [34] Archive type: ZIP
                                                                        --> bootstrap.js
                                                                            [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                        --> lib/AddonObserver.js
                                                                            [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-12-10 221250\Backup Files 2014-12-21 190006\Backup files 1.zip
  [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                    --> G:\PHILIPP-PC\Backup Set 2014-12-28 190007\Backup Files 2014-12-28 190007\Backup files 1.zip
                                                                        [33] Archive type: ZIP
                                                                      --> G:\PHILIPP-PC\Backup Set 2014-12-28 190007\Backup Files 2014-12-28 190007\Backup files 2.zip
                                                                          [34] Archive type: ZIP
                                                                        --> C/Users/Philipp/AppData/Roaming/Mozilla/Firefox/Profiles/x58wzstd.default-1401113928928/extensions/{d6f4f1c0-77a5-4681-b173-dc623691f111}.xpi
                                                                            [35] Archive type: ZIP
                                                                          --> bootstrap.js
                                                                              [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> lib/AddonObserver.js
                                                                              [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                              [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2014-12-28 190007\Backup Files 2014-12-28 190007\Backup files 2.zip
  [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                      --> G:\PHILIPP-PC\Backup Set 2014-12-28 190007\Backup Files 2014-12-28 190007\Backup files 5.zip
                                                                          [34] Archive type: ZIP
                                                                        --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                            [35] Archive type: ZIP
                                                                          --> Java_Security.class
                                                                              [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                        --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                            [35] Archive type: ZIP
                                                                          --> Zanaxo.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> Vii.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> Third.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> Stuc.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> Seed.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> Momos.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> Kpcas.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> Fai.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> Atomic.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> Accord.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> u.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                        --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                            [35] Archive type: ZIP
                                                                          --> CBaiAEA.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> FWBAhmA.class
                                                                              [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> kCHXi.class
                                                                              [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> uEjwBpl.class
                                                                              [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                          --> xlLxeUH.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                        --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                            [35] Archive type: ZIP
                                                                          --> main.class
                                                                              [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                              [WARNING]   Infected files in archives cannot be repaired
         

Alt 19.04.2017, 13:24   #7
Melione
 
Windows-7-PC langsam, Avira findet Adware ohne Ende - Standard

Windows-7-PC langsam, Avira findet Adware ohne Ende



Avira, Teil 5:



Code:
ATTFilter
G:\PHILIPP-PC\Backup Set 2014-12-28 190007\Backup Files 2014-12-28 190007\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                      --> G:\PHILIPP-PC\Backup Set 2015-01-18 190006\Backup Files 2015-01-18 190006\Backup files 1.zip
                                                                          [34] Archive type: ZIP
                                                                        --> G:\PHILIPP-PC\Backup Set 2015-01-18 190006\Backup Files 2015-01-18 190006\Backup files 2.zip
                                                                            [35] Archive type: ZIP
                                                                          --> C/Users/Philipp/AppData/Roaming/Mozilla/Firefox/Profiles/x58wzstd.default-1401113928928/extensions/{d6f4f1c0-77a5-4681-b173-dc623691f111}.xpi
                                                                              [36] Archive type: ZIP
                                                                            --> bootstrap.js
                                                                                [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                            --> lib/AddonObserver.js
                                                                                [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                                [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2015-01-18 190006\Backup Files 2015-01-18 190006\Backup files 2.zip
  [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                        --> G:\PHILIPP-PC\Backup Set 2015-01-18 190006\Backup Files 2015-01-18 190006\Backup files 4.zip
                                                                            [35] Archive type: ZIP
                                                                          --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                              [36] Archive type: ZIP
                                                                            --> Java_Security.class
                                                                                [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                          --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                              [36] Archive type: ZIP
                                                                            --> Zanaxo.class
                                                                                [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                            --> Vii.class
                                                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                            --> Third.class
                                                                                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                            --> Stuc.class
                                                                                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                            --> Seed.class
                                                                                [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                            --> Momos.class
                                                                                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                            --> Kpcas.class
                                                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                            --> Fai.class
                                                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                            --> Atomic.class
                                                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                            --> Accord.class
                                                                                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                            --> u.class
                                                                                [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                          --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                              [36] Archive type: ZIP
                                                                            --> CBaiAEA.class
                                                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                            --> FWBAhmA.class
                                                                                [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                            --> kCHXi.class
                                                                                [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                            --> uEjwBpl.class
                                                                                [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                            --> xlLxeUH.class
                                                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                          --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                              [36] Archive type: ZIP
                                                                            --> main.class
                                                                                [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2015-01-18 190006\Backup Files 2015-01-18 190006\Backup files 4.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                        --> G:\PHILIPP-PC\Backup Set 2015-02-08 190008\Backup Files 2015-02-08 190008\Backup files 1.zip
                                                                            [35] Archive type: ZIP
                                                                          --> G:\PHILIPP-PC\Backup Set 2015-02-08 190008\Backup Files 2015-02-08 190008\Backup files 4.zip
                                                                              [36] Archive type: ZIP
                                                                            --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                [37] Archive type: ZIP
                                                                              --> Java_Security.class
                                                                                  [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                            --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                [37] Archive type: ZIP
                                                                              --> Zanaxo.class
                                                                                  [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                              --> Vii.class
                                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                              --> Third.class
                                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                              --> Stuc.class
                                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                              --> Seed.class
                                                                                  [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                              --> Momos.class
                                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                              --> Kpcas.class
                                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                              --> Fai.class
                                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                              --> Atomic.class
                                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                              --> Accord.class
                                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                              --> u.class
                                                                                  [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                            --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                [37] Archive type: ZIP
                                                                              --> CBaiAEA.class
                                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                              --> FWBAhmA.class
                                                                                  [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                              --> kCHXi.class
                                                                                  [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                              --> uEjwBpl.class
                                                                                  [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                              --> xlLxeUH.class
                                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                            --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                [37] Archive type: ZIP
                                                                              --> main.class
                                                                                  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                  [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2015-02-08 190008\Backup Files 2015-02-08 190008\Backup files 4.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                          --> G:\PHILIPP-PC\Backup Set 2015-02-08 190008\Backup Files 2015-02-08 190008\Backup files 5.zip
                                                                              [36] Archive type: ZIP
                                                                            --> C/Users/Philipp/Desktop/Old Firefox Data/x58wzstd.default-1401113928928/extensions/{d6f4f1c0-77a5-4681-b173-dc623691f111}.xpi
                                                                                [37] Archive type: ZIP
                                                                              --> bootstrap.js
                                                                                  [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                              --> lib/AddonObserver.js
                                                                                  [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                                  [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2015-02-08 190008\Backup Files 2015-02-08 190008\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                          --> G:\PHILIPP-PC\Backup Set 2015-03-01 190006\Backup Files 2015-03-01 190006\Backup files 1.zip
                                                                              [36] Archive type: ZIP
                                                                            --> G:\PHILIPP-PC\Backup Set 2015-03-01 190006\Backup Files 2015-03-01 190006\Backup files 7.zip
                                                                                [37] Archive type: ZIP
                                                                              --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                  [38] Archive type: ZIP
                                                                                --> Java_Security.class
                                                                                    [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                              --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                  [38] Archive type: ZIP
                                                                                --> Zanaxo.class
                                                                                    [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                --> Vii.class
                                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                --> Third.class
                                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                --> Stuc.class
                                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                --> Seed.class
                                                                                    [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                --> Momos.class
                                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                --> Kpcas.class
                                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                --> Fai.class
                                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                --> Atomic.class
                                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                --> Accord.class
                                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                --> u.class
                                                                                    [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                              --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                  [38] Archive type: ZIP
                                                                                --> CBaiAEA.class
                                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                --> FWBAhmA.class
                                                                                    [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                --> kCHXi.class
                                                                                    [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                --> uEjwBpl.class
                                                                                    [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                --> xlLxeUH.class
                                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                              --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                  [38] Archive type: ZIP
                                                                                --> main.class
                                                                                    [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                    [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2015-03-01 190006\Backup Files 2015-03-01 190006\Backup files 7.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                            --> G:\PHILIPP-PC\Backup Set 2015-03-15 190006\Backup Files 2015-03-15 190006\Backup files 1.zip
                                                                                [37] Archive type: ZIP
                                                                              --> G:\PHILIPP-PC\Backup Set 2015-03-15 190006\Backup Files 2015-03-15 190006\Backup files 5.zip
                                                                                  [38] Archive type: ZIP
                                                                                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                    [39] Archive type: ZIP
                                                                                  --> Java_Security.class
                                                                                      [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                    [39] Archive type: ZIP
                                                                                  --> Zanaxo.class
                                                                                      [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                  --> Vii.class
                                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                  --> Third.class
                                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                  --> Stuc.class
                                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                  --> Seed.class
                                                                                      [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                  --> Momos.class
                                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                  --> Kpcas.class
                                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                  --> Fai.class
                                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                  --> Atomic.class
                                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                  --> Accord.class
                                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                  --> u.class
                                                                                      [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                    [39] Archive type: ZIP
                                                                                  --> CBaiAEA.class
                                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                  --> FWBAhmA.class
                                                                                      [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                  --> kCHXi.class
                                                                                      [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                  --> uEjwBpl.class
                                                                                      [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                  --> xlLxeUH.class
                                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                    [39] Archive type: ZIP
                                                                                  --> main.class
                                                                                      [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                      [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2015-03-15 190006\Backup Files 2015-03-15 190006\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                              --> G:\PHILIPP-PC\Backup Set 2015-03-29 190009\Backup Files 2015-03-29 190009\Backup files 1.zip
                                                                                  [38] Archive type: ZIP
                                                                                --> G:\PHILIPP-PC\Backup Set 2015-03-29 190009\Backup Files 2015-03-29 190009\Backup files 6.zip
                                                                                    [39] Archive type: ZIP
                                                                                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                      [40] Archive type: ZIP
                                                                                    --> Java_Security.class
                                                                                        [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                      [40] Archive type: ZIP
                                                                                    --> Zanaxo.class
                                                                                        [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                    --> Vii.class
                                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                    --> Third.class
                                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                    --> Stuc.class
                                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                    --> Seed.class
                                                                                        [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                    --> Momos.class
                                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                    --> Kpcas.class
                                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                    --> Fai.class
                                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                    --> Atomic.class
                                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                    --> Accord.class
                                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                    --> u.class
                                                                                        [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                      [40] Archive type: ZIP
                                                                                    --> CBaiAEA.class
                                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                    --> FWBAhmA.class
                                                                                        [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                    --> kCHXi.class
                                                                                        [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                    --> uEjwBpl.class
                                                                                        [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                    --> xlLxeUH.class
                                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                      [40] Archive type: ZIP
                                                                                    --> main.class
                                                                                        [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                        [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2015-03-29 190009\Backup Files 2015-03-29 190009\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                --> G:\PHILIPP-PC\Backup Set 2015-04-19 190007\Backup Files 2015-04-19 190007\Backup files 1.zip
                                                                                    [39] Archive type: ZIP
                                                                                  --> G:\PHILIPP-PC\Backup Set 2015-04-19 190007\Backup Files 2015-04-19 190007\Backup files 6.zip
                                                                                      [40] Archive type: ZIP
                                                                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                        [41] Archive type: ZIP
                                                                                      --> Java_Security.class
                                                                                          [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                        [41] Archive type: ZIP
                                                                                      --> Zanaxo.class
                                                                                          [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                      --> Vii.class
                                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                      --> Third.class
                                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                      --> Stuc.class
                                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                      --> Seed.class
                                                                                          [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                      --> Momos.class
                                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                      --> Kpcas.class
                                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                      --> Fai.class
                                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                      --> Atomic.class
                                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                      --> Accord.class
                                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                      --> u.class
                                                                                          [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                        [41] Archive type: ZIP
                                                                                      --> CBaiAEA.class
                                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                      --> FWBAhmA.class
                                                                                          [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                      --> kCHXi.class
                                                                                          [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                      --> uEjwBpl.class
                                                                                          [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                      --> xlLxeUH.class
                                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                        [41] Archive type: ZIP
                                                                                      --> main.class
                                                                                          [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                          [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2015-04-19 190007\Backup Files 2015-04-19 190007\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                  --> G:\PHILIPP-PC\Backup Set 2015-05-03 190026\Backup Files 2015-05-03 190026\Backup files 1.zip
                                                                                      [40] Archive type: ZIP
                                                                                    --> G:\PHILIPP-PC\Backup Set 2015-05-03 190026\Backup Files 2015-05-03 190026\Backup files 6.zip
                                                                                        [41] Archive type: ZIP
                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                          [42] Archive type: ZIP
                                                                                        --> Java_Security.class
                                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                          [42] Archive type: ZIP
                                                                                        --> Zanaxo.class
                                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                        --> Vii.class
                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                        --> Third.class
                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                        --> Stuc.class
                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                        --> Seed.class
                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                        --> Momos.class
                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                        --> Kpcas.class
                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                        --> Fai.class
                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                        --> Atomic.class
                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                        --> Accord.class
                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                        --> u.class
                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                          [42] Archive type: ZIP
                                                                                        --> CBaiAEA.class
                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                        --> FWBAhmA.class
                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                        --> kCHXi.class
                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                        --> uEjwBpl.class
                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                        --> xlLxeUH.class
                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                          [42] Archive type: ZIP
                                                                                        --> main.class
                                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2015-05-03 190026\Backup Files 2015-05-03 190026\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                    --> G:\PHILIPP-PC\Backup Set 2015-05-24 190008\Backup Files 2015-05-24 190008\Backup files 1.zip
                                                                                        [41] Archive type: ZIP
                                                                                      --> G:\PHILIPP-PC\Backup Set 2015-05-24 190008\Backup Files 2015-05-24 190008\Backup files 6.zip
                                                                                          [42] Archive type: ZIP
                                                                                        --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                            [43] Archive type: ZIP
                                                                                          --> Java_Security.class
                                                                                              [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                                        --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                            [43] Archive type: ZIP
                                                                                          --> Zanaxo.class
                                                                                              [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                                          --> Vii.class
                                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                                          --> Third.class
                                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                                          --> Stuc.class
                                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                                          --> Seed.class
                                                                                              [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                                          --> Momos.class
                                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                                          --> Kpcas.class
                                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                                          --> Fai.class
                                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                                          --> Atomic.class
                                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                                          --> Accord.class
                                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                                          --> u.class
                                                                                              [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                                        --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                            [43] Archive type: ZIP
                                                                                          --> CBaiAEA.class
                                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                                          --> FWBAhmA.class
                                                                                              [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                                          --> kCHXi.class
                                                                                              [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                                          --> uEjwBpl.class
                                                                                              [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                                          --> xlLxeUH.class
                                                                                              [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                              [WARNING]   Infected files in archives cannot be repaired
                                                                                        --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                            [43] Archive type: ZIP
                                                                                          --> main.class
                                                                                              [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                              [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2015-05-24 190008\Backup Files 2015-05-24 190008\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                      --> G:\PHILIPP-PC\Backup Set 2015-06-14 190007\Backup Files 2015-06-14 190007\Backup files 1.zip
                                                                                          [42] Archive type: ZIP
                                                                                        --> G:\PHILIPP-PC\Backup Set 2015-06-14 190007\Backup Files 2015-06-14 190007\Backup files 6.zip
                                                                                            [43] Archive type: ZIP
                                                                                          --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                              [44] Archive type: ZIP
                                                                                            --> Java_Security.class
                                                                                                [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                                          --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                              [44] Archive type: ZIP
                                                                                            --> Zanaxo.class
                                                                                                [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                                            --> Vii.class
                                                                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                                            --> Third.class
                                                                                                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                                            --> Stuc.class
                                                                                                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                                            --> Seed.class
                                                                                                [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                                            --> Momos.class
                                                                                                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                                            --> Kpcas.class
                                                                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                                            --> Fai.class
                                                                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                                            --> Atomic.class
                                                                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                                            --> Accord.class
                                                                                                [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                                            --> u.class
                                                                                                [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                                          --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                              [44] Archive type: ZIP
                                                                                            --> CBaiAEA.class
                                                                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                                            --> FWBAhmA.class
                                                                                                [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                                            --> kCHXi.class
                                                                                                [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                                            --> uEjwBpl.class
                                                                                                [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                                            --> xlLxeUH.class
                                                                                                [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                [WARNING]   Infected files in archives cannot be repaired
                                                                                          --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                              [44] Archive type: ZIP
                                                                                            --> main.class
                                                                                                [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                [WARNING]   Infected files in archives cannot be repaired
         

Alt 19.04.2017, 13:25   #8
Melione
 
Windows-7-PC langsam, Avira findet Adware ohne Ende - Standard

Windows-7-PC langsam, Avira findet Adware ohne Ende



Avira, Teil 6:



Code:
ATTFilter
G:\PHILIPP-PC\Backup Set 2015-06-14 190007\Backup Files 2015-06-14 190007\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                        --> G:\PHILIPP-PC\Backup Set 2015-07-05 190022\Backup Files 2015-07-05 190022\Backup files 1.zip
                                                                                            [43] Archive type: ZIP
                                                                                          --> G:\PHILIPP-PC\Backup Set 2015-07-05 190022\Backup Files 2015-07-05 190022\Backup files 6.zip
                                                                                              [44] Archive type: ZIP
                                                                                            --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                [45] Archive type: ZIP
                                                                                              --> Java_Security.class
                                                                                                  [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                                            --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                [45] Archive type: ZIP
                                                                                              --> Zanaxo.class
                                                                                                  [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                                              --> Vii.class
                                                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                                              --> Third.class
                                                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                                              --> Stuc.class
                                                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                                              --> Seed.class
                                                                                                  [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                                              --> Momos.class
                                                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                                              --> Kpcas.class
                                                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                                              --> Fai.class
                                                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                                              --> Atomic.class
                                                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                                              --> Accord.class
                                                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                                              --> u.class
                                                                                                  [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                                            --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                [45] Archive type: ZIP
                                                                                              --> CBaiAEA.class
                                                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                                              --> FWBAhmA.class
                                                                                                  [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                                              --> kCHXi.class
                                                                                                  [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                                              --> uEjwBpl.class
                                                                                                  [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                                              --> xlLxeUH.class
                                                                                                  [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                  [WARNING]   Infected files in archives cannot be repaired
                                                                                            --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                [45] Archive type: ZIP
                                                                                              --> main.class
                                                                                                  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                  [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2015-07-05 190022\Backup Files 2015-07-05 190022\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                          --> G:\PHILIPP-PC\Backup Set 2015-07-26 190018\Backup Files 2015-07-26 190018\Backup files 1.zip
                                                                                              [44] Archive type: ZIP
                                                                                            --> G:\PHILIPP-PC\Backup Set 2015-07-26 190018\Backup Files 2015-07-26 190018\Backup files 5.zip
                                                                                                [45] Archive type: ZIP
                                                                                              --> C/Users/Philipp/AppData/Local/Mozilla/Firefox/Profiles/9s0hc6sl.default-1430862582424/cache2/entries/C84B15C99CEA60557ED7DB2E3323E68CB5555288
                                                                                                  [46] Archive type: GZ
                                                                                                --> Object
                                                                                                    [DETECTION] Contains recognition pattern of the JS/Obfus.jdk.11 Java script virus
                                                                                                    [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2015-07-26 190018\Backup Files 2015-07-26 190018\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the JS/Obfus.jdk.11 Java script virus
                                                                                            --> G:\PHILIPP-PC\Backup Set 2015-07-26 190018\Backup Files 2015-07-26 190018\Backup files 6.zip
                                                                                                [45] Archive type: ZIP
                                                                                              --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                  [46] Archive type: ZIP
                                                                                                --> Java_Security.class
                                                                                                    [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                              --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                  [46] Archive type: ZIP
                                                                                                --> Zanaxo.class
                                                                                                    [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                                --> Vii.class
                                                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                                --> Third.class
                                                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                                --> Stuc.class
                                                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                                --> Seed.class
                                                                                                    [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                                --> Momos.class
                                                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                                --> Kpcas.class
                                                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                                --> Fai.class
                                                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                                --> Atomic.class
                                                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                                --> Accord.class
                                                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                                --> u.class
                                                                                                    [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                              --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                  [46] Archive type: ZIP
                                                                                                --> CBaiAEA.class
                                                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                                --> FWBAhmA.class
                                                                                                    [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                                --> kCHXi.class
                                                                                                    [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                                --> uEjwBpl.class
                                                                                                    [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                                --> xlLxeUH.class
                                                                                                    [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                    [WARNING]   Infected files in archives cannot be repaired
                                                                                              --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                  [46] Archive type: ZIP
                                                                                                --> main.class
                                                                                                    [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                    [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2015-07-26 190018\Backup Files 2015-07-26 190018\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                            --> G:\PHILIPP-PC\Backup Set 2015-08-16 190003\Backup Files 2015-08-16 190003\Backup files 1.zip
                                                                                                [45] Archive type: ZIP
                                                                                              --> G:\PHILIPP-PC\Backup Set 2015-08-16 190003\Backup Files 2015-08-16 190003\Backup files 5.zip
                                                                                                  [46] Archive type: ZIP
                                                                                                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                    [47] Archive type: ZIP
                                                                                                  --> Java_Security.class
                                                                                                      [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                    [47] Archive type: ZIP
                                                                                                  --> Zanaxo.class
                                                                                                      [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                                  --> Vii.class
                                                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                                  --> Third.class
                                                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                                  --> Stuc.class
                                                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                                  --> Seed.class
                                                                                                      [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                                  --> Momos.class
                                                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                                  --> Kpcas.class
                                                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                                  --> Fai.class
                                                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                                  --> Atomic.class
                                                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                                  --> Accord.class
                                                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                                  --> u.class
                                                                                                      [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                    [47] Archive type: ZIP
                                                                                                  --> CBaiAEA.class
                                                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                                  --> FWBAhmA.class
                                                                                                      [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                                  --> kCHXi.class
                                                                                                      [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                                  --> uEjwBpl.class
                                                                                                      [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                                  --> xlLxeUH.class
                                                                                                      [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                                --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                    [47] Archive type: ZIP
                                                                                                  --> main.class
                                                                                                      [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                      [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2015-08-16 190003\Backup Files 2015-08-16 190003\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                              --> G:\PHILIPP-PC\Backup Set 2015-08-16 190003\Backup Files 2015-09-06 190007\Backup files 1.zip
                                                                                                  [46] Archive type: ZIP
                                                                                                --> C/Users/Philipp/AppData/Roaming/Mozilla/Firefox/Profiles/9s0hc6sl.default-1430862582424/extensions/{631a3931-ef2e-40d8-8b76-2eb6230bf84a}.xpi
                                                                                                    [47] Archive type: ZIP
                                                                                                  --> bootstrap.js
                                                                                                      [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                                  --> lib/AddonObserver.js
                                                                                                      [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                                                      [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2015-08-16 190003\Backup Files 2015-09-06 190007\Backup files 1.zip
  [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                                              --> G:\PHILIPP-PC\Backup Set 2015-08-16 190003\Backup Files 2015-09-13 190009\Backup files 1.zip
                                                                                                  [46] Archive type: ZIP
                                                                                                --> C/Users/Philipp/AppData/Roaming/Mozilla/Firefox/Profiles/9s0hc6sl.default-1430862582424/extensions/{631a3931-ef2e-40d8-8b76-2eb6230bf84a}.xpi
                                                                                                    [47] Archive type: ZIP
                                                                                                  --> bootstrap.js
                                                                                                      [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                                                      [WARNING]   Infected files in archives cannot be repaired
                                                                                                  --> lib/AddonObserver.js
                                                                                                      [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                                                      [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2015-08-16 190003\Backup Files 2015-09-13 190009\Backup files 1.zip
  [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                                              --> G:\PHILIPP-PC\Backup Set 2015-09-20 190008\Backup Files 2015-09-20 190008\Backup files 1.zip
                                                                                                  [46] Archive type: ZIP
                                                                                                --> G:\PHILIPP-PC\Backup Set 2015-09-20 190008\Backup Files 2015-09-20 190008\Backup files 3.zip
                                                                                                    [47] Archive type: ZIP
                                                                                                  --> C/Users/Philipp/AppData/Roaming/Mozilla/Firefox/Profiles/9s0hc6sl.default-1430862582424/extensions/{631a3931-ef2e-40d8-8b76-2eb6230bf84a}.xpi
                                                                                                      [48] Archive type: ZIP
                                                                                                    --> bootstrap.js
                                                                                                        [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                                    --> lib/AddonObserver.js
                                                                                                        [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                                                        [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2015-09-20 190008\Backup Files 2015-09-20 190008\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                                                --> G:\PHILIPP-PC\Backup Set 2015-09-20 190008\Backup Files 2015-09-20 190008\Backup files 6.zip
                                                                                                    [47] Archive type: ZIP
                                                                                                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                      [48] Archive type: ZIP
                                                                                                    --> Java_Security.class
                                                                                                        [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                      [48] Archive type: ZIP
                                                                                                    --> Zanaxo.class
                                                                                                        [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                                    --> Vii.class
                                                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                                    --> Third.class
                                                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                                    --> Stuc.class
                                                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                                    --> Seed.class
                                                                                                        [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                                    --> Momos.class
                                                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                                    --> Kpcas.class
                                                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                                    --> Fai.class
                                                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                                    --> Atomic.class
                                                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                                    --> Accord.class
                                                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                                    --> u.class
                                                                                                        [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                      [48] Archive type: ZIP
                                                                                                    --> CBaiAEA.class
                                                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                                    --> FWBAhmA.class
                                                                                                        [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                                    --> kCHXi.class
                                                                                                        [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                                    --> uEjwBpl.class
                                                                                                        [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                        [WARNING]   Infected files in archives cannot be repaired
                                                                                                    --> xlLxeUH.class
                                                                                                        [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                        [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2015-09-20 190008\Backup Files 2015-09-20 190008\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                --> G:\PHILIPP-PC\Backup Set 2015-09-20 190008\Backup Files 2015-09-20 190008\Backup files 7.zip
                                                                                                    [47] Archive type: ZIP
                                                                                                  --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                      [48] Archive type: ZIP
                                                                                                    --> main.class
                                                                                                        [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                        [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2015-09-20 190008\Backup Files 2015-09-20 190008\Backup files 7.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                --> G:\PHILIPP-PC\Backup Set 2015-10-11 190009\Backup Files 2015-10-11 190009\Backup files 1.zip
                                                                                                    [47] Archive type: ZIP
                                                                                                  --> G:\PHILIPP-PC\Backup Set 2015-10-11 190009\Backup Files 2015-10-11 190009\Backup files 3.zip
                                                                                                      [48] Archive type: ZIP
                                                                                                    --> C/Users/Philipp/AppData/Roaming/Mozilla/Firefox/Profiles/9s0hc6sl.default-1430862582424/extensions/{631a3931-ef2e-40d8-8b76-2eb6230bf84a}.xpi
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> bootstrap.js
                                                                                                          [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> lib/AddonObserver.js
                                                                                                          [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                                                          [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2015-10-11 190009\Backup Files 2015-10-11 190009\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                                                  --> G:\PHILIPP-PC\Backup Set 2015-10-11 190009\Backup Files 2015-10-11 190009\Backup files 7.zip
                                                                                                      [48] Archive type: ZIP
                                                                                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> Java_Security.class
                                                                                                          [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> Zanaxo.class
                                                                                                          [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> Vii.class
                                                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> Third.class
                                                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> Stuc.class
                                                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> Seed.class
                                                                                                          [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> Momos.class
                                                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> Kpcas.class
                                                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> Fai.class
                                                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> Atomic.class
                                                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> Accord.class
                                                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> u.class
                                                                                                          [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> CBaiAEA.class
                                                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> FWBAhmA.class
                                                                                                          [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> kCHXi.class
                                                                                                          [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> uEjwBpl.class
                                                                                                          [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> xlLxeUH.class
                                                                                                          [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                          [WARNING]   Infected files in archives cannot be repaired
                                                                                                    --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> main.class
                                                                                                          [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                          [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2015-10-11 190009\Backup Files 2015-10-11 190009\Backup files 7.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                  --> G:\PHILIPP-PC\Backup Set 2015-11-01 190008\Backup Files 2015-11-01 190008\Backup files 1.zip
                                                                                                      [48] Archive type: ZIP
                                                                                                    --> G:\PHILIPP-PC\Backup Set 2015-11-01 190008\Backup Files 2015-11-01 190008\Backup files 7.zip
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Java_Security.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Zanaxo.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Vii.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Third.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Stuc.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Seed.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Momos.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Kpcas.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Fai.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Atomic.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Accord.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> u.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> CBaiAEA.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> FWBAhmA.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> kCHXi.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> uEjwBpl.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> xlLxeUH.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> main.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2015-11-01 190008\Backup Files 2015-11-01 190008\Backup files 7.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                    --> G:\PHILIPP-PC\Backup Set 2015-11-01 190008\Backup Files 2015-11-08 190008\Backup files 1.zip
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> C/Users/Philipp/AppData/Roaming/Mozilla/Firefox/Profiles/d1g0pw9w.default-1444645305666/extensions/{195d8c90-85e5-4ee9-8f4d-44d0beca1b91}.xpi
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> bootstrap.js
                                                                                                            [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> lib/AddonObserver.js
                                                                                                            [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/Local/Mozilla/Firefox/Profiles/d1g0pw9w.default-1444645305666/cache2/entries/88EF24FE2BD79CF346531CE5E916131B5877BB2E
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> bootstrap.js
                                                                                                            [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> lib/AddonObserver.js
                                                                                                            [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2015-11-01 190008\Backup Files 2015-11-08 190008\Backup files 1.zip
  [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
                                                                                                    --> G:\PHILIPP-PC\Backup Set 2015-11-22 190009\Backup Files 2015-11-22 190009\Backup files 5.zip
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Java_Security.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Zanaxo.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Vii.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Third.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Stuc.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Seed.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Momos.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Kpcas.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Fai.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Atomic.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Accord.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> u.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> CBaiAEA.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> FWBAhmA.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> kCHXi.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> uEjwBpl.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> xlLxeUH.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> main.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2015-11-22 190009\Backup Files 2015-11-22 190009\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                    --> G:\PHILIPP-PC\Backup Set 2015-12-13 190012\Backup Files 2015-12-13 190012\Backup files 5.zip
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Java_Security.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Zanaxo.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Vii.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Third.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Stuc.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Seed.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Momos.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Kpcas.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Fai.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Atomic.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Accord.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> u.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> CBaiAEA.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> FWBAhmA.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> kCHXi.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> uEjwBpl.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> xlLxeUH.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> main.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
         

Alt 19.04.2017, 13:26   #9
Melione
 
Windows-7-PC langsam, Avira findet Adware ohne Ende - Standard

Windows-7-PC langsam, Avira findet Adware ohne Ende



Avira, Teil 7:



Code:
ATTFilter
G:\PHILIPP-PC\Backup Set 2015-12-13 190012\Backup Files 2015-12-13 190012\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                    --> G:\PHILIPP-PC\Backup Set 2016-01-20 212751\Backup Files 2016-01-20 212751\Backup files 5.zip
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Java_Security.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Zanaxo.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Vii.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Third.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Stuc.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Seed.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Momos.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Kpcas.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Fai.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Atomic.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Accord.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> u.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> CBaiAEA.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> FWBAhmA.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> kCHXi.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> uEjwBpl.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> xlLxeUH.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> main.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2016-01-20 212751\Backup Files 2016-01-20 212751\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                    --> G:\PHILIPP-PC\Backup Set 2016-02-07 190011\Backup Files 2016-02-07 190011\Backup files 4.zip
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> C/Users/Philipp/AppData/Local/Mozilla/Firefox/Profiles/lzk71ppa.default-1454532706038/cache2/entries/C84B15C99CEA60557ED7DB2E3323E68CB5555288
                                                                                                          [50] Archive type: GZ
                                                                                                        --> Object
                                                                                                            [DETECTION] Contains recognition pattern of the JS/Obfus.jdk.11 Java script virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2016-02-07 190011\Backup Files 2016-02-07 190011\Backup files 4.zip
  [DETECTION] Contains recognition pattern of the JS/Obfus.jdk.11 Java script virus
                                                                                                    --> G:\PHILIPP-PC\Backup Set 2016-02-07 190011\Backup Files 2016-02-07 190011\Backup files 5.zip
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Java_Security.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Zanaxo.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Vii.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Third.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Stuc.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Seed.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Momos.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Kpcas.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Fai.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Atomic.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Accord.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> u.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> CBaiAEA.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> FWBAhmA.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> kCHXi.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> uEjwBpl.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> xlLxeUH.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> main.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2016-02-07 190011\Backup Files 2016-02-07 190011\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                    --> G:\PHILIPP-PC\Backup Set 2016-02-28 190017\Backup Files 2016-02-28 190017\Backup files 6.zip
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Java_Security.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Zanaxo.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Vii.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Third.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Stuc.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Seed.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Momos.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Kpcas.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Fai.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Atomic.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Accord.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> u.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> CBaiAEA.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> FWBAhmA.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> kCHXi.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> uEjwBpl.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> xlLxeUH.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> main.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2016-02-28 190017\Backup Files 2016-02-28 190017\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                    --> G:\PHILIPP-PC\Backup Set 2016-03-20 190213\Backup Files 2016-03-20 190213\Backup files 5.zip
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Java_Security.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Zanaxo.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Vii.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Third.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Stuc.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Seed.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Momos.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Kpcas.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Fai.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Atomic.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Accord.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> u.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> CBaiAEA.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> FWBAhmA.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> kCHXi.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> uEjwBpl.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> xlLxeUH.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> main.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2016-03-20 190213\Backup Files 2016-03-20 190213\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                    --> G:\PHILIPP-PC\Backup Set 2016-04-10 190016\Backup Files 2016-04-10 190016\Backup files 5.zip
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Java_Security.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Zanaxo.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Vii.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Third.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Stuc.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Seed.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Momos.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Kpcas.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Fai.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Atomic.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Accord.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> u.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> CBaiAEA.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> FWBAhmA.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> kCHXi.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> uEjwBpl.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> xlLxeUH.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> main.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2016-04-10 190016\Backup Files 2016-04-10 190016\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                    --> G:\PHILIPP-PC\Backup Set 2016-05-01 190333\Backup Files 2016-05-01 190333\Backup files 6.zip
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Java_Security.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Zanaxo.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Vii.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Third.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Stuc.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Seed.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Momos.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Kpcas.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Fai.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Atomic.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Accord.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> u.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> CBaiAEA.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> FWBAhmA.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> kCHXi.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> uEjwBpl.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> xlLxeUH.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> main.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2016-05-01 190333\Backup Files 2016-05-01 190333\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                    --> G:\PHILIPP-PC\Backup Set 2016-05-22 204634\Backup Files 2016-05-22 204634\Backup files 7.zip
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Java_Security.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Zanaxo.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Vii.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Third.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Stuc.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Seed.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Momos.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Kpcas.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Fai.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Atomic.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Accord.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> u.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> CBaiAEA.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> FWBAhmA.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> kCHXi.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> uEjwBpl.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> xlLxeUH.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> main.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2016-05-22 204634\Backup Files 2016-05-22 204634\Backup files 7.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                    --> G:\PHILIPP-PC\Backup Set 2016-07-03 190014\Backup Files 2016-07-03 190014\Backup files 7.zip
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Java_Security.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Zanaxo.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Vii.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Third.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Stuc.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Seed.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Momos.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Kpcas.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Fai.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Atomic.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Accord.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> u.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> CBaiAEA.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> FWBAhmA.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> kCHXi.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> uEjwBpl.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> xlLxeUH.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> main.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2016-07-03 190014\Backup Files 2016-07-03 190014\Backup files 7.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                    --> G:\PHILIPP-PC\Backup Set 2016-07-17 190009\Backup Files 2016-07-17 190009\Backup files 7.zip
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Java_Security.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Zanaxo.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Vii.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Third.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Stuc.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Seed.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Momos.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Kpcas.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Fai.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Atomic.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Accord.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> u.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> CBaiAEA.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> FWBAhmA.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> kCHXi.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> uEjwBpl.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> xlLxeUH.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> main.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2016-07-17 190009\Backup Files 2016-07-17 190009\Backup files 7.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                    --> G:\PHILIPP-PC\Backup Set 2016-07-31 190013\Backup Files 2016-07-31 190013\Backup files 4.zip
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Java_Security.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Zanaxo.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Vii.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Third.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Stuc.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Seed.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Momos.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Kpcas.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Fai.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Atomic.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Accord.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> u.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> CBaiAEA.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> FWBAhmA.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> kCHXi.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> uEjwBpl.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> xlLxeUH.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> main.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2016-07-31 190013\Backup Files 2016-07-31 190013\Backup files 4.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                    --> G:\PHILIPP-PC\Backup Set 2016-08-21 190007\Backup Files 2016-08-21 190007\Backup files 6.zip
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Java_Security.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Zanaxo.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Vii.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Third.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Stuc.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Seed.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Momos.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Kpcas.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Fai.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Atomic.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Accord.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> u.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> CBaiAEA.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> FWBAhmA.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> kCHXi.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> uEjwBpl.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> xlLxeUH.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> main.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
         

Alt 19.04.2017, 13:27   #10
Melione
 
Windows-7-PC langsam, Avira findet Adware ohne Ende - Standard

Windows-7-PC langsam, Avira findet Adware ohne Ende



Avira, Teil 8:



Code:
ATTFilter
G:\PHILIPP-PC\Backup Set 2016-08-21 190007\Backup Files 2016-08-21 190007\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                    --> G:\PHILIPP-PC\Backup Set 2016-09-11 190013\Backup Files 2016-09-11 190013\Backup files 7.zip
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Java_Security.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Zanaxo.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Vii.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Third.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Stuc.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Seed.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Momos.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Kpcas.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Fai.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Atomic.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Accord.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> u.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> CBaiAEA.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> FWBAhmA.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> kCHXi.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> uEjwBpl.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> xlLxeUH.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> main.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2016-09-11 190013\Backup Files 2016-09-11 190013\Backup files 7.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                    --> G:\PHILIPP-PC\Backup Set 2016-10-02 190018\Backup Files 2016-10-02 190018\Backup files 7.zip
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Java_Security.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Zanaxo.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Vii.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Third.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Stuc.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Seed.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Momos.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Kpcas.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Fai.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Atomic.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Accord.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> u.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> CBaiAEA.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> FWBAhmA.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> kCHXi.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> uEjwBpl.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> xlLxeUH.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> main.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2016-10-02 190018\Backup Files 2016-10-02 190018\Backup files 7.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                    --> G:\PHILIPP-PC\Backup Set 2016-10-23 190007\Backup Files 2016-10-23 190007\Backup files 7.zip
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Java_Security.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Zanaxo.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Vii.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Third.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Stuc.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Seed.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Momos.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Kpcas.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Fai.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Atomic.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Accord.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> u.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> CBaiAEA.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> FWBAhmA.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> kCHXi.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> uEjwBpl.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> xlLxeUH.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> main.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2016-10-23 190007\Backup Files 2016-10-23 190007\Backup files 7.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                    --> G:\PHILIPP-PC\Backup Set 2016-11-13 190009\Backup Files 2016-11-13 190009\Backup files 8.zip
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Java_Security.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Zanaxo.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Vii.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Third.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Stuc.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Seed.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Momos.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Kpcas.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Fai.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Atomic.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Accord.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> u.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> CBaiAEA.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> FWBAhmA.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> kCHXi.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> uEjwBpl.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> xlLxeUH.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> main.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2016-11-13 190009\Backup Files 2016-11-13 190009\Backup files 8.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                    --> G:\PHILIPP-PC\Backup Set 2016-12-04 190009\Backup Files 2016-12-04 190009\Backup files 9.zip
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Java_Security.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Zanaxo.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Vii.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Third.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Stuc.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Seed.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Momos.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Kpcas.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Fai.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Atomic.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Accord.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> u.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> CBaiAEA.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> FWBAhmA.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> kCHXi.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> uEjwBpl.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> xlLxeUH.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> main.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2016-12-04 190009\Backup Files 2016-12-04 190009\Backup files 9.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                    --> G:\PHILIPP-PC\Backup Set 2016-12-25 190018\Backup Files 2016-12-25 190018\Backup files 9.zip
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Java_Security.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Zanaxo.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Vii.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Third.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Stuc.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Seed.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Momos.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Kpcas.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Fai.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Atomic.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Accord.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> u.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> CBaiAEA.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> FWBAhmA.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> kCHXi.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> uEjwBpl.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> xlLxeUH.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> main.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
         

Alt 19.04.2017, 13:28   #11
Melione
 
Windows-7-PC langsam, Avira findet Adware ohne Ende - Standard

Windows-7-PC langsam, Avira findet Adware ohne Ende



Avira, Teil 9 (der letzte):



Code:
ATTFilter
G:\PHILIPP-PC\Backup Set 2016-12-25 190018\Backup Files 2016-12-25 190018\Backup files 9.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                    --> G:\PHILIPP-PC\Backup Set 2017-01-22 190020\Backup Files 2017-01-22 190020\Backup files 9.zip
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Java_Security.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Zanaxo.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Vii.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Third.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Stuc.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Seed.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Momos.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Kpcas.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Fai.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Atomic.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Accord.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> u.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> CBaiAEA.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> FWBAhmA.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> kCHXi.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> uEjwBpl.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> xlLxeUH.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> main.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2017-01-22 190020\Backup Files 2017-01-22 190020\Backup files 9.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                    --> G:\PHILIPP-PC\Backup Set 2017-03-12 190012\Backup Files 2017-03-12 190012\Backup files 9.zip
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Java_Security.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Zanaxo.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Vii.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Third.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Stuc.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Seed.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Momos.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Kpcas.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Fai.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Atomic.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Accord.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> u.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> CBaiAEA.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> FWBAhmA.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> kCHXi.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> uEjwBpl.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> xlLxeUH.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> main.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2017-03-12 190012\Backup Files 2017-03-12 190012\Backup files 9.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                    --> G:\PHILIPP-PC\Backup Set 2017-04-02 190007\Backup Files 2017-04-02 190007\Backup files 10.zip
                                                                                                        [49] Archive type: ZIP
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/458aee8e-50c8aa6d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Java_Security.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/23/690a7d57-633d556d
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> Zanaxo.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/JAVA.Rafold.U.Gen exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Vii.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.182 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Third.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.10 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Stuc.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.11 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Seed.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2516 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Momos.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.7 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Kpcas.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.A.145 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Fai.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CE exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Atomic.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0507.CC exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> Accord.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE20120507.CG.12 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> u.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/31/5565fadf-5e43bc2a
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> CBaiAEA.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> FWBAhmA.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XK Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> kCHXi.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XJ Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> uEjwBpl.class
                                                                                                            [DETECTION] Contains recognition pattern of the JAVA/Agent.XI Java virus
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                        --> xlLxeUH.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
                                                                                                      --> C/Users/Philipp/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/48/6f40e570-1d303383
                                                                                                          [50] Archive type: ZIP
                                                                                                        --> main.class
                                                                                                            [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
                                                                                                            [WARNING]   Infected files in archives cannot be repaired
G:\PHILIPP-PC\Backup Set 2017-04-02 190007\Backup Files 2017-04-02 190007\Backup files 10.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
The file 'G:\RECYCLER\S-1-5-21-1935655697-688789844-1343024091-1003\Dg149\Programme Fragezeichen\MediaMonkey\UninstDP.exe' was scanned with the Protection Cloud. SHA256 = AFDE0ED6FC0D35A1ABEBE696AF6715422CA81B77E365CA6B39CB8EA42E75092C
The file 'G:\RECYCLER\S-1-5-21-1935655697-688789844-1343024091-1003\Dg149\Programme Fragezeichen\Opera\uninst\OpUninst.exe' was scanned with the Protection Cloud. SHA256 = 52328FA7A1CE3BCA8DABCF51921063266822AFEDEEDAC286ECE538708151FC2C
The file 'G:\RECYCLER\S-1-5-21-1935655697-688789844-1343024091-1003\Dg149\Programme Fragezeichen\Opera\uninst\unwise.exe' was scanned with the Protection Cloud. SHA256 = 4751A3547F3B482BB4A2440D4E91E3DCBA9B4B0F5B1BB50416A32FB47AE75C5E
Begin scan in 'Q:\'
Search path Q:\ could not be opened!
System error [5]: Zugriff verweigert

Beginning disinfection:
G:\PHILIPP-PC\Backup Set 2017-04-02 190007\Backup Files 2017-04-02 190007\Backup files 10.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '5f242dd8.qua'!
G:\PHILIPP-PC\Backup Set 2017-03-12 190012\Backup Files 2017-03-12 190012\Backup files 9.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '47b30273.qua'!
G:\PHILIPP-PC\Backup Set 2017-01-22 190020\Backup Files 2017-01-22 190020\Backup files 9.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '15ec58fd.qua'!
G:\PHILIPP-PC\Backup Set 2016-12-25 190018\Backup Files 2016-12-25 190018\Backup files 9.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '73db1714.qua'!
G:\PHILIPP-PC\Backup Set 2016-12-04 190009\Backup Files 2016-12-04 190009\Backup files 9.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '365f3a3c.qua'!
G:\PHILIPP-PC\Backup Set 2016-11-13 190009\Backup Files 2016-11-13 190009\Backup files 8.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '49440fac.qua'!
G:\PHILIPP-PC\Backup Set 2016-10-23 190007\Backup Files 2016-10-23 190007\Backup files 7.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '05fc23f2.qua'!
G:\PHILIPP-PC\Backup Set 2016-10-02 190018\Backup Files 2016-10-02 190018\Backup files 7.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '79e46390.qua'!
G:\PHILIPP-PC\Backup Set 2016-09-11 190013\Backup Files 2016-09-11 190013\Backup files 7.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '54be4ccf.qua'!
G:\PHILIPP-PC\Backup Set 2016-08-21 190007\Backup Files 2016-08-21 190007\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '4dd6775e.qua'!
G:\PHILIPP-PC\Backup Set 2016-07-31 190013\Backup Files 2016-07-31 190013\Backup files 4.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '218a5b12.qua'!
G:\PHILIPP-PC\Backup Set 2016-07-17 190009\Backup Files 2016-07-17 190009\Backup files 7.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '50336295.qua'!
G:\PHILIPP-PC\Backup Set 2016-07-03 190014\Backup Files 2016-07-03 190014\Backup files 7.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '5e29525d.qua'!
G:\PHILIPP-PC\Backup Set 2016-05-22 204634\Backup Files 2016-05-22 204634\Backup files 7.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '1b002b22.qua'!
G:\PHILIPP-PC\Backup Set 2016-05-01 190333\Backup Files 2016-05-01 190333\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '120b2f9c.qua'!
G:\PHILIPP-PC\Backup Set 2016-04-10 190016\Backup Files 2016-04-10 190016\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '4a4a36f9.qua'!
G:\PHILIPP-PC\Backup Set 2016-03-20 190213\Backup Files 2016-03-20 190213\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '66be4fc2.qua'!
G:\PHILIPP-PC\Backup Set 2016-02-28 190017\Backup Files 2016-02-28 190017\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '58402f03.qua'!
G:\PHILIPP-PC\Backup Set 2016-02-07 190011\Backup Files 2016-02-07 190011\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '3b4e0479.qua'!
G:\PHILIPP-PC\Backup Set 2016-02-07 190011\Backup Files 2016-02-07 190011\Backup files 4.zip
  [DETECTION] Contains recognition pattern of the JS/Obfus.jdk.11 Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '1d86443a.qua'!
G:\PHILIPP-PC\Backup Set 2016-01-20 212751\Backup Files 2016-01-20 212751\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '2f123f95.qua'!
G:\PHILIPP-PC\Backup Set 2015-12-13 190012\Backup Files 2015-12-13 190012\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '255714ff.qua'!
G:\PHILIPP-PC\Backup Set 2015-11-22 190009\Backup Files 2015-11-22 190009\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '1a047084.qua'!
G:\PHILIPP-PC\Backup Set 2015-11-01 190008\Backup Files 2015-11-08 190008\Backup files 1.zip
  [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
  [NOTE]      The file was moved to the quarantine directory under the name '64287d66.qua'!
G:\PHILIPP-PC\Backup Set 2015-11-01 190008\Backup Files 2015-11-01 190008\Backup files 7.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '315079a4.qua'!
G:\PHILIPP-PC\Backup Set 2015-10-11 190009\Backup Files 2015-10-11 190009\Backup files 7.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '3cc60894.qua'!
G:\PHILIPP-PC\Backup Set 2015-10-11 190009\Backup Files 2015-10-11 190009\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
  [NOTE]      The file was moved to the quarantine directory under the name '209b1c94.qua'!
G:\PHILIPP-PC\Backup Set 2015-09-20 190008\Backup Files 2015-09-20 190008\Backup files 7.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '1148512b.qua'!
G:\PHILIPP-PC\Backup Set 2015-09-20 190008\Backup Files 2015-09-20 190008\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
  [NOTE]      The file was moved to the quarantine directory under the name '7d1e451a.qua'!
G:\PHILIPP-PC\Backup Set 2015-09-20 190008\Backup Files 2015-09-20 190008\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
  [NOTE]      The file was moved to the quarantine directory under the name '3484600e.qua'!
G:\PHILIPP-PC\Backup Set 2015-08-16 190003\Backup Files 2015-09-13 190009\Backup files 1.zip
  [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
  [NOTE]      The file was moved to the quarantine directory under the name '6f1168e4.qua'!
G:\PHILIPP-PC\Backup Set 2015-08-16 190003\Backup Files 2015-09-06 190007\Backup files 1.zip
  [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
  [NOTE]      The file was moved to the quarantine directory under the name '09a36419.qua'!
G:\PHILIPP-PC\Backup Set 2015-08-16 190003\Backup Files 2015-08-16 190003\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '5e2d16bc.qua'!
G:\PHILIPP-PC\Backup Set 2015-07-26 190018\Backup Files 2015-07-26 190018\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '7c5d4133.qua'!
G:\PHILIPP-PC\Backup Set 2015-07-26 190018\Backup Files 2015-07-26 190018\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the JS/Obfus.jdk.11 Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '144d3bac.qua'!
G:\PHILIPP-PC\Backup Set 2015-07-05 190022\Backup Files 2015-07-05 190022\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '343b3f3d.qua'!
G:\PHILIPP-PC\Backup Set 2015-06-14 190007\Backup Files 2015-06-14 190007\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '611f79b5.qua'!
G:\PHILIPP-PC\Backup Set 2015-05-24 190008\Backup Files 2015-05-24 190008\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '003f581e.qua'!
G:\PHILIPP-PC\Backup Set 2015-05-03 190026\Backup Files 2015-05-03 190026\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '65931a9a.qua'!
G:\PHILIPP-PC\Backup Set 2015-04-19 190007\Backup Files 2015-04-19 190007\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '00446e49.qua'!
G:\PHILIPP-PC\Backup Set 2015-03-29 190009\Backup Files 2015-03-29 190009\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '13a052c0.qua'!
G:\PHILIPP-PC\Backup Set 2015-03-15 190006\Backup Files 2015-03-15 190006\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '01192e4a.qua'!
G:\PHILIPP-PC\Backup Set 2015-03-01 190006\Backup Files 2015-03-01 190006\Backup files 7.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '16494dff.qua'!
G:\PHILIPP-PC\Backup Set 2015-02-08 190008\Backup Files 2015-02-08 190008\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
  [NOTE]      The file was moved to the quarantine directory under the name '4c6b7f78.qua'!
G:\PHILIPP-PC\Backup Set 2015-02-08 190008\Backup Files 2015-02-08 190008\Backup files 4.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '69660568.qua'!
G:\PHILIPP-PC\Backup Set 2015-01-18 190006\Backup Files 2015-01-18 190006\Backup files 4.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '1d3d1eee.qua'!
G:\PHILIPP-PC\Backup Set 2015-01-18 190006\Backup Files 2015-01-18 190006\Backup files 2.zip
  [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
  [NOTE]      The file was moved to the quarantine directory under the name '3f3f4c6d.qua'!
G:\PHILIPP-PC\Backup Set 2014-12-28 190007\Backup Files 2014-12-28 190007\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '4aac346f.qua'!
G:\PHILIPP-PC\Backup Set 2014-12-28 190007\Backup Files 2014-12-28 190007\Backup files 2.zip
  [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
  [NOTE]      The file was moved to the quarantine directory under the name '61fb6866.qua'!
G:\PHILIPP-PC\Backup Set 2014-12-10 221250\Backup Files 2014-12-21 190006\Backup files 1.zip
  [DETECTION] Contains recognition pattern of the ADSPY/Skrum.EL adware or spyware
  [NOTE]      The file was moved to the quarantine directory under the name '069c20e3.qua'!
G:\PHILIPP-PC\Backup Set 2014-12-10 221250\Backup Files 2014-12-10 221250\Backup files 4.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '4dec19fe.qua'!
G:\PHILIPP-PC\Backup Set 2014-10-05 190006\Backup Files 2014-10-05 190006\Backup files 4.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '4d1213b5.qua'!
G:\PHILIPP-PC\Backup Set 2014-09-21 190018\Backup Files 2014-09-21 190018\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '07bd46ad.qua'!
G:\PHILIPP-PC\Backup Set 2014-09-08 150856\Backup Files 2014-09-08 150856\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '69946912.qua'!
G:\PHILIPP-PC\Backup Set 2014-08-17 190003\Backup Files 2014-08-17 190003\Backup files 4.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '24b43764.qua'!
G:\PHILIPP-PC\Backup Set 2014-07-27 190007\Backup Files 2014-07-27 190007\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '4c901046.qua'!
G:\PHILIPP-PC\Backup Set 2014-07-06 190011\Backup Files 2014-07-06 190011\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '36212a83.qua'!
G:\PHILIPP-PC\Backup Set 2014-06-15 190009\Backup Files 2014-06-15 190009\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '477376fb.qua'!
G:\PHILIPP-PC\Backup Set 2014-05-25 190010\Backup Files 2014-05-25 190010\Backup files 4.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '37945ce6.qua'!
G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-05-11 190007\Backup files 9.zip
  [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
  [NOTE]      The file was moved to the quarantine directory under the name '4ce420b7.qua'!
G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-04-13 190009\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '02bf53c6.qua'!
G:\PHILIPP-PC\Backup Set 2014-04-13 190009\Backup Files 2014-04-13 190009\Backup files 3.zip
  [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen
  [NOTE]      The file was moved to the quarantine directory under the name '7cc42914.qua'!
G:\PHILIPP-PC\Backup Set 2014-03-30 190008\Backup Files 2014-03-30 190008\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '085e016b.qua'!
G:\PHILIPP-PC\Backup Set 2014-03-30 190008\Backup Files 2014-03-30 190008\Backup files 3.zip
  [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen
  [NOTE]      The file was moved to the quarantine directory under the name '036a5d19.qua'!
G:\PHILIPP-PC\Backup Set 2014-03-02 190003\Backup Files 2014-03-02 190003\Backup files 6.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '50b24eee.qua'!
G:\PHILIPP-PC\Backup Set 2014-03-02 190003\Backup Files 2014-03-02 190003\Backup files 3.zip
  [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen
  [NOTE]      The file was moved to the quarantine directory under the name '35db658e.qua'!
G:\PHILIPP-PC\Backup Set 2014-02-09 190003\Backup Files 2014-02-09 190003\Backup files 4.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '1d203531.qua'!
G:\PHILIPP-PC\Backup Set 2014-02-09 190003\Backup Files 2014-02-09 190003\Backup files 3.zip
  [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen
  [NOTE]      The file was moved to the quarantine directory under the name '69836cff.qua'!
G:\PHILIPP-PC\Backup Set 2014-01-26 190004\Backup Files 2014-02-02 190007\Backup files 1.zip
  [DETECTION] Contains virus patterns of Adware ADWARE/AddLyrics.Gen
  [NOTE]      The file was moved to the quarantine directory under the name '268e1479.qua'!
G:\PHILIPP-PC\Backup Set 2014-01-26 190004\Backup Files 2014-01-26 190004\Backup files 5.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '195a4dc8.qua'!
G:\PHILIPP-PC\Backup Set 2013-12-15 190011\Backup Files 2013-12-15 190011\Backup files 4.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '636c4e43.qua'!
G:\PHILIPP-PC\Backup Set 2013-11-24 190006\Backup Files 2013-11-24 190006\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '3364493e.qua'!
G:\PHILIPP-PC\Backup Set 2013-11-03 190004\Backup Files 2013-11-03 190004\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '656c4361.qua'!
G:\PHILIPP-PC\Backup Set 2013-09-27 192833\Backup Files 2013-09-27 192833\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '22dc47ba.qua'!
G:\PHILIPP-PC\Backup Set 2013-09-01 190003\Backup Files 2013-09-01 190003\Backup files 3.zip
  [DETECTION] Contains recognition pattern of a probably damaged CC/00256 sample
  [NOTE]      The file was moved to the quarantine directory under the name '019026c5.qua'!
G:\PHILIPP-PC\Backup Set 2013-08-04 190004\Backup Files 2013-08-04 190004\Backup files 3.zip
  [DETECTION] Contains recognition pattern of a probably damaged CC/00256 sample
  [NOTE]      The file was moved to the quarantine directory under the name '461b0f22.qua'!
G:\PHILIPP-PC\Backup Set 2013-07-14 190009\Backup Files 2013-07-14 190009\Backup files 3.zip
  [DETECTION] Contains recognition pattern of a probably damaged CC/00256 sample
  [NOTE]      The file was moved to the quarantine directory under the name '347f5cb3.qua'!
G:\PHILIPP-PC\Backup Set 2013-06-30 213122\Backup Files 2013-06-30 213122\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '1f101fbf.qua'!
G:\PHILIPP-PC\Backup Set 2013-06-09 194227\Backup Files 2013-06-24 174918\Backup files 1.zip
  [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
  [NOTE]      The file was moved to the quarantine directory under the name '5c891137.qua'!
G:\PHILIPP-PC\Backup Set 2013-06-09 194227\Backup Files 2013-06-09 194227\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '1647680b.qua'!
G:\PHILIPP-PC\Backup Set 2013-05-26 190009\Backup Files 2013-05-26 190009\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '1b0f76bf.qua'!
G:\PHILIPP-PC\Backup Set 2013-05-06 172759\Backup Files 2013-05-06 172759\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '34e53e5a.qua'!
G:\PHILIPP-PC\Backup Set 2013-04-14 190002\Backup Files 2013-04-14 190002\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '0b21774c.qua'!
G:\PHILIPP-PC\Backup Set 2013-03-27 140706\Backup Files 2013-03-27 140706\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '34c661dc.qua'!
G:\PHILIPP-PC\Backup Set 2013-03-03 230723\Backup Files 2013-03-03 230723\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '511f3115.qua'!
G:\PHILIPP-PC\Backup Set 2013-02-03 190007\Backup Files 2013-02-10 190004\Backup files 1.zip
  [DETECTION] Contains recognition pattern of the HTML/Redirect.00 HTML script virus
  [NOTE]      The file was moved to the quarantine directory under the name '773e1675.qua'!
G:\PHILIPP-PC\Backup Set 2013-02-03 190007\Backup Files 2013-02-03 190007\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '7b934534.qua'!
G:\PHILIPP-PC\Backup Set 2013-01-13 190004\Backup Files 2013-01-13 190004\Backup files 3.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '4ef933e8.qua'!
G:\PHILIPP-PC\Backup Set 2012-12-24 124445\Backup Files 2012-12-24 124445\Backup files 2.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '35d934af.qua'!
G:\PHILIPP-PC\Backup Set 2012-12-02 210546\Backup Files 2012-12-02 210546\Backup files 2.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '13d9318d.qua'!
G:\PHILIPP-PC\Backup Set 2012-11-18 190005\Backup Files 2012-11-18 190005\Backup files 2.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '7f547c5e.qua'!
G:\PHILIPP-PC\Backup Set 2012-10-28 190002\Backup Files 2012-10-28 190002\Backup files 2.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '5f386916.qua'!
G:\PHILIPP-PC\Backup Set 2012-10-07 190005\Backup Files 2012-10-07 190005\Backup files 2.zip
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '383f03f3.qua'!
F:\Eff\Installers\agsetup183se.exe
  [DETECTION] Contains virus patterns of Adware ADWARE/DealPly.Y
  [NOTE]      The file was moved to the quarantine directory under the name '45c96036.qua'!
C:\Users\Philipp\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\48\6f40e570-1d303383
  [DETECTION] Contains recognition pattern of the EXP/2011-3544.BL exploit
  [NOTE]      The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination.
  [NOTE]      The file was moved to the quarantine directory under the name '19b16f2e.qua'!
C:\Users\Philipp\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\31\5565fadf-5e43bc2a
  [DETECTION] Contains recognition pattern of the EXP/CVE-2013-1493.A.293 exploit
  [NOTE]      The file was moved to the quarantine directory under the name '51e8540d.qua'!
C:\Users\Philipp\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\23\690a7d57-633d556d
  [DETECTION] Contains recognition pattern of the EXP/Java.HLP.A.2665 exploit
  [NOTE]      The file was moved to the quarantine directory under the name '3f3a390b.qua'!
C:\Users\Philipp\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\14\458aee8e-50c8aa6d
  [DETECTION] Contains recognition pattern of the JAVA/OpenStream.hsn Java virus
  [NOTE]      The file was moved to the quarantine directory under the name '1af56751.qua'!


End of the scan: Dienstag, 18. April 2017  22:42
Used time:  7:39:29 Hour(s)

The scan has been done completely.

  41526 Scanned directories
 5803631 Files were scanned
   1404 Viruses and/or unwanted programs were found
      0 Files were classified as suspicious
      0 Files were deleted
      0 Viruses and unwanted programs were repaired
     98 Files were moved to quarantine
      0 Files were renamed
      0 Files cannot be scanned
 5802227 Files not concerned
 127634 Archives were scanned
   1311 Warnings
     98 Notes
 1285610 Objects were scanned with rootkit scan
      0 Hidden objects were found
         

Alt 19.04.2017, 13:49   #12
cosinus
/// Winkelfunktion
/// TB-Süch-Tiger™
 
Windows-7-PC langsam, Avira findet Adware ohne Ende - Standard

Windows-7-PC langsam, Avira findet Adware ohne Ende



Es gibt auch Helfer die ZIPs bzw Logs in Anhängen annehmen, ich mag die aber nicht, die erschweren die Arbeit. Eben die genannten Gründe im Lesestoff.


Scan mit Farbar's Recovery Scan Tool (FRST)

Bitte lade dir die passende Version von Farbar's Recovery Scan Tool auf deinen Desktop: FRST Download FRST 32-Bit | FRST 64-Bit
(Wenn du nicht sicher bist: Lade beide Versionen oder unter Start > Computer (Rechtsklick) > Eigenschaften nachschauen)
  • Starte jetzt FRST.
  • Ändere ungefragt keine der Checkboxen und klicke auf Untersuchen.
  • Die Logdateien werden nun erstellt und befinden sich danach auf deinem Desktop.
  • Poste mir die FRST.txt und nach dem ersten Scan auch die Addition.txt in deinem Thread (#-Symbol im Eingabefenster der Webseite anklicken)

__________________
Logfiles bitte immer in CODE-Tags posten

Alt 19.04.2017, 14:13   #13
Melione
 
Windows-7-PC langsam, Avira findet Adware ohne Ende - Standard

Windows-7-PC langsam, Avira findet Adware ohne Ende



FRST:



Code:
ATTFilter
Untersuchungsergebnis von Farbar Recovery Scan Tool (FRST) (x64) Version: 17-04-2017 01
durchgeführt von Philipp (Administrator) auf PHILIPP-PC (19-04-2017 13:55:08)
Gestartet von C:\Users\Philipp\Desktop
Geladene Profile: Philipp (Verfügbare Profile: Philipp)
Platform: Windows 7 Home Premium Service Pack 1 (X64) Sprache: Deutsch (Deutschland)
Internet Explorer Version 11 (Standard-Browser: "C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe" -- "%1")
Start-Modus: Normal
Anleitung für Farbar Recovery Scan Tool: hxxp://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/

==================== Prozesse (Nicht auf der Ausnahmeliste) =================

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird der Prozess geschlossen. Die Datei wird nicht verschoben.)

(Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\sched.exe
(Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\avguard.exe
(Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\VPN\Avira.VpnService.exe
(Intel Corporation) C:\Windows\System32\igfxpers.exe
(Groom-A-Zebu (tm)  ) C:\Program Files (x86)\Proxomitron Naoko-4\Proxomitron.exe
(Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe
(BlackBerry Limited) C:\Program Files (x86)\Common Files\Research In Motion\USB Drivers\RIMBBLaunchAgent.exe
(BlackBerry Limited) C:\Program Files (x86)\Common Files\Research In Motion\Tunnel Manager\PeerManager.exe
(Telegram Messenger LLP) C:\Users\Philipp\AppData\Roaming\Telegram Desktop\Telegram.exe
(Apple Inc.) C:\Program Files (x86)\Common Files\Research In Motion\Tunnel Manager\mDNSResponder.exe
(Microsoft Corporation) C:\Program Files (x86)\Microsoft Application Virtualization Client\sftvsa.exe
(Telefónica I+D) C:\Program Files (x86)\o2\Mobile Connection Manager\ImpWiFiSvc.exe
(Microsoft Corp.) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
(BlackBerry Limited) C:\Program Files (x86)\Common Files\Research In Motion\Tunnel Manager\tunmgr.exe
(Microsoft Corporation) C:\Program Files (x86)\Microsoft Application Virtualization Client\sftlist.exe
(Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\Launcher\Avira.ServiceHost.exe
(Microsoft Corp.) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVCM.EXE
(Microsoft Corporation) C:\Program Files (x86)\Common Files\microsoft shared\Virtualization Handler\CVHSVC.EXE
(Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\Launcher\Avira.Systray.exe
(Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\avshadow.exe
(BlackBerry Limited) C:\Program Files (x86)\Common Files\Research In Motion\USB Drivers\BbDevMgr.exe
() C:\Program Files (x86)\Common Files\Research In Motion\nginx\nginx.exe
() C:\Program Files (x86)\Common Files\Research In Motion\nginx\nginx.exe
(Microsoft Corporation) C:\Windows\System32\rundll32.exe
(Microsoft Corporation) C:\Windows\System32\dllhost.exe
(Nero AG) C:\Program Files (x86)\Nero\Update\NASvc.exe
(Vivaldi Technologies AS) C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe
(Vivaldi Technologies AS) C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe
(Vivaldi Technologies AS) C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe
(Vivaldi Technologies AS) C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe
(Vivaldi Technologies AS) C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe
(Vivaldi Technologies AS) C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe
(Vivaldi Technologies AS) C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe
(Vivaldi Technologies AS) C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe
(Vivaldi Technologies AS) C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe
(Vivaldi Technologies AS) C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe
(Nullsoft, Inc.) C:\Program Files (x86)\Winamp\winamp.exe

==================== Registry (Nicht auf der Ausnahmeliste) ====================

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird der Registryeintrag auf den Standardwert zurückgesetzt oder entfernt. Die Datei wird nicht verschoben.)

HKLM-x32\...\Run: [avgnt] => C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe [909744 2017-03-22] (Avira Operations GmbH & Co. KG)
HKLM-x32\...\Run: [Avira SystrayStartTrigger] => C:\Program Files (x86)\Avira\Launcher\Avira.SystrayStartTrigger.exe [63432 2017-03-09] (Avira Operations GmbH & Co. KG)
HKLM-x32\...\Run: [RIMBBLaunchAgent.exe] => C:\Program Files (x86)\Common Files\Research In Motion\USB Drivers\RIMBBLaunchAgent.exe [443640 2014-10-31] (BlackBerry Limited)
HKLM-x32\...\Run: [RIM PeerManager] => C:\Program Files (x86)\Common Files\Research In Motion\Tunnel Manager\PeerManager.exe [4730616 2015-05-26] (BlackBerry Limited)
Winlogon\Notify\igfxcui: C:\Windows\system32\igfxdev.dll (Intel Corporation)
HKU\S-1-5-21-3455811494-3201091269-2129086357-1000\...\Run: [GoogleChromeAutoLaunch_3C13D6FD3AC52ECDF6F1A6C02C137E1A] => C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe [851064 2017-04-07] (Vivaldi Technologies AS)
HKU\S-1-5-21-3455811494-3201091269-2129086357-1000\...\MountPoints2: {38b2e01f-1c7c-11e3-a18e-d067e502f425} - G:\AutoRun.exe
HKU\S-1-5-21-3455811494-3201091269-2129086357-1000\...\MountPoints2: {84e15aa1-1bb3-11e3-bf79-d067e502f425} - G:\AutoRun.exe
HKU\S-1-5-21-3455811494-3201091269-2129086357-1000\...\MountPoints2: {84e15aad-1bb3-11e3-bf79-d067e502f425} - G:\AutoRun.exe
Startup: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\The Proxomitron.lnk [2011-09-16]
ShortcutTarget: The Proxomitron.lnk -> C:\Program Files (x86)\Proxomitron Naoko-4\Proxomitron.exe (Groom-A-Zebu (tm)  )
Startup: C:\Users\Philipp\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.lnk [2017-04-14]
ShortcutTarget: Telegram.lnk -> C:\Users\Philipp\AppData\Roaming\Telegram Desktop\Telegram.exe (Telegram Messenger LLP)

==================== Internet (Nicht auf der Ausnahmeliste) ====================

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird der Eintrag entfernt oder auf den Standardwert zurückgesetzt, wenn es sich um einen Registryeintrag handelt.)

Tcpip\Parameters: [DhcpNameServer] 192.168.178.1
Tcpip\..\Interfaces\{0AD71848-FD2A-4331-B69C-1AAEFEBA4E24}: [DhcpNameServer] 192.168.178.1
Tcpip\..\Interfaces\{705424B9-6759-4A35-8829-9251D5B87DC4}: [DhcpNameServer] 192.168.178.1
Tcpip\..\Interfaces\{97393977-B140-4A1D-BB17-64E38DF4E81E}: [DhcpNameServer] 192.168.178.1
Tcpip\..\Interfaces\{F78DDDEC-CFF3-4366-9DDB-D54CD46D6C00}: [DhcpNameServer] 192.168.178.1

Internet Explorer:
==================
HKU\S-1-5-21-3455811494-3201091269-2129086357-1000\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://www.google.de/
HKU\S-1-5-21-3455811494-3201091269-2129086357-1000\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://g.uk.msn.com/USCON/8
URLSearchHook: HKU\S-1-5-21-3455811494-3201091269-2129086357-1000 - (Kein Name) - {c840e246-6b95-475e-9bd7-caa1c7eca9f2} - Keine Datei
SearchScopes: HKLM -> DefaultScope {49606DC7-976D-4030-A74E-9FB5C842FA68} URL = hxxp://www.bing.com/search?q={searchTerms}&form=DLCDF8&pc=MDDC&src=IE-SearchBox
SearchScopes: HKLM -> {49606DC7-976D-4030-A74E-9FB5C842FA68} URL = hxxp://www.bing.com/search?q={searchTerms}&form=DLCDF8&pc=MDDC&src=IE-SearchBox
SearchScopes: HKLM-x32 -> DefaultScope {49606DC7-976D-4030-A74E-9FB5C842FA68} URL = hxxp://www.bing.com/search?q={searchTerms}&form=DLCDF8&pc=MDDC&src=IE-SearchBox
SearchScopes: HKLM-x32 -> {49606DC7-976D-4030-A74E-9FB5C842FA68} URL = hxxp://www.bing.com/search?q={searchTerms}&form=DLCDF8&pc=MDDC&src=IE-SearchBox
SearchScopes: HKLM-x32 -> {afdbddaa-5d3f-42ee-b79c-185a7020515b} URL = hxxp://search.conduit.com/ResultsExt.aspx?q={searchTerms}&SearchSource=4&ctid=CT2851647
SearchScopes: HKU\S-1-5-21-3455811494-3201091269-2129086357-1000 -> DefaultScope {49606DC7-976D-4030-A74E-9FB5C842FA68} URL = 
SearchScopes: HKU\S-1-5-21-3455811494-3201091269-2129086357-1000 -> {49606DC7-976D-4030-A74E-9FB5C842FA68} URL = 
SearchScopes: HKU\S-1-5-21-3455811494-3201091269-2129086357-1000 -> {FFEBBF0A-C22C-4172-89FF-45215A135AC7} URL = hxxp://go.mail.ru/search?q={searchTerms}&utf8in=1&fr=ietb
BHO: Java(tm) Plug-In SSV Helper -> {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} -> C:\Program Files\Java\jre7\bin\ssv.dll [2014-06-01] (Oracle Corporation)
BHO: Windows Live ID Sign-in Helper -> {9030D464-4C02-4ABF-8ECC-5164760863C6} -> C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll [2010-09-21] (Microsoft Corp.)
BHO: Office Document Cache Handler -> {B4F3A835-0E21-4959-BA22-42B3008E02FF} -> C:\Program Files\Microsoft Office\Office14\URLREDIR.DLL [2013-03-06] (Microsoft Corporation)
BHO: Java(tm) Plug-In 2 SSV Helper -> {DBC80044-A445-435b-BC74-9C25C1C588A9} -> C:\Program Files\Java\jre7\bin\jp2ssv.dll [2014-06-01] (Oracle Corporation)
BHO-x32: Java(tm) Plug-In SSV Helper -> {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} -> C:\Program Files (x86)\Java\jre7\bin\ssv.dll [2013-06-25] (Oracle Corporation)
BHO-x32: Windows Live ID-Anmelde-Hilfsprogramm -> {9030D464-4C02-4ABF-8ECC-5164760863C6} -> C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll [2010-09-21] (Microsoft Corp.)
BHO-x32: Office Document Cache Handler -> {B4F3A835-0E21-4959-BA22-42B3008E02FF} -> C:\Program Files (x86)\Microsoft Office\Office14\URLREDIR.DLL [2013-03-06] (Microsoft Corporation)
BHO-x32: AviraBrowserSafety.BrowserSafety -> {c3c77255-42c0-499f-b664-6e981a0b1647} -> C:\Windows\system32\mscoree.dll [2010-11-21] (Microsoft Corporation)
BHO-x32: Java(tm) Plug-In 2 SSV Helper -> {DBC80044-A445-435b-BC74-9C25C1C588A9} -> C:\Program Files (x86)\Java\jre7\bin\jp2ssv.dll [2013-06-25] (Oracle Corporation)
Handler-x32: abs - {E00957BD-D0E1-4eb9-A025-7743FDC8B27B} - C:\Windows\system32\mscoree.dll [2010-11-21] (Microsoft Corporation)
Handler-x32: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\Program Files (x86)\Common Files\Skype\Skype4COM.dll [2017-01-01] (Skype Technologies)

FireFox:
========
FF ProfilePath: C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\lzk71ppa.default-1454532706038 [2017-04-16]
FF Extension: (crowd_bar) - C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\lzk71ppa.default-1454532706038\Extensions\jid1-XGbYhwCViPEOUQ@jetpack.xpi [2016-11-12]
FF Extension: (Disable Prefetch) - C:\Users\Philipp\AppData\Roaming\Mozilla\Firefox\Profiles\lzk71ppa.default-1454532706038\features\{3a1ce062-c816-4574-b9e1-a4cdbf9e7b0b}\disable-prefetch@mozilla.org.xpi [2017-04-10]
FF ProfilePath: C:\Users\Philipp\AppData\Roaming\Greyfirst\Celtx\Profiles\o0ktb274.default [2012-12-05]
FF Extension: (Timezone Definitions for Mozilla Calendar) - C:\Program Files (x86)\Celtx\extensions\calendar-timezones@mozilla.org [2012-10-24] [ist nicht signiert]
FF Extension: (Default Shot Palette) - C:\Program Files (x86)\Celtx\extensions\default-palette@celtx.com [2012-10-24] [ist nicht signiert]
FF Extension: (DOM Inspector) - C:\Program Files (x86)\Celtx\extensions\inspector@mozilla.org [2012-10-24] [ist nicht signiert]
FF Extension: (Java Console) - C:\Program Files (x86)\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0033-ABCDEFFEDCBA} [2016-12-10] [ist nicht signiert]
FF Extension: (Java Console) - C:\Program Files (x86)\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0035-ABCDEFFEDCBA} [2016-12-10] [ist nicht signiert]
FF Extension: (Java Console) - C:\Program Files (x86)\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0037-ABCDEFFEDCBA} [2016-12-10] [ist nicht signiert]
FF Extension: (Site Deployment Checker) - C:\Program Files (x86)\Mozilla Firefox\browser\features\deployment-checker@mozilla.org.xpi [2017-04-11] [ist nicht signiert]
FF Plugin: @adobe.com/FlashPlayer -> C:\Windows\system32\Macromed\Flash\NPSWF64_25_0_0_148.dll [2017-04-13] ()
FF Plugin: @java.com/DTPlugin,version=10.60.2 -> C:\Program Files\Java\jre7\bin\dtplugin\npDeployJava1.dll [2014-06-01] (Oracle Corporation)
FF Plugin: @java.com/JavaPlugin,version=10.60.2 -> C:\Program Files\Java\jre7\bin\plugin2\npjp2.dll [2014-06-01] (Oracle Corporation)
FF Plugin: @microsoft.com/GENUINE -> disabled [Keine Datei]
FF Plugin: @Microsoft.com/NpCtrl,version=1.0 -> C:\Program Files\Microsoft Silverlight\5.1.50906.0\npctrl.dll [2017-03-09] ( Microsoft Corporation)
FF Plugin: @microsoft.com/OfficeAuthz,version=14.0 -> C:\PROGRA~1\MICROS~2\Office14\NPAUTHZ.DLL [2010-01-09] (Microsoft Corporation)
FF Plugin-x32: @adobe.com/FlashPlayer -> C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_25_0_0_148.dll [2017-04-13] ()
FF Plugin-x32: @adobe.com/ShockwavePlayer -> C:\Windows\SysWOW64\Adobe\Director\np32dsw_1168638.dll [2012-10-04] (Adobe Systems, Inc.)
FF Plugin-x32: @java.com/DTPlugin,version=10.25.2 -> C:\Windows\SysWOW64\npDeployJava1.dll [2013-06-25] (Oracle Corporation)
FF Plugin-x32: @java.com/JavaPlugin,version=10.25.2 -> C:\Program Files (x86)\Java\jre7\bin\plugin2\npjp2.dll [2013-06-25] (Oracle Corporation)
FF Plugin-x32: @microsoft.com/GENUINE -> disabled [Keine Datei]
FF Plugin-x32: @Microsoft.com/NpCtrl,version=1.0 -> C:\Program Files (x86)\Microsoft Silverlight\5.1.50906.0\npctrl.dll [2017-03-09] ( Microsoft Corporation)
FF Plugin-x32: @microsoft.com/OfficeAuthz,version=14.0 -> C:\PROGRA~2\MICROS~1\Office14\NPAUTHZ.DLL [2010-01-09] (Microsoft Corporation)
FF Plugin-x32: @microsoft.com/SharePoint,version=14.0 -> C:\PROGRA~2\MICROS~1\Office14\NPSPWRAP.DLL [2010-03-24] (Microsoft Corporation)
FF Plugin-x32: @microsoft.com/WLPG,version=15.4.3502.0922 -> C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll [2010-11-10] (Microsoft Corporation)
FF Plugin-x32: @microsoft.com/WLPG,version=15.4.3508.1109 -> C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll [2010-11-10] (Microsoft Corporation)
FF Plugin-x32: @RIM.com/WebSLLauncher,version=1.0 -> C:\Program Files (x86)\Common Files\Research In Motion\BBWebSLLauncher\NPWebSLLauncher.dll [2015-05-22] ()
FF Plugin-x32: Adobe Reader -> C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\nppdf32.dll [2017-04-05] (Adobe Systems Inc.)
FF Plugin HKU\S-1-5-21-3455811494-3201091269-2129086357-1000: SkypePlugin -> C:\Users\Philipp\AppData\Local\SkypePlugin\7.18.0.51\npGatewayNpapi.dll [2016-04-25] (Skype Technologies S.A.)
FF Plugin HKU\S-1-5-21-3455811494-3201091269-2129086357-1000: SkypePlugin64 -> C:\Users\Philipp\AppData\Local\SkypePlugin\7.18.0.51\npGatewayNpapi-x64.dll [2016-04-25] (Skype Technologies S.A.)
FF Plugin ProgramFiles/Appdata: C:\Program Files (x86)\mozilla firefox\plugins\nppdf32.dll [2017-04-05] (Adobe Systems Inc.)
FF Plugin ProgramFiles/Appdata: C:\Program Files (x86)\mozilla firefox\plugins\npwachk.dll [2012-06-28] (Nullsoft, Inc.)

Chrome: 
=======
CHR HKLM\...\Chrome\Extension: [flliilndjeohchalpbbcdekjklbdgfkk] - hxxps://clients2.google.com/service/update2/crx
CHR HKLM-x32\...\Chrome\Extension: [flliilndjeohchalpbbcdekjklbdgfkk] - hxxps://clients2.google.com/service/update2/crx
CHR HKLM-x32\...\Chrome\Extension: [pnbbffeddnekkhjmokkhdebbfbibbflc] - C:\Program Files (x86)\LyricsPal\128.crx <nicht gefunden>

==================== Dienste (Nicht auf der Ausnahmeliste) ====================

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.)

S2 AntiVirMailService; C:\Program Files (x86)\Avira\AntiVir Desktop\avmailc7.exe [1115552 2017-03-22] (Avira Operations GmbH & Co. KG)
R2 AntiVirSchedulerService; C:\Program Files (x86)\Avira\AntiVir Desktop\sched.exe [487432 2017-03-22] (Avira Operations GmbH & Co. KG)
R2 AntiVirService; C:\Program Files (x86)\Avira\AntiVir Desktop\avguard.exe [487432 2017-03-22] (Avira Operations GmbH & Co. KG)
S2 AntiVirWebService; C:\Program Files (x86)\Avira\AntiVir Desktop\avwebg7.exe [1519136 2017-03-22] (Avira Operations GmbH & Co. KG)
R2 Avira.ServiceHost; C:\Program Files (x86)\Avira\Launcher\Avira.ServiceHost.exe [349560 2017-03-09] (Avira Operations GmbH & Co. KG)
R2 AviraPhantomVPN; C:\Program Files (x86)\Avira\VPN\Avira.VpnService.exe [316976 2017-03-20] (Avira Operations GmbH & Co. KG)
R3 BlackBerry Device Manager; C:\Program Files (x86)\Common Files\Research In Motion\USB Drivers\BbDevMgr.exe [588024 2014-10-31] (BlackBerry Limited)
S2 DellDataVault; C:\Program Files\Dell\DellDataVault\DellDataVault.exe [2552528 2015-01-30] (Dell Inc.)
R2 RIM MDNS; C:\Program Files (x86)\Common Files\Research In Motion\Tunnel Manager\mDNSResponder.exe [396024 2015-05-26] (Apple Inc.)
R2 RIM Tunnel Service; C:\Program Files (x86)\Common Files\Research In Motion\Tunnel Manager\tunmgr.exe [1355000 2015-05-26] (BlackBerry Limited)
R2 TGCM_ImportWiFiSvc; C:\Program Files (x86)\o2\Mobile Connection Manager\ImpWiFiSvc.exe [200624 2010-09-29] (Telefónica I+D)
S3 WinDefend; C:\Program Files\Windows Defender\mpsvc.dll [1011712 2013-05-27] (Microsoft Corporation)

===================== Treiber (Nicht auf der Ausnahmeliste) ======================

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.)

R2 avgntflt; C:\Windows\System32\DRIVERS\avgntflt.sys [176968 2017-03-22] (Avira Operations GmbH & Co. KG)
R1 avipbb; C:\Windows\System32\DRIVERS\avipbb.sys [148104 2017-03-22] (Avira Operations GmbH & Co. KG)
R1 avkmgr; C:\Windows\System32\DRIVERS\avkmgr.sys [35328 2017-03-22] (Avira Operations GmbH & Co. KG)
R2 avnetflt; C:\Windows\System32\DRIVERS\avnetflt.sys [78600 2017-03-22] (Avira Operations GmbH & Co. KG)
R3 CMUACWO; C:\Windows\System32\DRIVERS\CMUACWO.sys [617984 2014-12-29] (C-Media Inc.)
S3 DDDriver; C:\Windows\System32\drivers\DDDriver64Dcsa.sys [23760 2015-01-30] (Dell Computer Corporation)
S3 DellProf; C:\Windows\System32\drivers\DellProf.sys [23312 2015-01-30] (Dell Computer Corporation)
S3 ewusbnet; C:\Windows\System32\DRIVERS\ewusbnet.sys [256000 2010-08-31] (Huawei Technologies Co., Ltd.)
R3 rimvndis; C:\Windows\System32\Drivers\rimvndis6_AMD64.sys [18432 2015-05-26] (BlackBerry Limited)
R3 RimVSerPort; C:\Windows\System32\DRIVERS\RimSerial_AMD64.sys [44544 2012-12-10] (Research in Motion Ltd)
S3 RTL8187B; C:\Windows\System32\DRIVERS\RTL8187B.sys [416768 2009-06-10] (Realtek Semiconductor Corporation                           )
S3 SNPSTD3; C:\Windows\System32\DRIVERS\snpstd3.sys [10916352 2009-07-03] (Sonix Co. Ltd.)
S3 SNPSTD3; C:\Windows\SysWOW64\DRIVERS\snpstd3.sys [10526464 2009-07-03] (Sonix Co. Ltd.)

==================== NetSvcs (Nicht auf der Ausnahmeliste) ===================

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.)


==================== Ein Monat: Erstellte Dateien und Ordner ========

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird die Datei/der Ordner verschoben.)

2017-04-19 13:55 - 2017-04-19 13:57 - 00018999 _____ C:\Users\Philipp\Desktop\FRST.txt
2017-04-19 13:54 - 2017-04-19 13:55 - 00000000 ____D C:\FRST
2017-04-19 13:52 - 2017-04-19 13:52 - 02424832 _____ (Farbar) C:\Users\Philipp\Desktop\FRST64.exe
2017-04-16 18:20 - 2017-04-16 18:24 - 00000000 ____D C:\Users\Philipp\Desktop\photoshoot
2017-04-15 20:43 - 2017-04-15 20:43 - 00172840 _____ C:\Users\Philipp\Desktop\verbs.pdf
2017-04-14 09:43 - 2017-04-14 09:43 - 00014423 _____ C:\Users\Philipp\Downloads\Kendrick Lamar - DAMN. - 2017 (WEB - FLAC - Lossless)-816718.torrent
2017-04-14 09:08 - 2017-04-19 06:33 - 00000000 ____D C:\Users\Philipp\AppData\Roaming\Telegram Desktop
2017-04-14 09:08 - 2017-04-14 09:08 - 00000999 _____ C:\Users\Philipp\Desktop\Telegram.lnk
2017-04-14 09:08 - 2017-04-14 09:08 - 00000000 ____D C:\Users\Philipp\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Telegram Desktop
2017-04-13 19:51 - 2017-03-27 19:13 - 00394448 _____ (Microsoft Corporation) C:\Windows\system32\iedkcs32.dll
2017-04-13 19:51 - 2017-03-27 18:28 - 00346320 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iedkcs32.dll
2017-04-13 19:51 - 2017-03-25 20:39 - 20284416 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll
2017-04-13 19:51 - 2017-03-25 20:07 - 04604416 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9.dll
2017-04-13 19:51 - 2017-03-25 20:06 - 13654016 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieframe.dll
2017-04-13 19:51 - 2017-03-25 19:55 - 02767360 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wininet.dll
2017-04-13 19:51 - 2017-03-25 19:52 - 02289152 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iertutil.dll
2017-04-13 19:51 - 2017-03-25 19:51 - 01313280 _____ (Microsoft Corporation) C:\Windows\SysWOW64\urlmon.dll
2017-04-13 19:51 - 2017-03-25 19:48 - 00499200 _____ (Microsoft Corporation) C:\Windows\SysWOW64\vbscript.dll
2017-04-13 19:51 - 2017-03-25 19:47 - 02055680 _____ (Microsoft Corporation) C:\Windows\SysWOW64\inetcpl.cpl
2017-04-13 19:51 - 2017-03-25 19:47 - 00710144 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieapfltr.dll
2017-04-13 19:51 - 2017-03-25 19:47 - 00047616 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieetwproxystub.dll
2017-04-13 19:51 - 2017-03-25 19:46 - 00693248 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msfeeds.dll
2017-04-13 19:51 - 2017-03-25 19:46 - 00663552 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript.dll
2017-04-13 19:51 - 2017-03-25 19:46 - 00620032 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9diag.dll
2017-04-13 19:51 - 2017-03-25 19:46 - 00230400 _____ (Microsoft Corporation) C:\Windows\SysWOW64\webcheck.dll
2017-04-13 19:51 - 2017-03-25 19:46 - 00168960 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msrating.dll
2017-04-13 19:51 - 2017-03-25 19:46 - 00130048 _____ (Microsoft Corporation) C:\Windows\SysWOW64\occache.dll
2017-04-13 19:51 - 2017-03-25 19:46 - 00047104 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jsproxy.dll
2017-04-13 19:51 - 2017-03-25 19:45 - 00416256 _____ (Microsoft Corporation) C:\Windows\SysWOW64\dxtmsft.dll
2017-04-13 19:51 - 2017-03-25 19:45 - 00279040 _____ (Microsoft Corporation) C:\Windows\SysWOW64\dxtrans.dll
2017-04-13 19:51 - 2017-03-25 19:45 - 00115712 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieUnatt.exe
2017-04-13 19:51 - 2017-03-25 19:45 - 00091136 _____ (Microsoft Corporation) C:\Windows\SysWOW64\inseng.dll
2017-04-13 19:51 - 2017-03-25 19:44 - 00076288 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtmled.dll
2017-04-13 19:51 - 2017-03-25 19:16 - 00066560 _____ (Microsoft Corporation) C:\Windows\system32\iesetup.dll
2017-04-13 19:51 - 2017-03-25 19:14 - 00417792 _____ (Microsoft Corporation) C:\Windows\system32\html.iec
2017-04-13 19:51 - 2017-03-25 19:14 - 00048640 _____ (Microsoft Corporation) C:\Windows\system32\ieetwproxystub.dll
2017-04-13 19:51 - 2017-03-25 19:13 - 00576512 _____ (Microsoft Corporation) C:\Windows\system32\vbscript.dll
2017-04-13 19:51 - 2017-03-25 19:13 - 00088064 _____ (Microsoft Corporation) C:\Windows\system32\MshtmlDac.dll
2017-04-13 19:51 - 2017-03-25 19:10 - 02898432 _____ (Microsoft Corporation) C:\Windows\system32\iertutil.dll
2017-04-13 19:51 - 2017-03-25 19:04 - 00054784 _____ (Microsoft Corporation) C:\Windows\system32\jsproxy.dll
2017-04-13 19:51 - 2017-03-25 19:02 - 00034304 _____ (Microsoft Corporation) C:\Windows\system32\iernonce.dll
2017-04-13 19:51 - 2017-03-25 18:57 - 00615936 _____ (Microsoft Corporation) C:\Windows\system32\ieui.dll
2017-04-13 19:51 - 2017-03-25 18:56 - 00817664 _____ (Microsoft Corporation) C:\Windows\system32\jscript.dll
2017-04-13 19:51 - 2017-03-25 18:56 - 00814080 _____ (Microsoft Corporation) C:\Windows\system32\jscript9diag.dll
2017-04-13 19:51 - 2017-03-25 18:56 - 00144384 _____ (Microsoft Corporation) C:\Windows\system32\ieUnatt.exe
2017-04-13 19:51 - 2017-03-25 18:56 - 00114688 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollector.exe
2017-04-13 19:51 - 2017-03-25 18:52 - 25746944 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2017-04-13 19:51 - 2017-03-25 18:45 - 00968704 _____ (Microsoft Corporation) C:\Windows\system32\MsSpellCheckingFacility.exe
2017-04-13 19:51 - 2017-03-25 18:41 - 06045696 _____ (Microsoft Corporation) C:\Windows\system32\jscript9.dll
2017-04-13 19:51 - 2017-03-25 18:41 - 00489984 _____ (Microsoft Corporation) C:\Windows\system32\dxtmsft.dll
2017-04-13 19:51 - 2017-03-25 18:30 - 00077824 _____ (Microsoft Corporation) C:\Windows\system32\JavaScriptCollectionAgent.dll
2017-04-13 19:51 - 2017-03-25 18:29 - 00107520 _____ (Microsoft Corporation) C:\Windows\system32\inseng.dll
2017-04-13 19:51 - 2017-03-25 18:24 - 00199680 _____ (Microsoft Corporation) C:\Windows\system32\msrating.dll
2017-04-13 19:51 - 2017-03-25 18:23 - 00092160 _____ (Microsoft Corporation) C:\Windows\system32\mshtmled.dll
2017-04-13 19:51 - 2017-03-25 18:20 - 00315392 _____ (Microsoft Corporation) C:\Windows\system32\dxtrans.dll
2017-04-13 19:51 - 2017-03-25 18:19 - 00341504 _____ (Microsoft Corporation) C:\Windows\SysWOW64\html.iec
2017-04-13 19:51 - 2017-03-25 18:17 - 00152064 _____ (Microsoft Corporation) C:\Windows\system32\occache.dll
2017-04-13 19:51 - 2017-03-25 18:06 - 00476160 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieui.dll
2017-04-13 19:51 - 2017-03-25 18:04 - 00262144 _____ (Microsoft Corporation) C:\Windows\system32\webcheck.dll
2017-04-13 19:51 - 2017-03-25 18:00 - 00725504 _____ (Microsoft Corporation) C:\Windows\system32\ie4uinit.exe
2017-04-13 19:51 - 2017-03-25 17:59 - 00806912 _____ (Microsoft Corporation) C:\Windows\system32\msfeeds.dll
2017-04-13 19:51 - 2017-03-25 17:57 - 02131456 _____ (Microsoft Corporation) C:\Windows\system32\inetcpl.cpl
2017-04-13 19:51 - 2017-03-25 17:57 - 01359360 _____ (Microsoft Corporation) C:\Windows\system32\mshtmlmedia.dll
2017-04-13 19:51 - 2017-03-25 17:28 - 15259136 _____ (Microsoft Corporation) C:\Windows\system32\ieframe.dll
2017-04-13 19:51 - 2017-03-25 17:27 - 01155072 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtmlmedia.dll
2017-04-13 19:51 - 2017-03-25 17:24 - 03241472 _____ (Microsoft Corporation) C:\Windows\system32\wininet.dll
2017-04-13 19:51 - 2017-03-25 17:10 - 01546240 _____ (Microsoft Corporation) C:\Windows\system32\urlmon.dll
2017-04-13 19:51 - 2017-03-25 17:01 - 00800768 _____ (Microsoft Corporation) C:\Windows\system32\ieapfltr.dll
2017-04-13 19:51 - 2017-03-24 23:50 - 00405504 _____ (Microsoft Corporation) C:\Windows\system32\gdi32.dll
2017-04-13 19:51 - 2017-03-24 23:42 - 00313344 _____ (Microsoft Corporation) C:\Windows\SysWOW64\gdi32.dll
2017-04-13 19:51 - 2017-03-22 16:32 - 03165184 _____ (Microsoft Corporation) C:\Windows\system32\wucltux.dll
2017-04-13 19:51 - 2017-03-22 16:32 - 00192512 _____ (Microsoft Corporation) C:\Windows\system32\wuwebv.dll
2017-04-13 19:51 - 2017-03-22 16:32 - 00098816 _____ (Microsoft Corporation) C:\Windows\system32\wudriver.dll
2017-04-13 19:51 - 2017-03-22 16:30 - 00091136 _____ (Microsoft Corporation) C:\Windows\system32\WinSetupUI.dll
2017-04-13 19:51 - 2017-03-22 16:24 - 00174080 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wuwebv.dll
2017-04-13 19:51 - 2017-03-22 16:17 - 02651136 _____ (Microsoft Corporation) C:\Windows\system32\wuaueng.dll
2017-04-13 19:51 - 2017-03-22 16:15 - 00709120 _____ (Microsoft Corporation) C:\Windows\system32\wuapi.dll
2017-04-13 19:51 - 2017-03-22 16:15 - 00140288 _____ (Microsoft Corporation) C:\Windows\system32\wuauclt.exe
2017-04-13 19:51 - 2017-03-22 16:15 - 00037888 _____ (Microsoft Corporation) C:\Windows\system32\wups2.dll
2017-04-13 19:51 - 2017-03-22 16:15 - 00037888 _____ (Microsoft Corporation) C:\Windows\system32\wuapp.exe
2017-04-13 19:51 - 2017-03-22 16:15 - 00036864 _____ (Microsoft Corporation) C:\Windows\system32\wups.dll
2017-04-13 19:51 - 2017-03-22 16:15 - 00012288 _____ (Microsoft Corporation) C:\Windows\system32\wu.upgrade.ps.dll
2017-04-13 19:51 - 2017-03-22 16:05 - 00573440 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wuapi.dll
2017-04-13 19:51 - 2017-03-22 16:05 - 00093696 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wudriver.dll
2017-04-13 19:51 - 2017-03-22 16:05 - 00035328 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wuapp.exe
2017-04-13 19:51 - 2017-03-22 16:05 - 00030208 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wups.dll
2017-04-13 19:51 - 2017-03-14 16:34 - 00986344 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\dxgkrnl.sys
2017-04-13 19:51 - 2017-03-14 16:34 - 00265448 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\dxgmms1.sys
2017-04-13 19:51 - 2017-03-14 16:30 - 00144384 _____ (Microsoft Corporation) C:\Windows\system32\cdd.dll
2017-04-13 19:51 - 2017-03-10 17:35 - 00382696 _____ (Adobe Systems Incorporated) C:\Windows\system32\atmfd.dll
2017-04-13 19:51 - 2017-03-10 17:31 - 00041472 _____ (Microsoft Corporation) C:\Windows\system32\lpk.dll
2017-04-13 19:51 - 2017-03-10 17:27 - 00308456 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\atmfd.dll
2017-04-13 19:51 - 2017-03-10 17:00 - 03219968 _____ (Microsoft Corporation) C:\Windows\system32\win32k.sys
2017-04-13 19:51 - 2017-03-08 21:20 - 01133568 _____ (Microsoft Corporation) C:\Windows\system32\cdosys.dll
2017-04-13 19:51 - 2017-03-08 21:10 - 00805376 _____ (Microsoft Corporation) C:\Windows\SysWOW64\cdosys.dll
2017-04-13 19:51 - 2017-03-08 05:37 - 00631176 _____ (Microsoft Corporation) C:\Windows\system32\winresume.efi
2017-04-13 19:51 - 2017-03-08 05:36 - 05548264 _____ (Microsoft Corporation) C:\Windows\system32\ntoskrnl.exe
2017-04-13 19:51 - 2017-03-08 05:36 - 00706792 _____ (Microsoft Corporation) C:\Windows\system32\winload.efi
2017-04-13 19:51 - 2017-03-08 05:36 - 00154856 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\ksecpkg.sys
2017-04-13 19:51 - 2017-03-08 05:36 - 00095464 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\ksecdd.sys
2017-04-13 19:51 - 2017-03-08 05:34 - 01732864 _____ (Microsoft Corporation) C:\Windows\system32\ntdll.dll
2017-04-13 19:51 - 2017-03-08 05:33 - 02064384 _____ (Microsoft Corporation) C:\Windows\system32\ole32.dll
2017-04-13 19:51 - 2017-03-08 05:33 - 01460736 _____ (Microsoft Corporation) C:\Windows\system32\lsasrv.dll
2017-04-13 19:51 - 2017-03-08 05:33 - 01212928 _____ (Microsoft Corporation) C:\Windows\system32\rpcrt4.dll
2017-04-13 19:51 - 2017-03-08 05:33 - 01163264 _____ (Microsoft Corporation) C:\Windows\system32\kernel32.dll
2017-04-13 19:51 - 2017-03-08 05:33 - 00880640 _____ (Microsoft Corporation) C:\Windows\system32\advapi32.dll
2017-04-13 19:51 - 2017-03-08 05:33 - 00730624 _____ (Microsoft Corporation) C:\Windows\system32\kerberos.dll
2017-04-13 19:51 - 2017-03-08 05:33 - 00503808 _____ (Microsoft Corporation) C:\Windows\system32\srcore.dll
2017-04-13 19:51 - 2017-03-08 05:33 - 00463872 _____ (Microsoft Corporation) C:\Windows\system32\certcli.dll
2017-04-13 19:51 - 2017-03-08 05:33 - 00419840 _____ (Microsoft Corporation) C:\Windows\system32\KernelBase.dll
2017-04-13 19:51 - 2017-03-08 05:33 - 00362496 _____ (Microsoft Corporation) C:\Windows\system32\wow64win.dll
2017-04-13 19:51 - 2017-03-08 05:33 - 00345600 _____ (Microsoft Corporation) C:\Windows\system32\schannel.dll
2017-04-13 19:51 - 2017-03-08 05:33 - 00316928 _____ (Microsoft Corporation) C:\Windows\system32\msv1_0.dll
2017-04-13 19:51 - 2017-03-08 05:33 - 00312320 _____ (Microsoft Corporation) C:\Windows\system32\ncrypt.dll
2017-04-13 19:51 - 2017-03-08 05:33 - 00243712 _____ (Microsoft Corporation) C:\Windows\system32\wow64.dll
2017-04-13 19:51 - 2017-03-08 05:33 - 00215552 _____ (Microsoft Corporation) C:\Windows\system32\winsrv.dll
2017-04-13 19:51 - 2017-03-08 05:33 - 00210432 _____ (Microsoft Corporation) C:\Windows\system32\wdigest.dll
2017-04-13 19:51 - 2017-03-08 05:33 - 00190464 _____ (Microsoft Corporation) C:\Windows\system32\rpchttp.dll
2017-04-13 19:51 - 2017-03-08 05:33 - 00135680 _____ (Microsoft Corporation) C:\Windows\system32\sspicli.dll
2017-04-13 19:51 - 2017-03-08 05:33 - 00123904 _____ (Microsoft Corporation) C:\Windows\system32\bcrypt.dll
2017-04-13 19:51 - 2017-03-08 05:33 - 00086528 _____ (Microsoft Corporation) C:\Windows\system32\TSpkg.dll
2017-04-13 19:51 - 2017-03-08 05:33 - 00050176 _____ (Microsoft Corporation) C:\Windows\system32\srclient.dll
2017-04-13 19:51 - 2017-03-08 05:33 - 00044032 _____ (Microsoft Corporation) C:\Windows\system32\csrsrv.dll
2017-04-13 19:51 - 2017-03-08 05:33 - 00043520 _____ (Microsoft Corporation) C:\Windows\system32\cryptbase.dll
2017-04-13 19:51 - 2017-03-08 05:26 - 04000488 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ntkrnlpa.exe
2017-04-13 19:51 - 2017-03-08 05:26 - 03945192 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ntoskrnl.exe
2017-04-13 19:51 - 2017-03-08 05:24 - 01314112 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ntdll.dll
2017-04-13 19:51 - 2017-03-08 05:22 - 01416192 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ole32.dll
2017-04-13 19:51 - 2017-03-08 05:22 - 00666112 _____ (Microsoft Corporation) C:\Windows\SysWOW64\rpcrt4.dll
2017-04-13 19:51 - 2017-03-08 05:22 - 00553472 _____ (Microsoft Corporation) C:\Windows\SysWOW64\kerberos.dll
2017-04-13 19:51 - 2017-03-08 05:22 - 00275456 _____ (Microsoft Corporation) C:\Windows\SysWOW64\KernelBase.dll
2017-04-13 19:51 - 2017-03-08 05:22 - 00261120 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msv1_0.dll
2017-04-13 19:51 - 2017-03-08 05:22 - 00254464 _____ (Microsoft Corporation) C:\Windows\SysWOW64\schannel.dll
2017-04-13 19:51 - 2017-03-08 05:22 - 00223232 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ncrypt.dll
2017-04-13 19:51 - 2017-03-08 05:22 - 00172032 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wdigest.dll
2017-04-13 19:51 - 2017-03-08 05:22 - 00096768 _____ (Microsoft Corporation) C:\Windows\SysWOW64\sspicli.dll
2017-04-13 19:51 - 2017-03-08 05:22 - 00043008 _____ (Microsoft Corporation) C:\Windows\SysWOW64\srclient.dll
2017-04-13 19:51 - 2017-03-08 05:21 - 00644096 _____ (Microsoft Corporation) C:\Windows\SysWOW64\advapi32.dll
2017-04-13 19:51 - 2017-03-08 05:21 - 00342528 _____ (Microsoft Corporation) C:\Windows\SysWOW64\certcli.dll
2017-04-13 19:51 - 2017-03-08 05:03 - 00062464 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\appid.sys
2017-04-13 19:51 - 2017-03-08 05:00 - 00338432 _____ (Microsoft Corporation) C:\Windows\system32\conhost.exe
2017-04-13 19:51 - 2017-03-08 04:59 - 00296960 _____ (Microsoft Corporation) C:\Windows\system32\rstrui.exe
2017-04-13 19:51 - 2017-03-08 04:56 - 00291328 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\mrxsmb10.sys
2017-04-13 19:51 - 2017-03-08 04:56 - 00159744 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\mrxsmb.sys
2017-04-13 19:51 - 2017-03-08 04:56 - 00129536 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\mrxsmb20.sys
2017-04-13 19:51 - 2017-03-08 04:55 - 00112640 _____ (Microsoft Corporation) C:\Windows\system32\smss.exe
2017-04-13 19:51 - 2017-03-08 04:55 - 00030720 _____ (Microsoft Corporation) C:\Windows\system32\lsass.exe
2017-04-13 19:51 - 2017-03-07 17:30 - 00085504 _____ (Microsoft Corporation) C:\Windows\system32\asycfilt.dll
2017-04-13 19:51 - 2017-03-07 17:17 - 00067584 _____ (Microsoft Corporation) C:\Windows\SysWOW64\asycfilt.dll
2017-04-13 19:51 - 2017-03-07 15:05 - 00243200 _____ (Microsoft Corporation) C:\Windows\system32\rdpudd.dll
2017-04-13 19:51 - 2017-03-04 02:27 - 01574912 _____ (Microsoft Corporation) C:\Windows\system32\quartz.dll
2017-04-13 19:51 - 2017-03-04 02:27 - 00093696 _____ (Microsoft Corporation) C:\Windows\system32\mfmjpegdec.dll
2017-04-13 19:51 - 2017-03-04 02:14 - 01329664 _____ (Microsoft Corporation) C:\Windows\SysWOW64\quartz.dll
2017-04-13 19:51 - 2017-03-04 02:14 - 00077312 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mfmjpegdec.dll
2017-04-13 19:51 - 2017-02-14 17:33 - 00757248 _____ (Microsoft Corporation) C:\Windows\system32\win32spl.dll
2017-04-13 19:51 - 2017-02-14 17:19 - 00497664 _____ (Microsoft Corporation) C:\Windows\SysWOW64\win32spl.dll
2017-04-13 19:51 - 2017-02-09 17:32 - 00769536 _____ (Microsoft Corporation) C:\Windows\system32\samsrv.dll
2017-04-13 19:51 - 2017-02-09 17:32 - 00106496 _____ (Microsoft Corporation) C:\Windows\system32\samlib.dll
2017-04-13 19:51 - 2017-02-09 17:14 - 00060416 _____ (Microsoft Corporation) C:\Windows\SysWOW64\samlib.dll
2017-04-13 19:51 - 2017-01-18 16:36 - 00994760 _____ (Microsoft Corporation) C:\Windows\system32\ucrtbase.dll
2017-04-13 19:51 - 2017-01-18 16:36 - 00063840 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-private-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:36 - 00020832 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-math-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:36 - 00019808 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-multibyte-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:36 - 00017760 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-string-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:36 - 00017760 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-stdio-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:36 - 00016224 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-runtime-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:36 - 00015712 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-convert-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:36 - 00014176 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-time-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:36 - 00014176 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-localization-l1-2-0.dll
2017-04-13 19:51 - 2017-01-18 16:36 - 00013664 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-filesystem-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:36 - 00012640 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-process-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:36 - 00012640 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-heap-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:36 - 00012640 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-conio-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:36 - 00012128 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-utility-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:36 - 00012128 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-locale-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:36 - 00012128 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-crt-environment-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:36 - 00012128 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-synch-l1-2-0.dll
2017-04-13 19:51 - 2017-01-18 16:36 - 00012128 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-processthreads-l1-1-1.dll
2017-04-13 19:51 - 2017-01-18 16:36 - 00011616 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-xstate-l2-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:36 - 00011616 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-timezone-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:36 - 00011616 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-file-l2-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:36 - 00011608 _____ (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-file-l1-2-0.dll
2017-04-13 19:51 - 2017-01-18 16:35 - 00922432 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ucrtbase.dll
2017-04-13 19:51 - 2017-01-18 16:35 - 00066400 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-private-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:35 - 00022368 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-math-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:35 - 00019808 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-multibyte-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:35 - 00017760 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-string-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:35 - 00017760 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-stdio-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:35 - 00016224 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-runtime-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:35 - 00015712 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-convert-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:35 - 00014176 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-time-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:35 - 00014176 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-localization-l1-2-0.dll
2017-04-13 19:51 - 2017-01-18 16:35 - 00013664 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-filesystem-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:35 - 00012640 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-process-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:35 - 00012640 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-heap-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:35 - 00012640 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-conio-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:35 - 00012128 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-utility-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:35 - 00012128 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-locale-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:35 - 00012128 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-crt-environment-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:35 - 00012128 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-synch-l1-2-0.dll
2017-04-13 19:51 - 2017-01-18 16:35 - 00012128 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-processthreads-l1-1-1.dll
2017-04-13 19:51 - 2017-01-18 16:35 - 00011616 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-xstate-l2-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:35 - 00011616 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-timezone-l1-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:35 - 00011616 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-file-l2-1-0.dll
2017-04-13 19:51 - 2017-01-18 16:35 - 00011616 _____ (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-file-l1-2-0.dll
2017-04-13 19:50 - 2017-03-25 19:46 - 00060416 _____ (Microsoft Corporation) C:\Windows\SysWOW64\JavaScriptCollectionAgent.dll
2017-04-13 19:50 - 2017-03-25 19:45 - 00064000 _____ (Microsoft Corporation) C:\Windows\SysWOW64\MshtmlDac.dll
2017-04-13 19:50 - 2017-03-25 19:45 - 00062464 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iesetup.dll
2017-04-13 19:50 - 2017-03-25 19:45 - 00030720 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iernonce.dll
2017-04-13 19:50 - 2017-03-25 19:44 - 02724864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb
2017-04-13 19:50 - 2017-03-25 19:35 - 02724864 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb
2017-04-13 19:50 - 2017-03-25 19:35 - 00004096 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollectorres.dll
2017-04-13 19:50 - 2017-03-10 17:31 - 00100864 _____ (Microsoft Corporation) C:\Windows\system32\fontsub.dll
2017-04-13 19:50 - 2017-03-10 17:31 - 00046080 _____ (Adobe Systems) C:\Windows\system32\atmlib.dll
2017-04-13 19:50 - 2017-03-10 17:31 - 00014336 _____ (Microsoft Corporation) C:\Windows\system32\dciman32.dll
2017-04-13 19:50 - 2017-03-10 17:20 - 00025600 _____ (Microsoft Corporation) C:\Windows\SysWOW64\lpk.dll
2017-04-13 19:50 - 2017-03-10 17:19 - 00070656 _____ (Microsoft Corporation) C:\Windows\SysWOW64\fontsub.dll
2017-04-13 19:50 - 2017-03-10 17:19 - 00010240 _____ (Microsoft Corporation) C:\Windows\SysWOW64\dciman32.dll
2017-04-13 19:50 - 2017-03-10 16:53 - 00034304 _____ (Adobe Systems) C:\Windows\SysWOW64\atmlib.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00690688 _____ (Microsoft Corporation) C:\Windows\system32\adtschema.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00146432 _____ (Microsoft Corporation) C:\Windows\system32\msaudite.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00063488 _____ (Microsoft Corporation) C:\Windows\system32\setbcdlocale.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00060416 _____ (Microsoft Corporation) C:\Windows\system32\msobjs.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00059904 _____ (Microsoft Corporation) C:\Windows\system32\appidapi.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00034816 _____ (Microsoft Corporation) C:\Windows\system32\appidsvc.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00028672 _____ (Microsoft Corporation) C:\Windows\system32\sspisrv.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00028160 _____ (Microsoft Corporation) C:\Windows\system32\secur32.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00022016 _____ (Microsoft Corporation) C:\Windows\system32\credssp.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00016384 _____ (Microsoft Corporation) C:\Windows\system32\ntvdm64.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00013312 _____ (Microsoft Corporation) C:\Windows\system32\wow64cpu.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00006656 _____ (Microsoft Corporation) C:\Windows\system32\apisetschema.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00006144 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-security-base-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00005120 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-file-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00004608 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-threadpool-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00004608 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-processthreads-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00004096 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-sysinfo-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00004096 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-synch-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00004096 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-localregistry-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00004096 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-localization-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00003584 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-rtlsupport-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00003584 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-processenvironment-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00003584 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-namedpipe-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00003584 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-misc-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00003584 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-memory-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00003584 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-libraryloader-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00003584 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-heap-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-xstate-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-util-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-string-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-profile-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-io-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-interlocked-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-handle-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-fibers-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-errorhandling-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-delayload-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-debug-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-datetime-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:33 - 00003072 ____H (Microsoft Corporation) C:\Windows\system32\api-ms-win-core-console-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:22 - 01114112 _____ (Microsoft Corporation) C:\Windows\SysWOW64\kernel32.dll
2017-04-13 19:50 - 2017-03-08 05:22 - 00146432 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msaudite.dll
2017-04-13 19:50 - 2017-03-08 05:22 - 00141312 _____ (Microsoft Corporation) C:\Windows\SysWOW64\rpchttp.dll
2017-04-13 19:50 - 2017-03-08 05:22 - 00082944 _____ (Microsoft Corporation) C:\Windows\SysWOW64\bcrypt.dll
2017-04-13 19:50 - 2017-03-08 05:22 - 00065536 _____ (Microsoft Corporation) C:\Windows\SysWOW64\TSpkg.dll
2017-04-13 19:50 - 2017-03-08 05:22 - 00060416 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msobjs.dll
2017-04-13 19:50 - 2017-03-08 05:22 - 00022016 _____ (Microsoft Corporation) C:\Windows\SysWOW64\secur32.dll
2017-04-13 19:50 - 2017-03-08 05:22 - 00017408 _____ (Microsoft Corporation) C:\Windows\SysWOW64\credssp.dll
2017-04-13 19:50 - 2017-03-08 05:22 - 00005120 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wow32.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00690688 _____ (Microsoft Corporation) C:\Windows\SysWOW64\adtschema.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00050688 _____ (Microsoft Corporation) C:\Windows\SysWOW64\appidapi.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00006656 _____ (Microsoft Corporation) C:\Windows\SysWOW64\apisetschema.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00005120 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-file-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00004608 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-processthreads-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00004096 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-sysinfo-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00004096 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-synch-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00004096 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-misc-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00004096 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-localregistry-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00004096 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-localization-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00003584 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-processenvironment-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00003584 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-namedpipe-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00003584 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-memory-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00003584 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-libraryloader-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00003584 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-interlocked-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00003584 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-heap-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-string-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-rtlsupport-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-profile-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-io-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-handle-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-fibers-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-errorhandling-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-delayload-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-debug-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-datetime-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:21 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-console-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 05:03 - 00148480 _____ (Microsoft Corporation) C:\Windows\system32\appidpolicyconverter.exe
2017-04-13 19:50 - 2017-03-08 05:03 - 00064000 _____ (Microsoft Corporation) C:\Windows\system32\auditpol.exe
2017-04-13 19:50 - 2017-03-08 05:03 - 00017920 _____ (Microsoft Corporation) C:\Windows\system32\appidcertstorecheck.exe
2017-04-13 19:50 - 2017-03-08 04:57 - 00050176 _____ (Microsoft Corporation) C:\Windows\SysWOW64\auditpol.exe
2017-04-13 19:50 - 2017-03-08 04:54 - 00025600 _____ (Microsoft Corporation) C:\Windows\SysWOW64\setup16.exe
2017-04-13 19:50 - 2017-03-08 04:54 - 00014336 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ntvdm64.dll
2017-04-13 19:50 - 2017-03-08 04:54 - 00007680 _____ (Microsoft Corporation) C:\Windows\SysWOW64\instnm.exe
2017-04-13 19:50 - 2017-03-08 04:54 - 00002048 _____ (Microsoft Corporation) C:\Windows\SysWOW64\user.exe
2017-04-13 19:50 - 2017-03-08 04:53 - 00036352 _____ (Microsoft Corporation) C:\Windows\SysWOW64\cryptbase.dll
2017-04-13 19:50 - 2017-03-08 04:53 - 00006144 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-security-base-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 04:53 - 00004608 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-threadpool-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 04:53 - 00003584 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-xstate-l1-1-0.dll
2017-04-13 19:50 - 2017-03-08 04:53 - 00003072 ____H (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-core-util-l1-1-0.dll
2017-04-13 19:50 - 2017-02-11 17:33 - 00002048 _____ (Microsoft Corporation) C:\Windows\system32\tzres.dll
2017-04-13 19:50 - 2017-02-11 17:16 - 00002048 _____ (Microsoft Corporation) C:\Windows\SysWOW64\tzres.dll
2017-04-13 19:50 - 2016-03-23 23:40 - 03181568 _____ (Microsoft Corporation) C:\Windows\system32\rdpcorets.dll
2017-04-13 19:50 - 2016-03-23 23:40 - 00016384 _____ (Microsoft Corporation) C:\Windows\system32\RdpGroupPolicyExtension.dll
2017-04-09 14:58 - 2017-04-09 15:13 - 00000000 ____D C:\Users\Philipp\Desktop\Q Magazine
2017-04-06 17:36 - 2017-04-06 17:37 - 00013078 _____ C:\Users\Philipp\Downloads\Gorillaz - Let Me Out - 2017 (WEB - FLAC - Lossless)-808031.torrent
2017-03-29 20:21 - 2017-03-29 20:21 - 00019962 _____ C:\Users\Philipp\Downloads\The Beach Boys - Love You - 2015 (WEB - FLAC - Lossless)-86023.torrent
2017-03-29 13:19 - 2017-03-29 13:19 - 00015554 _____ C:\Users\Philipp\Downloads\Black Knights - The Almighty - 2015 (CD - FLAC - Lossless)-10967.torrent
2017-03-28 21:14 - 2017-03-28 21:14 - 00023538 _____ C:\Users\Philipp\Downloads\Stone Temple Pilots - Tiny Music… Songs From the Vatican Gift Shop - 1996 (CD - FLAC - Lossless)-143983.torrent
2017-03-26 10:25 - 2017-03-26 10:25 - 00011426 _____ C:\Users\Philipp\Downloads\John Frusciante - Foregrow EP - 2016 (CD - FLAC - Lossless)-640972.torrent
2017-03-24 19:44 - 2017-03-24 19:45 - 00835013 _____ C:\Users\Philipp\Downloads\trim.18157E59-91AE-4735-BF24-7B035EB3BAF4.MOV
2017-03-23 23:32 - 2017-03-23 23:32 - 00014381 _____ C:\Users\Philipp\Downloads\Gorillaz - Andromeda - 2017 (WEB - FLAC - Lossless)-790214.torrent
2017-03-23 23:32 - 2017-03-23 23:32 - 00012186 _____ C:\Users\Philipp\Downloads\Gorillaz - Ascension - 2017 (WEB - FLAC - Lossless)-790210.torrent
2017-03-23 23:32 - 2017-03-23 23:32 - 00011698 _____ C:\Users\Philipp\Downloads\Gorillaz - We Got the Power - 2017 (WEB - FLAC - Lossless)-790223.torrent
2017-03-23 23:31 - 2017-03-23 23:31 - 00014246 _____ C:\Users\Philipp\Downloads\Gorillaz - Saturnz Barz - 2017 (WEB - FLAC - Lossless)-790219.torrent
2017-03-23 08:51 - 2017-03-23 10:24 - 00000000 ____D C:\Users\Philipp\AppData\Roaming\discord
2017-03-23 08:51 - 2017-03-23 08:51 - 00002180 _____ C:\Users\Philipp\Desktop\Discord.lnk
2017-03-23 08:51 - 2017-03-23 08:51 - 00000000 ____D C:\Users\Philipp\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Hammer & Chisel, Inc
2017-03-23 08:51 - 2017-03-23 08:51 - 00000000 ____D C:\Users\Philipp\AppData\Local\SquirrelTemp
2017-03-23 08:51 - 2017-03-23 08:51 - 00000000 ____D C:\Users\Philipp\AppData\Local\Discord
2017-03-20 19:10 - 2017-03-20 19:10 - 00875712 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msvcr120_clr0400.dll
2017-03-20 19:10 - 2017-03-20 19:10 - 00536776 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msvcp120_clr0400.dll
2017-03-20 19:10 - 2017-03-20 19:10 - 00028352 _____ (Microsoft Corporation) C:\Windows\SysWOW64\aspnet_counters.dll
2017-03-20 19:10 - 2017-03-20 19:10 - 00018088 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msvcr110_clr0400.dll
2017-03-20 19:10 - 2017-03-20 19:10 - 00018088 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msvcr100_clr0400.dll
2017-03-20 19:10 - 2017-03-20 19:10 - 00018088 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msvcp110_clr0400.dll
2017-03-20 18:32 - 2017-03-20 18:32 - 00869576 _____ (Microsoft Corporation) C:\Windows\system32\msvcr120_clr0400.dll
2017-03-20 18:32 - 2017-03-20 18:32 - 00678592 _____ (Microsoft Corporation) C:\Windows\system32\msvcp120_clr0400.dll
2017-03-20 18:32 - 2017-03-20 18:32 - 00029888 _____ (Microsoft Corporation) C:\Windows\system32\aspnet_counters.dll
2017-03-20 18:32 - 2017-03-20 18:32 - 00018088 _____ (Microsoft Corporation) C:\Windows\system32\msvcr110_clr0400.dll
2017-03-20 18:32 - 2017-03-20 18:32 - 00018088 _____ (Microsoft Corporation) C:\Windows\system32\msvcr100_clr0400.dll
2017-03-20 18:32 - 2017-03-20 18:32 - 00018088 _____ (Microsoft Corporation) C:\Windows\system32\msvcp110_clr0400.dll
2017-03-20 09:57 - 2017-03-20 09:57 - 08858165 _____ C:\Users\Philipp\Downloads\trim.4C90439B-9E9C-4209-86A9-04D247AE3FB1.MOV
2017-03-20 09:56 - 2017-03-20 09:56 - 04050181 _____ C:\Users\Philipp\Downloads\trim.CBC6FC2E-0CD1-4709-9584-AB5B1F972B5F.MOV

==================== Ein Monat: Geänderte Dateien und Ordner ========

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird die Datei/der Ordner verschoben.)

2017-04-19 13:52 - 2012-02-22 02:21 - 00000000 ____D C:\Users\Philipp\AppData\Roaming\uTorrent
2017-04-19 13:13 - 2015-03-02 13:19 - 00129752 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2017-04-19 12:32 - 2011-09-16 18:10 - 00000000 ____D C:\Users\Philipp\AppData\Roaming\Skype
2017-04-19 07:35 - 2016-04-25 02:05 - 00000000 ____D C:\Users\Philipp\Downloads\Telegram Desktop
2017-04-19 06:43 - 2009-07-14 05:45 - 00021296 ____H C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2017-04-19 06:43 - 2009-07-14 05:45 - 00021296 ____H C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2017-04-19 06:32 - 2011-09-13 12:00 - 00000000 ____D C:\Windows\de
2017-04-19 06:32 - 2009-07-14 06:08 - 00000006 ____H C:\Windows\Tasks\SA.DAT
2017-04-18 22:04 - 2011-11-09 08:28 - 00003747 _____ C:\Windows\musi.ini
2017-04-18 14:35 - 2013-01-17 11:50 - 00000000 ____D C:\Users\Philipp\AppData\Roaming\ICQM
2017-04-18 14:35 - 2011-09-16 18:01 - 00000000 ____D C:\Program Files (x86)\Conduit
2017-04-17 17:03 - 2011-09-16 17:50 - 00000000 ____D C:\Users\Philipp\AppData\Roaming\Audacity
2017-04-16 23:43 - 2016-12-10 18:15 - 00000000 ____D C:\Users\Philipp\AppData\LocalLow\Mozilla
2017-04-16 10:40 - 2011-09-13 11:33 - 00000000 ____D C:\Windows\SysWOW64\Macromed
2017-04-15 14:22 - 2014-02-12 17:16 - 00000000 ____D C:\Users\Philipp\AppData\Roaming\MPC-HC
2017-04-15 10:58 - 2009-07-14 04:20 - 00000000 ____D C:\Windows\rescache
2017-04-14 09:10 - 2016-07-03 08:46 - 00004366 _____ C:\Windows\System32\Tasks\Adobe Flash Player Updater
2017-04-14 09:10 - 2016-05-16 09:45 - 00004512 _____ C:\Windows\System32\Tasks\Adobe Flash Player PPAPI Notifier
2017-04-14 09:09 - 2012-03-30 11:57 - 00802904 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2017-04-14 09:09 - 2011-10-20 21:51 - 00000000 ____D C:\Windows\system32\Macromed
2017-04-14 09:09 - 2011-09-13 11:33 - 00144472 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
2017-04-14 09:04 - 2010-11-21 07:50 - 00699868 _____ C:\Windows\system32\perfh007.dat
2017-04-14 09:04 - 2010-11-21 07:50 - 00149750 _____ C:\Windows\system32\perfc007.dat
2017-04-14 09:04 - 2009-07-14 06:13 - 01622228 _____ C:\Windows\system32\PerfStringBackup.INI
2017-04-14 09:04 - 2009-07-14 04:20 - 00000000 ____D C:\Windows\inf
2017-04-14 08:55 - 2009-07-14 05:45 - 00344736 _____ C:\Windows\system32\FNTCACHE.DAT
2017-04-14 08:54 - 2013-03-14 00:46 - 00000000 ____D C:\Program Files\Microsoft Silverlight
2017-04-14 08:54 - 2013-03-14 00:46 - 00000000 ____D C:\Program Files (x86)\Microsoft Silverlight
2017-04-13 20:15 - 2013-03-14 00:47 - 00000000 ____D C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Microsoft Silverlight
2017-04-13 20:12 - 2013-08-14 20:45 - 00000000 ____D C:\Windows\system32\MRT
2017-04-13 20:05 - 2015-05-25 14:10 - 00004476 _____ C:\Windows\System32\Tasks\Adobe Acrobat Update Task
2017-04-13 20:03 - 2016-10-24 20:25 - 00002441 _____ C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Acrobat Reader DC.lnk
2017-04-13 20:01 - 2011-09-19 13:20 - 148601744 ____C (Microsoft Corporation) C:\Windows\system32\MRT.exe
2017-04-13 19:56 - 2011-02-11 11:22 - 01595572 _____ C:\Windows\SysWOW64\PerfStringBackup.INI
2017-04-13 19:40 - 2016-04-26 11:39 - 00002138 _____ C:\Users\Philipp\Desktop\Vivaldi.lnk
2017-04-13 19:40 - 2016-04-13 14:49 - 00000000 ____D C:\Program Files (x86)\Vivaldi
2017-04-13 19:21 - 2012-06-11 21:58 - 00000000 ____D C:\Program Files (x86)\Mozilla Maintenance Service
2017-04-11 00:18 - 2016-12-10 00:17 - 00000000 ____D C:\Program Files (x86)\Mozilla Firefox
2017-04-10 22:13 - 2011-09-16 18:03 - 00000000 ____D C:\Program Files (x86)\WaveGain frontend
2017-04-07 12:34 - 2011-09-21 18:06 - 00000000 ____D C:\Users\Philipp\AppData\Roaming\Mp3tag
2017-04-04 22:04 - 2013-01-01 21:27 - 00000000 ____D C:\Users\Philipp\AppData\Roaming\Media Player Classic
2017-04-04 21:58 - 2016-07-31 18:47 - 00000784 _____ C:\Users\Public\Desktop\CCleaner.lnk
2017-03-31 08:57 - 2012-10-22 10:17 - 00000000 ____D C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Avira
2017-03-29 14:44 - 2014-02-06 21:25 - 00000000 ____D C:\Users\Philipp\Desktop\Rechnungen
2017-03-22 12:39 - 2016-10-09 14:27 - 00051248 _____ (Avira Operations GmbH & Co. KG) C:\Windows\system32\Drivers\avusbflt.sys
2017-03-22 12:39 - 2015-03-25 04:42 - 00176968 _____ (Avira Operations GmbH & Co. KG) C:\Windows\system32\Drivers\avgntflt.sys
2017-03-22 12:39 - 2015-03-25 04:42 - 00148104 _____ (Avira Operations GmbH & Co. KG) C:\Windows\system32\Drivers\avipbb.sys
2017-03-22 12:39 - 2015-03-25 04:42 - 00078600 _____ (Avira Operations GmbH & Co. KG) C:\Windows\system32\Drivers\avnetflt.sys
2017-03-22 12:39 - 2015-03-25 04:42 - 00035328 _____ (Avira Operations GmbH & Co. KG) C:\Windows\system32\Drivers\avkmgr.sys
2017-03-22 08:30 - 2015-03-24 12:49 - 00000000 ____D C:\ProgramData\Package Cache
2017-03-21 01:50 - 2015-05-25 19:25 - 00001243 _____ C:\Users\Philipp\Desktop\txt.txt

==================== Dateien im Wurzelverzeichnis einiger Verzeichnisse =======

2012-04-22 03:22 - 2016-07-31 17:00 - 0007658 _____ () C:\Users\Philipp\AppData\Local\Resmon.ResmonCfg

==================== Bamital & volsnap ======================

(Es ist kein automatischer Fix für Dateien vorhanden, die an der Verifikation gescheitert sind.)

C:\Windows\system32\winlogon.exe => Datei ist digital signiert
C:\Windows\system32\wininit.exe => Datei ist digital signiert
C:\Windows\SysWOW64\wininit.exe => Datei ist digital signiert
C:\Windows\explorer.exe => Datei ist digital signiert
C:\Windows\SysWOW64\explorer.exe => Datei ist digital signiert
C:\Windows\system32\svchost.exe => Datei ist digital signiert
C:\Windows\SysWOW64\svchost.exe => Datei ist digital signiert
C:\Windows\system32\services.exe => Datei ist digital signiert
C:\Windows\system32\User32.dll => Datei ist digital signiert
C:\Windows\SysWOW64\User32.dll => Datei ist digital signiert
C:\Windows\system32\userinit.exe => Datei ist digital signiert
C:\Windows\SysWOW64\userinit.exe => Datei ist digital signiert
C:\Windows\system32\rpcss.dll => Datei ist digital signiert
C:\Windows\system32\dnsapi.dll => Datei ist digital signiert
C:\Windows\SysWOW64\dnsapi.dll => Datei ist digital signiert
C:\Windows\system32\Drivers\volsnap.sys => Datei ist digital signiert

LastRegBack: 2017-04-15 10:51

==================== Ende von FRST.txt ============================
         
Addition:



Code:
ATTFilter
Zusätzliches Untersuchungsergebnis von Farbar Recovery Scan Tool (x64) Version: 17-04-2017 01
durchgeführt von Philipp (19-04-2017 13:59:04)
Gestartet von C:\Users\Philipp\Desktop
Windows 7 Home Premium Service Pack 1 (X64) (2011-09-16 15:11:05)
Start-Modus: Normal
==========================================================


==================== Konten: =============================

Administrator (S-1-5-21-3455811494-3201091269-2129086357-500 - Administrator - Disabled)
Gast (S-1-5-21-3455811494-3201091269-2129086357-501 - Limited - Disabled)
HomeGroupUser$ (S-1-5-21-3455811494-3201091269-2129086357-1002 - Limited - Enabled)
Philipp (S-1-5-21-3455811494-3201091269-2129086357-1000 - Administrator - Enabled) => C:\Users\Philipp

==================== Sicherheits-Center ========================

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er entfernt.)

AV: Avira Antivirus (Enabled - Up to date) {B3F630BD-538D-1B4A-14FA-14B63235278F}
AS: Avira Antivirus (Enabled - Up to date) {0897D159-75B7-14C4-2E4A-2FC449B26D32}
AS: Windows Defender (Disabled - Up to date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}

==================== Installierte Programme ======================

(Nur Adware-Programme mit dem Zusatz "Hidden" können in die Fixlist aufgenommen werden, um sie sichtbar zu machen. Die Adware-Programme sollten manuell deinstalliert werden.)

µTorrent (HKLM-x32\...\uTorrent) (Version: 2.2.1 - )
7-Zip 9.20 (x64 edition) (HKLM\...\{23170F69-40C1-2702-0920-000001000000}) (Version: 9.20.00.0 - Igor Pavlov)
Adobe Acrobat Reader DC - Deutsch (HKLM-x32\...\{AC76BA86-7AD7-1031-7B44-AC0F074E4100}) (Version: 17.009.20044 - Adobe Systems Incorporated)
Adobe AIR (HKLM-x32\...\Adobe AIR) (Version: 2.6.0.19120 - Adobe Systems Incorporated)
Adobe Flash Player 25 ActiveX (HKLM-x32\...\Adobe Flash Player ActiveX) (Version: 25.0.0.148 - Adobe Systems Incorporated)
Adobe Flash Player 25 NPAPI (HKLM-x32\...\Adobe Flash Player NPAPI) (Version: 25.0.0.148 - Adobe Systems Incorporated)
Adobe Flash Player 25 PPAPI (HKLM-x32\...\Adobe Flash Player PPAPI) (Version: 25.0.0.148 - Adobe Systems Incorporated)
Adobe Shockwave Player 11.6 (HKLM-x32\...\Adobe Shockwave Player) (Version: 11.6.8.638 - Adobe Systems, Inc.)
ASIO4ALL (HKLM-x32\...\ASIO4ALL) (Version:  - )
Avira Antivirus (HKLM-x32\...\Avira Antivirus) (Version: 15.0.25.172 - Avira Operations GmbH & Co. KG)
Avira Browser Safety (HKLM-x32\...\{9E10EA90-5E97-43B7-A246-FC7B4F5E9493}) (Version: 1.4.5.509 - Avira Operations GmbH & Co KG)
Avira Connect (HKLM-x32\...\{0b46d918-af4f-4612-8076-5c0ae67cb2aa}) (Version: 1.2.81.41506 - Avira Operations GmbH & Co. KG)
Avira Connect (x32 Version: 1.2.81.41506 - Avira Operations GmbH & Co. KG) Hidden
Avira Phantom VPN (HKLM-x32\...\Avira Phantom VPN) (Version: 2.7.1.26756 - Avira Operations GmbH & Co. KG)
BlackBerry 10 Desktop Software (Blend, Link, Drivers) (HKLM-x32\...\{c33e77db-89b5-4abf-a1d1-97f8b35347e1}) (Version: 1.2.0.52 - BlackBerry)
BlackBerry Blend (x32 Version: 1.2.0.50 - BlackBerry Ltd.) Hidden
BlackBerry Communication Drivers (x32 Version: 8.0.0.143 - BlackBerry Ltd.) Hidden
BlackBerry Device Drivers (x32 Version: 8.0.0.143 - BlackBerry Ltd.) Hidden
BlackBerry Link (x32 Version: 1.2.4.39 - BlackBerry) Hidden
BlackBerry Link Remover (x32 Version: 1.2.4.0 - BlackBerry Ltd.) Hidden
Canon IJ Network Scanner Selector EX (HKLM-x32\...\Canon_IJ_Network_Scanner_Selector_EX) (Version: 1.5.4.4 - Canon Inc.)
Canon IJ Network Tool (HKLM-x32\...\Canon_IJ_Network_UTILITY) (Version: 3.7.0 - Canon Inc.)
Canon IJ Scan Utility (HKLM-x32\...\Canon_IJ_Scan_Utility) (Version: 1.1.20.13 - Canon Inc.)
Canon MG5700 series Benutzerregistrierung (HKLM-x32\...\Canon MG5700 series Benutzerregistrierung) (Version:  - *Canon Inc.)
Canon MG5700 series MP Drivers (HKLM\...\{1199FAD5-9546-44f3-81CF-FFDB8040B7BF}_Canon_MG5700_series) (Version: 1.00 - Canon Inc.)
Canon MG5700 series On-screen Manual (HKLM-x32\...\Canon MG5700 series On-screen Manual) (Version: 7.8.0 - Canon Inc.)
Canon My Printer (HKLM-x32\...\CanonMyPrinter) (Version: 3.3.0 - Canon Inc.)
Canon Quick Menu (HKLM-x32\...\CanonQuickMenu) (Version: 2.7.1 - Canon Inc.)
CCleaner (HKLM\...\CCleaner) (Version: 5.28 - Piriform)
Celtx (2.9.7) (HKLM-x32\...\Celtx (2.9.7)) (Version: 2.9.7 (en-US) - Greyfirst)
CMEDIA USB2.0 Audio Device (HKLM-x32\...\{9445E4B8-E875-470A-928A-A665D3F973B4}) (Version: 1.00.0005 - C-Media Electronics, Inc.)
Conexant HD Audio (HKLM\...\CNXT_AUDIO_HDA) (Version: 8.50.4.0 - Conexant)
CyberLink PowerDVD 9.5 (HKLM-x32\...\InstallShield_{A8516AC9-AAF1-47F9-9766-03E2D4CDBCF8}) (Version: 9.5.1.3225 - CyberLink Corp.)
D3DX10 (x32 Version: 15.4.2368.0902 - Microsoft) Hidden
dBpoweramp DSP Effects (HKLM-x32\...\dBpoweramp DSP Effects) (Version: Release 7 - Illustrate)
dBpoweramp Music Converter (HKLM-x32\...\dBpoweramp Music Converter) (Version: Release 14.2 - Illustrate)
Dell Data Vault (Version: 4.1.9.0 - Dell Inc.) Hidden
Dell Edoc Viewer (HKLM\...\{8EBA8727-ADC2-477B-9D9A-1A1836BE4E05}) (Version: 1.0.0 - Dell Inc)
Discord (HKU\S-1-5-21-3455811494-3201091269-2129086357-1000\...\Discord) (Version: 0.0.297 - Hammer & Chisel, Inc.)
DOSBoxnoalttab (HKLM\...\{81c4a0a9-8fb0-4a2d-aec1-efce279f57a6}.sdb) (Version:  - )
Dota 2 (HKLM\...\Steam App 570) (Version:  - Valve)
Exact Audio Copy 1.0beta2 (HKLM-x32\...\Exact Audio Copy) (Version: 1.0beta2 - Andre Wiethoff)
FL Studio 8 (HKLM-x32\...\FL Studio 8) (Version:  - Image-Line bvba)
FLAC 1.2.1b (remove only) (HKLM-x32\...\FLAC) (Version: 1.2.1b - Xiph.org)
Giana Worlds 0.83 Preview (HKLM-x32\...\Giana Worlds) (Version:  - )
HUAWEI DataCard Driver 4.20.12.00 (HKLM-x32\...\HUAWEI DataCard Driver) (Version: 4.20.12.00 - Huawei technologies Co., Ltd.)
Intel(R) Processor Graphics (HKLM-x32\...\{F0E3AD40-2BBD-4360-9C76-B9AC9A5886EA}) (Version: 9.17.10.3347 - Intel Corporation)
Java 7 Update 25 (HKLM-x32\...\{26A24AE4-039D-4CA4-87B4-2F83217025FF}) (Version: 7.0.250 - Oracle)
Java 7 Update 60 (64-bit) (HKLM\...\{26A24AE4-039D-4CA4-87B4-2F06417060FF}) (Version: 7.0.600 - Oracle)
Junk Mail filter update (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
LIMBO (HKU\S-1-5-21-3455811494-3201091269-2129086357-1000\...\Limbo) (Version:  - )
Mesh Runtime (x32 Version: 15.4.5722.2 - Microsoft Corporation) Hidden
Microsoft .NET Framework 4.5.1 (Deutsch) (HKLM\...\{92FB6C44-E685-45AD-9B20-CADF4CABA132} - 1031) (Version: 4.5.50938 - Microsoft Corporation)
Microsoft .NET Framework 4.5.2 (HKLM\...\{92FB6C44-E685-45AD-9B20-CADF4CABA132} - 1033) (Version: 4.5.51209 - Microsoft Corporation)
Microsoft Office Home and Student 2010 (HKLM-x32\...\Office14.SingleImage) (Version: 14.0.7015.1000 - Microsoft Corporation)
Microsoft Office Klick-und-Los 2010 (HKLM-x32\...\Office14.Click2Run) (Version: 14.0.4763.1000 - Microsoft Corporation)
Microsoft Silverlight (HKLM\...\{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}) (Version: 5.1.50906.0 - Microsoft Corporation)
Microsoft SQL Server 2005 Compact Edition [ENU] (HKLM-x32\...\{F0B430D1-B6AA-473D-9B06-AA3DD01FD0B8}) (Version: 3.1.0000 - Microsoft Corporation)
Microsoft Visual C++ 2005 ATL Update kb973923 - x86 8.0.50727.4053 (HKLM-x32\...\{770657D0-A123-3C07-8E44-1C83EC895118}) (Version: 8.0.50727.4053 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (HKLM-x32\...\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}) (Version: 8.0.61001 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (HKLM-x32\...\{837b34e3-7c30-493c-8f6a-2b0f04e2912c}) (Version: 8.0.59193 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729 (HKLM-x32\...\{6AFCA4E1-9B78-3640-8F72-A7BF33448200}) (Version: 9.0.30729 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729 (HKLM-x32\...\{820B6609-4C97-3A2B-B644-573B06A0F0CC}) (Version: 9.0.30729 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (HKLM-x32\...\{9A25302D-30C0-39D9-BD6F-21E6EC160475}) (Version: 9.0.30729 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148 (HKLM-x32\...\{1F1C2DFC-2D24-3E06-BCB8-725134ADF989}) (Version: 9.0.30729.4148 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (HKLM-x32\...\{9BE518E6-ECC6-35A9-88E4-87755C07200F}) (Version: 9.0.30729.6161 - Microsoft Corporation)
Microsoft Visual C++ 2010  x64 Redistributable - 10.0.40219 (HKLM\...\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}) (Version: 10.0.40219 - Microsoft Corporation)
Microsoft Visual C++ 2010  x86 Redistributable - 10.0.40219 (HKLM-x32\...\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}) (Version: 10.0.40219 - Microsoft Corporation)
Microsoft Visual C++ 2015 Redistributable (x86) - 14.0.24215 (HKLM-x32\...\{e2803110-78b3-4664-a479-3611a381656a}) (Version: 14.0.24215.1 - Microsoft Corporation)
Microsoft Visual Studio 2010 Tools for Office Runtime (x64) (HKLM\...\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)) (Version: 10.0.50903 - Microsoft Corporation)
Microsoft Visual Studio 2010-Tools für Office-Laufzeit (x64) Language Pack - DEU (HKLM\...\Microsoft Visual Studio 2010 Tools for Office Runtime (x64) Language Pack - DEU) (Version: 10.0.50903 - Microsoft Corporation)
Mobile Connection Manager (HKLM-x32\...\o2DE) (Version:  - Mobile Connection Manager)
Mozilla Firefox 52.0.2 (x86 en-GB) (HKLM-x32\...\Mozilla Firefox 52.0.2 (x86 en-GB)) (Version: 52.0.2 - Mozilla)
Mozilla Maintenance Service (HKLM-x32\...\MozillaMaintenanceService) (Version: 52.0.2.6291 - Mozilla)
Mp3tag v2.81 (HKLM-x32\...\Mp3tag) (Version: 2.81 - Florian Heidenreich)
MSXML 4.0 SP2 (KB954430) (HKLM-x32\...\{86493ADD-824D-4B8E-BD72-8C5DCDC52A71}) (Version: 4.20.9870.0 - Microsoft Corporation)
MSXML 4.0 SP2 (KB973688) (HKLM-x32\...\{F662A8E6-F4DC-41A2-901E-8C11F044BDEC}) (Version: 4.20.9876.0 - Microsoft Corporation)
Nero Info (HKLM-x32\...\{B791E0AB-87A9-41A4-8D98-D13C2E37D928}) (Version: 15.1.0030 - Nero AG)
Nero Prerequisite Installer 2.0 (HKLM-x32\...\{10EACC1C-7B87-4F57-ACA6-4EC15E13E4E9}) (Version: 12.0.01300 - Nero AG)
Nero WaveEditor (HKLM-x32\...\{59C6E86A-14A9-47FD-9EE8-8D9DA864E0AF}) (Version: 12.5.01300 - Nero AG)
Octava SD25 (HKLM-x32\...\{0D06066D-69E5-4B7E-8409-86F221E7AEFA}) (Version: 6.04 - Obtiv)
Opera 12.18 (HKLM-x32\...\Opera 12.18.1872) (Version: 12.18.1872 - Opera Software ASA)
PoiZone (HKLM-x32\...\PoiZone) (Version:  - Image-Line bvba)
PokerStars.net (HKLM-x32\...\PokerStars.net) (Version:  - PokerStars.net)
Power Undelete Wizard Demo 3.2 (HKLM-x32\...\Power Undelete Wizard Demo) (Version: 3.2 - www.power-undelete.com)
Prerequisite installer (x32 Version: 12.0.0004 - Nero AG) Hidden
Rayman Origins (HKLM-x32\...\{DE491AB9-1D47-4FED-A8F5-4D4325B2EB4B}) (Version: 1.02 - Ubisoft)
Rayman3 (HKLM-x32\...\{BAF5914B-5730-4373-B038-9F436AC6A0D6}) (Version: 1.00.0000 - Ubi Soft)
Service Pack 2 for Microsoft Office 2010 (KB2687455) 32-Bit Edition (HKLM-x32\...\{90140000-003D-0000-0000-0000000FF1CE}_Office14.SingleImage_{DE28B448-32E8-4E8F-84F0-A52B21A49B5B}) (Version:  - Microsoft)
Skype Web Plugin (HKLM-x32\...\{575E7A6A-F93E-4C3F-AAEB-AF96D8679532}) (Version: 7.18.0.51 - Skype Technologies S.A.)
Skype™ 7.33 (HKLM-x32\...\{3B7E914A-93D5-4A29-92BB-AF8C3F66C431}) (Version: 7.33.104 - Skype Technologies S.A.)
Spotify (HKU\S-1-5-21-3455811494-3201091269-2129086357-1000\...\Spotify) (Version: 0.8.5.1333.g822e0de8 - Spotify AB)
Steam (HKLM-x32\...\Steam) (Version: 2.10.91.91 - Valve Corporation)
Stereo Tool 6.32 (HKLM-x32\...\Stereo Tool) (Version:  - )
swMSM (x32 Version: 12.0.0.1 - Adobe Systems, Inc) Hidden
System Requirements Lab CYRI (HKLM-x32\...\{943A8D28-80D6-41DC-AE94-81FEB42041BF}) (Version: 4.5.1.0 - Husdawg, LLC)
TeamSpeak 3 Client (HKLM-x32\...\TeamSpeak 3 Client) (Version:  - TeamSpeak Systems GmbH)
TL-WN822N/TL-WN821N Driver (HKLM-x32\...\{62FE0726-9652-4CD2-9F09-C769D8699C21}) (Version: 1.0.0 - TP-LINK)
Tomb Raider II (HKLM-x32\...\Tomb Raider II) (Version:  - )
Toxic Biohazard (HKLM-x32\...\Toxic Biohazard) (Version:  - Image-Line bvba)
Trust Webcam (HKLM-x32\...\{ECD03DA7-5952-406A-8156-5F0C93618D1F}) (Version: 5.18.1211.103 - Sonix)
TT-Dynamic-Range 1.4 (HKLM-x32\...\TT-Dynamic-Range 1.4) (Version:  - )
Vivaldi (HKU\S-1-5-21-3455811494-3201091269-2129086357-1000\...\Vivaldi) (Version: 1.8.770.56 - Vivaldi)
Winamp (HKLM-x32\...\Winamp) (Version: 5.666  - Nullsoft, Inc)
Winamp Detector Plug-in (HKU\S-1-5-21-3455811494-3201091269-2129086357-1000\...\Winamp Detect) (Version: 1.0.0.1 - Nullsoft, Inc)
Windows Live Essentials (HKLM-x32\...\WinLiveSuite) (Version: 15.4.3508.1109 - Microsoft Corporation)
Windows Live Mesh ActiveX control for remote connections (HKLM-x32\...\{C5398A89-516C-4DAF-BA07-EE7949090E56}) (Version: 15.4.5722.2 - Microsoft Corporation)
WinRAR 4.20 (64-bit) (HKLM\...\WinRAR archiver) (Version: 4.20.0 - win.rar GmbH)
Worms Blast (HKLM-x32\...\{8874FD36-7C9D-4573-8956-E368D6753D90}) (Version:  - )
Zinio Reader 4 (HKLM-x32\...\ZinioReader4) (Version: 4.2.4164 - Zinio LLC)
Zinio Reader 4 (x32 Version: 4.2.4164 - Zinio LLC) Hidden

==================== Benutzerdefinierte CLSID (Nicht auf der Ausnahmeliste): ==========================

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.)

CustomCLSID: HKU\S-1-5-21-3455811494-3201091269-2129086357-1000_Classes\CLSID\{41CA1685-6816-4DDD-BD49-62E8527FF5FC}\InprocServer32 -> C:\Users\Philipp\AppData\Local\SkypePlugin\7.18.0.51\GatewayActiveX-x64.dll (Skype Technologies S.A.)
CustomCLSID: HKU\S-1-5-21-3455811494-3201091269-2129086357-1000_Classes\CLSID\{AECD7203-A7DC-437F-BB84-CAFCB8726531}\localserver32 -> C:\Users\Philipp\AppData\Local\SkypePlugin\7.18.0.51\GatewayVersion-x64.exe (Skype Technologies S.A.)
CustomCLSID: HKU\S-1-5-21-3455811494-3201091269-2129086357-1000_Classes\CLSID\{CBF9CD8C-2714-4F36-B76A-43E6C7547BC2}\localserver32 -> C:\Users\Philipp\AppData\Local\SkypePlugin\7.18.0.51\EdgeCalling.exe (Skype Technologies S.A.)

==================== Geplante Aufgaben (Nicht auf der Ausnahmeliste) =============

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.)

Task: {00088FD1-6211-4F86-8AF7-48F70221EDC9} - System32\Tasks\{94A9EE23-1765-416F-94AF-3DFD49B529E2} => pcalua.exe -a "C:\Program Files\TrueKey\Mcafee.TrueKey.InstallerService.exe" -d "C:\Program Files\TrueKey"
Task: {03C9002D-66A9-4371-B4C4-1BF7C58F5E55} - System32\Tasks\Adobe Acrobat Update Task => C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe [2017-02-02] (Adobe Systems Incorporated)
Task: {04E03913-2089-4285-8AAC-7E87DA2C9312} - System32\Tasks\{2344F093-592D-454D-9E80-3868207016AB} => C:\Program Files (x86)\sox-14-4-0\sox.exe 
Task: {16174250-C13A-4A8F-AE70-A3FE5427433F} - System32\Tasks\CCleanerSkipUAC => C:\Program Files\CCleaner\CCleaner.exe [2017-03-03] (Piriform Ltd)
Task: {2102B220-9704-4DF2-8EBD-5B668DFF9086} - System32\Tasks\{D7121E38-DE0C-4E3F-AAA1-8A28631441D1} => C:\Program Files (x86)\sox-14-4-0\sox.exe 
Task: {215F4337-3211-4640-A767-5A59BA6F6384} - System32\Tasks\{55B2AB3F-138B-4650-BF3D-C36E9E7C722C} => pcalua.exe -a F:\Gee\Installers\GiantWorldsInstaller.exe -d F:\Gee\Installers
Task: {21868FE6-68A7-4955-925B-B1A55E0154AF} - System32\Tasks\{9D179C60-6620-4F56-A839-366EB133E534} => C:\Users\Philipp\Desktop\MarsTaxi\Marstaxi.exe 
Task: {365685F9-E154-490C-8856-E3FDF51B0284} - System32\Tasks\Nero\Nero Info => C:\Program Files (x86)\Common Files\Nero\Nero Info\NeroInfo.exe [2013-10-16] (Nero AG)
Task: {493920D0-FCFF-48F7-A23D-87073E6B0424} - System32\Tasks\{F5069992-398F-46A2-A6F3-BB320B571246} => c:\program files (x86)\vivaldi\application\vivaldi.exe [2017-04-07] (Vivaldi Technologies AS)
Task: {6972B8B6-6853-41A4-BF88-BE8BF435C590} - System32\Tasks\{8BAC9740-AC22-4853-AAA6-8BC29467BA8B} => pcalua.exe -a "C:\Program Files (x86)\RTEQ\unins000.exe"
Task: {7394F48E-5C78-4732-A5A3-6EDC1829C849} - System32\Tasks\{B768E49A-127D-46CA-BE20-8CEAE07DF361} => pcalua.exe -a "C:\Program Files (x86)\Ubi Soft\Rayman3\DirectX\dxsetup.exe" -d "C:\Program Files (x86)\Ubi Soft\Rayman3\DirectX"
Task: {76439162-A4DD-48C9-AB3E-BEA3D4BF850B} - System32\Tasks\{C560024C-E38A-46D6-A44D-407C36CBB9D0} => pcalua.exe -a "C:\Program Files (x86)\Portable\Tomb Raider 2\data\SETUP.EXE" -d "C:\Program Files (x86)\Portable\Tomb Raider 2\data"
Task: {78989588-C417-4C21-B190-981B20030B7C} - System32\Tasks\{6E8031DD-AE79-4827-80C3-783BA720BB99} => C:\Program Files (x86)\Ubi Soft\Rayman3\Rayman3.exe [2003-02-24] ()
Task: {895B5F6E-71BA-4DF7-BEE2-676581D5A528} - System32\Tasks\{9852E7CD-2F1A-4C0E-880C-04FE0B1B116C} => pcalua.exe -a C:\Users\Philipp\Desktop\marstaxi\marstaxi.part1.exe -d C:\Users\Philipp\Desktop\marstaxi
Task: {A5ED9401-BD4A-4A8A-87C2-627210F02237} - System32\Tasks\{C2C993DE-3B67-4E3E-AFEC-70A9987DB548} => pcalua.exe -a C:\Users\Philipp\Desktop\AudioIdentifier_setup.exe -d C:\Users\Philipp\Desktop
Task: {B288C38A-8B08-4B32-BC1D-F700A2C62A05} - System32\Tasks\{17F0A2A9-B17E-48C8-881E-F770B79EEA8D} => msiexec.exe /package "F:\Gee\Installers\Octava SD25.msi"
Task: {B41A56D6-16A6-45F5-ACFF-A2CFEA615B40} - System32\Tasks\{4C1759B2-17A1-43E9-B38A-85CE5918EB9D} => pcalua.exe -a F:\Gee\Installers\GianaWorlds_Installer\SETUP.EXE -d F:\Gee\Installers\GianaWorlds_Installer
Task: {BFAB72A4-55A4-4BA1-927B-875BB9C9B1A8} - \Express Files Updater -> Keine Datei <==== ACHTUNG
Task: {C732B039-AEFE-449F-A030-54C939C722AB} - System32\Tasks\{1D8B9D5D-7244-4B63-AF6E-DD9ECB7FEE66} => pcalua.exe -a "F:\Gee\Installers\Webcam Drivers.exe" -d F:\Gee\Installers
Task: {CE7265D3-E1FD-47E4-97C3-919B6F4E3670} - System32\Tasks\{B6BB92A3-1306-4668-8524-202D6CE03623} => pcalua.exe -a C:\Users\Philipp\Desktop\marstaxi.part1.exe -d C:\Users\Philipp\Desktop
Task: {D11355D6-6B10-4930-A75F-5C5899382491} - System32\Tasks\{B978A690-534B-4176-9A92-70F054863E47} => C:\Program Files (x86)\Skype\Phone\Skype.exe [2017-02-14] (Skype Technologies S.A.)
Task: {D46D972F-5A13-4318-9C74-F566274D675B} - System32\Tasks\{E467CB89-3804-42EB-B593-F0FA830667E9} => C:\Users\Philipp\Desktop\marstaxi\MARSTAXI\MARSTAXI.EXE 
Task: {DD54A6EA-5AA1-47E7-8FFB-2189B9AA6F53} - System32\Tasks\Adobe Flash Player PPAPI Notifier => C:\Windows\SysWOW64\Macromed\Flash\FlashUtil32_25_0_0_148_pepper.exe [2017-04-14] (Adobe Systems Incorporated)
Task: {EEFBA248-B525-4A19-8ED6-FAA9DE698361} - System32\Tasks\Adobe Flash Player Updater => C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2017-04-14] (Adobe Systems Incorporated)
Task: {F05C4CC3-15E0-4464-8FB0-0079E3D17D6C} - System32\Tasks\{C1193F18-40EE-42F9-8876-91C29BA876BE} => msiexec.exe /package "F:\Gee\Installers\Octava SD25.msi"
Task: {F0C1A199-E40D-4215-83FB-BCF2D87156A2} - System32\Tasks\{D7BCEEB2-DD79-43D6-89EB-1CAFC225C0C7} => c:\program files (x86)\opera\opera.exe [2016-02-17] (Opera Software)

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird die Aufgabe verschoben. Die Datei, die durch die Aufgabe gestartet wird, wird nicht verschoben.)


==================== Verknüpfungen =============================

(Die Einträge können gelistet werden, um sie zurückzusetzen oder zu entfernen.)

Shortcut: C:\Users\Philipp\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Image-Line\FL Studio 8\Additional\SynthMaker website.lnk -> hxxp://www.synthmaker.co.uk
Shortcut: C:\Users\Philipp\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ICQ\icq.com.lnk -> hxxp://www.icq.com

==================== Geladene Module (Nicht auf der Ausnahmeliste) ==============

2011-09-13 19:01 - 2011-01-27 16:11 - 00094208 _____ () C:\Windows\System32\IccLibDll_x64.dll
2015-05-20 13:00 - 2015-05-20 13:00 - 00688888 _____ () C:\Program Files (x86)\Common Files\Research In Motion\nginx\nginx.exe
2015-05-26 16:46 - 2015-05-26 16:46 - 00094208 _____ () C:\Program Files (x86)\Common Files\Research In Motion\Tunnel Manager\libxpmux.dll
2017-04-13 19:39 - 2017-04-07 17:21 - 02253432 _____ () C:\Program Files (x86)\Vivaldi\Application\1.8.770.56\libglesv2.dll
2017-04-13 19:39 - 2017-04-07 17:21 - 00087160 _____ () C:\Program Files (x86)\Vivaldi\Application\1.8.770.56\libegl.dll
2013-12-13 03:47 - 2013-12-13 03:47 - 00333824 _____ () C:\Program Files (x86)\Winamp\Plugins\freeform\wacs\freetype\freetype.wac

==================== Alternate Data Streams (Nicht auf der Ausnahmeliste) =========

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird nur der ADS entfernt.)


==================== Abgesicherter Modus (Nicht auf der Ausnahmeliste) ===================

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Der Wert "AlternateShell" wird wiederhergestellt.)


==================== Verknüpfungen (Nicht auf der Ausnahmeliste) ===============

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird der Registryeintrag auf den Standardwert zurückgesetzt oder entfernt.)


==================== Internet Explorer Vertrauenswürdig/Eingeschränkt ===============

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt.)


==================== Hosts Inhalt: ===============================

(Wenn benötigt kann der Hosts: Schalter in die Fixlist aufgenommen werden um die Hosts Datei zurückzusetzen.)

2009-07-14 03:34 - 2014-02-22 23:07 - 00000822 ____A C:\Windows\system32\Drivers\etc\hosts


==================== Andere Bereiche ============================

(Aktuell gibt es keinen automatisierten Fix für diesen Bereich.)

HKU\S-1-5-21-3455811494-3201091269-2129086357-1000\Control Panel\Desktop\\Wallpaper -> C:\Users\Philipp\AppData\Roaming\Microsoft\Windows\Themes\TranscodedWallpaper.jpg
DNS Servers: 192.168.178.1
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System => (ConsentPromptBehaviorAdmin: 0) (ConsentPromptBehaviorUser: 3) (EnableLUA: 0)
Windows Firewall ist aktiviert.

==================== MSCONFIG/TASK MANAGER Deaktivierte Einträge ==

MSCONFIG\startupreg: AccuWeatherWidget => "C:\Program Files (x86)\Dell Stage\Dell Stage\AccuWeather\accuweather.exe" "C:\Program Files (x86)\Dell Stage\Dell Stage\AccuWeather\start.umj" --startup
MSCONFIG\startupreg: Adobe Reader Speed Launcher => "C:\Program Files (x86)\Adobe\Reader 10.0\Reader\Reader_sl.exe"
MSCONFIG\startupreg: CanonQuickMenu => C:\Program Files (x86)\Canon\Quick Menu\CNQMMAIN.EXE /logon
MSCONFIG\startupreg: CCleaner Monitoring => "C:\Program Files\CCleaner\CCleaner64.exe" /MONITOR
MSCONFIG\startupreg: Dell DataSafe Online => C:\Program Files (x86)\Dell\Dell Datasafe Online\NOBuClient.exe
MSCONFIG\startupreg: DellStage => "C:\Program Files (x86)\Dell Stage\Dell Stage\stage_primary.exe" "C:\Program Files (x86)\Dell Stage\Dell Stage\start.umj" --startup
MSCONFIG\startupreg: icq => C:\Users\Philipp\AppData\Roaming\ICQM\icq.exe -CU
MSCONFIG\startupreg: IJNetworkScannerSelectorEX => C:\Program Files (x86)\Canon\IJ Network Scanner Selector EX\CNMNSST.exe /FORCE
MSCONFIG\startupreg: PDVD9LanguageShortcut => "C:\Program Files (x86)\CyberLink\PowerDVD9\Language\Language.exe"
MSCONFIG\startupreg: RemoteControl9 => "C:\Program Files (x86)\CyberLink\PowerDVD9\PDVD9Serv.exe"
MSCONFIG\startupreg: Skype => "C:\Program Files (x86)\Skype\Phone\Skype.exe" /minimized /regrun
MSCONFIG\startupreg: snpstd3 => C:\Windows\vsnpstd3.exe
MSCONFIG\startupreg: Spotify Web Helper => "C:\Users\Philipp\AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe"
MSCONFIG\startupreg: Stage Remote => C:\Program Files (x86)\Dell\Stage Remote\StageRemote.exe -Quiet
MSCONFIG\startupreg: tsnpstd3 => C:\Windows\tsnpstd3.exe

==================== Firewall Regeln (Nicht auf der Ausnahmeliste) ===============

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.)

FirewallRules: [{289F2240-AF73-4518-99C1-2E9C7A49D2AD}] => (Allow) C:\Program Files (x86)\CyberLink\PowerDVD9\PowerDVD Cinema\PowerDVDCinema.exe
FirewallRules: [{15C84F8D-CE57-4690-B0D7-1A6F04A1C923}] => (Allow) C:\Program Files (x86)\CyberLink\PowerDVD9\PowerDVD9.EXE
FirewallRules: [{A870A3F7-3420-49C1-B342-8D4CBEB56E20}] => (Allow) C:\Program Files (x86)\Windows Live\Contacts\wlcomm.exe
FirewallRules: [{3E270342-18BA-4B21-9C23-AA801A88C3B6}] => (Allow) LPort=2869
FirewallRules: [{1D4E7817-0A71-4FE7-A96A-6E114F8299E9}] => (Allow) LPort=1900
FirewallRules: [{D38BE0A2-2FD9-45C9-9B83-9BA735D7BA85}] => (Allow) C:\Program Files (x86)\Windows Live\Messenger\msnmsgr.exe
FirewallRules: [{2B359DFA-8187-42D7-B12D-290325DAB147}] => (Allow) C:\Program Files (x86)\Windows Live\Mesh\MOE.exe
FirewallRules: [{BF619327-B0C4-40D9-96B1-1372A8DEE8FC}] => (Allow) C:\Program Files (x86)\Opera\opera.exe
FirewallRules: [{F8917A39-22EE-4626-BED8-8005E05D3A45}] => (Allow) C:\Program Files (x86)\Opera\opera.exe
FirewallRules: [{FF36C387-F1EE-4E2D-AEC2-0FE0A96CBAA8}] => (Allow) C:\Program Files (x86)\uTorrent\uTorrent.exe
FirewallRules: [{60168207-D5B4-4385-9DAD-04B0EBDCB11A}] => (Allow) C:\Program Files (x86)\uTorrent\uTorrent.exe
FirewallRules: [{1CFC46F9-3786-4720-AA49-3B8BA1369F5D}] => (Allow) C:\Program Files (x86)\uTorrent\uTorrent.exe
FirewallRules: [{22677970-3F85-4EE6-96C6-AB142E2D3A45}] => (Allow) C:\Program Files (x86)\uTorrent\uTorrent.exe
FirewallRules: [TCP Query User{728B64E3-B52F-4291-9052-8EC27A031061}C:\users\philipp\desktop\utorrent.exe] => (Allow) C:\users\philipp\desktop\utorrent.exe
FirewallRules: [UDP Query User{C2F2D4DE-3670-4A49-9436-39B856EDD587}C:\users\philipp\desktop\utorrent.exe] => (Allow) C:\users\philipp\desktop\utorrent.exe
FirewallRules: [TCP Query User{0C7A7CC3-35D5-4130-9A22-19DB00017FA1}C:\users\philipp\desktop\utorrent.exe] => (Allow) C:\users\philipp\desktop\utorrent.exe
FirewallRules: [UDP Query User{0D8047C2-572C-4098-B925-E48CCCD31DCE}C:\users\philipp\desktop\utorrent.exe] => (Allow) C:\users\philipp\desktop\utorrent.exe
FirewallRules: [TCP Query User{2C6FC49C-2973-4ECC-89F3-718900D2562E}C:\program files (x86)\opera\opera.exe] => (Allow) C:\program files (x86)\opera\opera.exe
FirewallRules: [UDP Query User{5870DB1D-7F1B-4C48-8EC5-509209A77772}C:\program files (x86)\opera\opera.exe] => (Allow) C:\program files (x86)\opera\opera.exe
FirewallRules: [{6B43F846-6D5B-469A-AA80-650D0F694E2D}] => (Allow) %USERPROFILE%\Desktop\utorrent.exe
FirewallRules: [{1AACF3C8-6ED7-4309-AA5A-A174A52A004F}] => (Allow) LPort=59611
FirewallRules: [{E76D4A16-159A-4D2F-B838-1682261391FE}] => (Allow) LPort=59611
FirewallRules: [{F51240C0-2912-409D-B3BB-F69E7544BC7B}] => (Allow) %ProgramFiles% (x86)\uTorrent\uTorrent.exe
FirewallRules: [{79E3570A-FF85-4E77-800F-BCD3E92DCDC1}] => (Allow) LPort=55558
FirewallRules: [{BFC7C80B-3EA0-4ACF-96D3-D74E6644FFE8}] => (Allow) LPort=55558
FirewallRules: [{435D1431-DBF0-48CA-8671-88E9D0BDB4A4}] => (Allow) LPort=22
FirewallRules: [{2AB08460-FA8C-479C-AB11-23A331F72965}] => (Allow) LPort=22
FirewallRules: [{D8EA0F2D-97B8-4616-BC58-2275F5ECD71E}] => (Allow) LPort=55558
FirewallRules: [{085A7B3E-1117-4057-BBDC-94B5BB8E8459}] => (Allow) LPort=55558
FirewallRules: [{96B3EFC5-A857-4C2B-81D1-E9A95B8BA84D}] => (Allow) C:\Program Files (x86)\Ubisoft\Rayman Origins\Rayman Origins.exe
FirewallRules: [{2DD6A490-9FAC-459E-8FBA-CAF4A36DD881}] => (Allow) C:\Program Files (x86)\Ubisoft\Rayman Origins\Rayman Origins.exe
FirewallRules: [{16669D55-5DF9-41AF-9B1A-2EB0C83C5A2D}] => (Allow) C:\Program Files (x86)\Ubisoft\Rayman Origins\gu.exe
FirewallRules: [{E16C4F06-3DED-4755-9896-A9693E73AA0E}] => (Allow) C:\Program Files (x86)\Ubisoft\Rayman Origins\gu.exe
FirewallRules: [{E889A435-6647-4378-82FC-B21FBF00BB12}] => (Allow) C:\Users\Philipp\AppData\Roaming\Spotify\spotify.exe
FirewallRules: [{BFEEB885-2D90-48EE-A50A-641F8CC01BF5}] => (Allow) C:\Users\Philipp\AppData\Roaming\Spotify\spotify.exe
FirewallRules: [{1809A7E9-379F-4448-A026-BAED7FC9016A}] => (Allow) C:\Users\Philipp\AppData\Roaming\Spotify\spotify.exe
FirewallRules: [{28140B9D-1206-4174-9F71-5BE865A975AB}] => (Allow) C:\Users\Philipp\AppData\Roaming\Spotify\spotify.exe
FirewallRules: [{4D4AE818-2272-49EC-BA33-5891806F86E1}] => (Allow) C:\Users\Philipp\AppData\Roaming\ICQM\icq.exe
FirewallRules: [{5546BB25-EBA1-4DA2-B0C0-3BE1EDB25D14}] => (Allow) C:\Users\Philipp\AppData\Roaming\ICQM\icq.exe
FirewallRules: [TCP Query User{97B6C5DC-94BE-417B-A8E5-9E8E3442FC56}C:\program files (x86)\winamp\winamp.exe] => (Block) C:\program files (x86)\winamp\winamp.exe
FirewallRules: [UDP Query User{B4FCB184-E6C2-44C5-B133-3230CCB8AD71}C:\program files (x86)\winamp\winamp.exe] => (Block) C:\program files (x86)\winamp\winamp.exe
FirewallRules: [TCP Query User{06D62623-AC5F-4789-98F8-97FA764EA2BF}C:\program files (x86)\proxomitron naoko-4\proxomitron.exe] => (Allow) C:\program files (x86)\proxomitron naoko-4\proxomitron.exe
FirewallRules: [UDP Query User{72A80B43-45F1-4395-A197-E3609C0C77B7}C:\program files (x86)\proxomitron naoko-4\proxomitron.exe] => (Allow) C:\program files (x86)\proxomitron naoko-4\proxomitron.exe
FirewallRules: [{4493763E-845D-45EF-A150-2A5A88E06228}] => (Allow) C:\Users\Philipp\Desktop\utorrent.exe
FirewallRules: [{7AAC114E-16F9-4CAA-9AAE-C2B5183169DA}] => (Allow) C:\Users\Philipp\Desktop\utorrent.exe
FirewallRules: [{F224478F-0EFE-4E80-999C-CE85DC603D7E}] => (Allow) C:\Program Files (x86)\Winamp\winamp.exe
FirewallRules: [{A82A80A8-FB72-41BF-8C0D-FDD19A525FC2}] => (Allow) C:\Program Files (x86)\Winamp\winamp.exe
FirewallRules: [{0E809CC4-484D-4179-A2A2-8B985B42C882}] => (Allow) C:\Program Files (x86)\Mozilla Firefox\firefox.exe
FirewallRules: [{3817D242-58A3-4209-BA27-4BBD95CA9178}] => (Allow) C:\Program Files (x86)\Mozilla Firefox\firefox.exe
FirewallRules: [{D9A12709-DB04-418F-9425-3E3F75A63E1A}] => (Allow) C:\Program Files (x86)\Skype\Phone\Skype.exe
FirewallRules: [{3E732436-C391-4901-84B4-E46B59E5F8B4}] => (Allow) C:\Program Files (x86)\Mozilla Firefox\firefox.exe
FirewallRules: [{7873D197-7473-47A8-83F5-4CC721C709D0}] => (Allow) C:\Program Files (x86)\Mozilla Firefox\firefox.exe
FirewallRules: [{5F565F49-7412-446A-B8B5-E308F42477BA}] => (Allow) C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe
FirewallRules: [TCP Query User{0543C83E-A1A6-414B-BD2D-91CB5294E635}C:\users\philipp\appdata\local\skypeplugin\7.18.0.51\pluginhost.exe] => (Allow) C:\users\philipp\appdata\local\skypeplugin\7.18.0.51\pluginhost.exe
FirewallRules: [UDP Query User{72EB67A5-53DF-41F6-BAA5-FFB66CA66372}C:\users\philipp\appdata\local\skypeplugin\7.18.0.51\pluginhost.exe] => (Allow) C:\users\philipp\appdata\local\skypeplugin\7.18.0.51\pluginhost.exe
FirewallRules: [{8DF7189A-7304-4873-9BE0-A2DACD522212}] => (Allow) C:\Program Files (x86)\Steam\Steam.exe
FirewallRules: [{BF8914BA-C58F-43CD-B07F-FB7AA4FCE422}] => (Allow) C:\Program Files (x86)\Steam\Steam.exe
FirewallRules: [{9CAC4707-63A8-4030-9058-FCE0C9F970EC}] => (Allow) C:\Program Files (x86)\Steam\bin\steamwebhelper.exe
FirewallRules: [{7CE906B5-369F-46AC-982D-523C4DC3312E}] => (Allow) C:\Program Files (x86)\Steam\bin\steamwebhelper.exe
FirewallRules: [{45817113-D93E-4DDC-831E-DF96A079784B}] => (Allow) C:\Program Files (x86)\Steam\steamapps\common\dota 2 beta\game\bin\win64\dota2.exe
FirewallRules: [{01099DE2-41D6-4771-ADAA-389D00B49D85}] => (Allow) C:\Program Files (x86)\Steam\steamapps\common\dota 2 beta\game\bin\win64\dota2.exe
FirewallRules: [{E76A5E0B-437B-4F39-AE7D-BC802678A90D}] => (Allow) tunmgr.exe
FirewallRules: [{5F663F1F-E23C-49E3-BCFA-673E280832B7}] => (Allow) tunmgr.exe
FirewallRules: [{6B34CD81-3F31-40C4-80C2-1455FDA536A7}] => (Allow) mDNSResponder.exe
FirewallRules: [{70F8A69C-2171-4F88-927C-139975EE10A5}] => (Allow) mDNSResponder.exe
FirewallRules: [{F32ED5CA-8A47-4C52-9114-0D0A8F27B70A}] => (Allow) C:\Program Files (x86)\Common Files\Research In Motion\nginx\nginx.exe
FirewallRules: [{F9D324FF-8A74-436E-A677-650A8531C85B}] => (Allow) C:\Program Files (x86)\Common Files\Research In Motion\tunnel manager\PeerManager.exe
FirewallRules: [{DAD6B9F8-21CA-497E-AE9D-7CDF1DA300BE}] => (Allow) C:\Program Files (x86)\BlackBerry\BlackBerry Blend\desktopinvokeproxy.exe
FirewallRules: [{00A5D0E8-20A6-4E54-9638-2BA5C9DFCBAD}] => (Allow) C:\Program Files (x86)\Vivaldi\Application\vivaldi.exe

==================== Wiederherstellungspunkte =========================

09-04-2017 19:52:53 Windows-Sicherung
13-04-2017 19:52:34 Windows Update
16-04-2017 19:00:29 Windows-Sicherung

==================== Fehlerhafte Geräte im Gerätemanager =============


==================== Fehlereinträge in der Ereignisanzeige: =========================

Applikationsfehler:
==================
Error: (04/19/2017 06:34:13 AM) (Source: WinMgmt) (EventID: 10) (User: )
Description: Ereignisfilter mit Abfrage "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" konnte im Namespace "//./root/CIMV2" nicht reaktiviert werden aufgrund des Fehlers 0x80041003. Ereignisse können nicht durch diesen Filter geschickt werden, bis dieses Problem gelöst ist.

Error: (04/18/2017 09:53:00 AM) (Source: WinMgmt) (EventID: 10) (User: )
Description: Ereignisfilter mit Abfrage "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" konnte im Namespace "//./root/CIMV2" nicht reaktiviert werden aufgrund des Fehlers 0x80041003. Ereignisse können nicht durch diesen Filter geschickt werden, bis dieses Problem gelöst ist.

Error: (04/18/2017 01:52:32 AM) (Source: RIM MDNS) (EventID: 100) (User: )
Description: 676: ERROR: read_msg errno 0 (Der Vorgang wurde erfolgreich beendet.)

Error: (04/18/2017 01:52:32 AM) (Source: RIM MDNS) (EventID: 100) (User: )
Description: ERROR: mDNSPlatformReadTCP - recv: 10053

Error: (04/18/2017 01:52:32 AM) (Source: RIM MDNS) (EventID: 100) (User: )
Description: 512: ERROR: read_msg errno 0 (Der Vorgang wurde erfolgreich beendet.)

Error: (04/18/2017 01:52:31 AM) (Source: RIM MDNS) (EventID: 100) (User: )
Description: ERROR: mDNSPlatformReadTCP - recv: 10053

Error: (04/17/2017 07:41:07 PM) (Source: RIM MDNS) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 21153

Error: (04/17/2017 07:41:07 PM) (Source: RIM MDNS) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 21153

Error: (04/17/2017 07:41:07 PM) (Source: RIM MDNS) (EventID: 100) (User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (04/17/2017 07:41:06 PM) (Source: RIM MDNS) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 20139


Systemfehler:
=============
Error: (04/18/2017 01:52:45 AM) (Source: Disk) (EventID: 11) (User: )
Description: Der Treiber hat einen Controllerfehler auf \Device\Harddisk3\DR3 gefunden.

Error: (04/18/2017 01:51:49 AM) (Source: Service Control Manager) (EventID: 7011) (User: )
Description: Das Zeitlimit (30000 ms) wurde beim Warten auf eine Transaktionsrückmeldung von Dienst ShellHWDetection erreicht.

Error: (04/17/2017 01:15:06 PM) (Source: Disk) (EventID: 11) (User: )
Description: Der Treiber hat einen Controllerfehler auf \Device\Harddisk3\DR3 gefunden.

Error: (04/16/2017 05:55:17 PM) (Source: Disk) (EventID: 11) (User: )
Description: Der Treiber hat einen Controllerfehler auf \Device\Harddisk3\DR3 gefunden.

Error: (04/16/2017 10:31:21 AM) (Source: Service Control Manager) (EventID: 7001) (User: )
Description: Der Dienst "Client Virtualization Handler" ist vom Dienst "Application Virtualization Client" abhängig, der aufgrund folgenden Fehlers nicht gestartet wurde: 
Der Dienst antwortete nicht rechtzeitig auf die Start- oder Steuerungsanforderung.

Error: (04/16/2017 10:31:11 AM) (Source: Service Control Manager) (EventID: 7000) (User: )
Description: Der Dienst "Application Virtualization Client" wurde aufgrund folgenden Fehlers nicht gestartet: 
Der Dienst antwortete nicht rechtzeitig auf die Start- oder Steuerungsanforderung.

Error: (04/16/2017 10:31:11 AM) (Source: Service Control Manager) (EventID: 7009) (User: )
Description: Das Zeitlimit (30000 ms) wurde beim Verbindungsversuch mit dem Dienst Application Virtualization Client erreicht.

Error: (04/15/2017 09:59:33 AM) (Source: Service Control Manager) (EventID: 7009) (User: )
Description: Das Zeitlimit (30000 ms) wurde beim Verbindungsversuch mit dem Dienst Microsoft .NET Framework NGEN v4.0.30319_X86 erreicht.

Error: (04/15/2017 02:22:30 AM) (Source: Disk) (EventID: 11) (User: )
Description: Der Treiber hat einen Controllerfehler auf \Device\Harddisk3\DR3 gefunden.

Error: (04/15/2017 02:22:15 AM) (Source: Service Control Manager) (EventID: 7011) (User: )
Description: Das Zeitlimit (30000 ms) wurde beim Warten auf eine Transaktionsrückmeldung von Dienst AudioEndpointBuilder erreicht.


==================== Speicherinformationen =========================== 

Prozessor: Intel(R) Core(TM) i3-2100 CPU @ 3.10GHz
Prozentuale Nutzung des RAM: 95%
Installierter physikalischer RAM: 1960.63 MB
Verfügbarer physikalischer RAM: 80.06 MB
Summe virtueller Speicher: 4008.63 MB
Verfügbarer virtueller Speicher: 993.59 MB

==================== Laufwerke ================================

Drive c: (OS) (Fixed) (Total:283.24 GB) (Free:181.37 GB) NTFS
Drive f: (F:) (Fixed) (Total:931.51 GB) (Free:544.58 GB) NTFS
Drive g: (Volume) (Fixed) (Total:465.76 GB) (Free:117.34 GB) NTFS

==================== MBR & Partitionstabelle ==================

========================================================
Disk: 0 (MBR Code: Windows 7 or Vista) (Size: 298.1 GB) (Disk ID: 0EFD1785)
Partition 1: (Not Active) - (Size=39 MB) - (Type=DE)
Partition 2: (Active) - (Size=14.8 GB) - (Type=07 NTFS)
Partition 3: (Not Active) - (Size=283.2 GB) - (Type=07 NTFS)

========================================================
Disk: 2 (MBR Code: Windows 7 or 8) (Size: 931.5 GB) (Disk ID: 93109591)
Partition 1: (Not Active) - (Size=931.5 GB) - (Type=07 NTFS)

========================================================
Disk: 3 (MBR Code: Windows XP) (Size: 465.8 GB) (Disk ID: BF09AA0E)
Partition 1: (Not Active) - (Size=465.8 GB) - (Type=07 NTFS)

==================== Ende von Addition.txt ============================
         

Alt 19.04.2017, 14:40   #14
cosinus
/// Winkelfunktion
/// TB-Süch-Tiger™
 
Windows-7-PC langsam, Avira findet Adware ohne Ende - Standard

Windows-7-PC langsam, Avira findet Adware ohne Ende



Bitte Avira deinstallieren. (am besten mit revo, siehe weiter unten)

Das Teil empfehlen wir schon seit Jahren aus mehreren Gründen nicht mehr. Ein Grund ist ne rel. hohe Fehlalarmquote, der zweite Hauptgrund ist, dass die immer noch mit ASK zusammenarbeiten (Avira Suchfunktion geht über ASK). Auch andere Freewareanbieter wie AVG, Avast oder Panda sprangen auf diesen Zug auf; so was ist bei Sicherheitssoftware einfach inakzeptabel. Vgl. Antivirensoftware: Schutz Für Ihre Dateien, Aber Auf Kosten Ihrer Privatsphäre? | Emsisoft Blog

Lade Dir bitte von hier Revo Uninstaller Download Revo Uninstaller (alternativ portable Revo Uninstaller) herunter.
  • Installiere und starte das Programm. (Bebilderte Anleitung zu Revo Uninstaller)
  • Klicke auf Optionen und wähle als Sprache Deutsch.
  • Suche im Uninstallerfeld nach den Programmen:

    (alles von Avira)

  • Wähle die Programme nacheinander aus und klicke jedes Mal auf Uninstall.
  • Wähle anschließend den Modus "Moderat" aus.
  • Reste löschen:
    Klicke auf dann auf und dann auf .

 




Gib Bescheid wenn Avira weg ist; wenn wir hier durch sind, kannst du auf einen anderen Virenscanner umsteigen, Infos folgen dann im Abschlussposting. Bitte JETZT nix mehr ohne Absprache installieren!
__________________
Logfiles bitte immer in CODE-Tags posten

Alt 19.04.2017, 15:51   #15
Melione
 
Windows-7-PC langsam, Avira findet Adware ohne Ende - Standard

Windows-7-PC langsam, Avira findet Adware ohne Ende



Done.

Antwort

Themen zu Windows-7-PC langsam, Avira findet Adware ohne Ende
.com, .dll, adware, avira, code, dateien, dll, firefox, free, google, icq, ics, kopieren, langsam, logfile, malwarebytes, microsoft, mozilla, registry, roaming, rootkits, software, system, system32, windows




Ähnliche Themen: Windows-7-PC langsam, Avira findet Adware ohne Ende


  1. AVIRA EU Cleaner findet TR/Crypt.Xpack400358 und 417413 sowie ADWARE/Adware.Gen
    Plagegeister aller Art und deren Bekämpfung - 22.01.2016 (15)
  2. Threema-Audit abgeschlossen: "Ende-zu-Ende-Verschlüsselung ohne Schwächen"
    Nachrichten - 03.11.2015 (0)
  3. Win 7/32 bit - Avira findet adware/multiplug.gen4 + Firefox stürzt immer ab
    Plagegeister aller Art und deren Bekämpfung - 20.01.2015 (13)
  4. Jeder Klick zwei neue Werbefenster, Adware ohne Ende, Download- und Update Aufforderungen
    Log-Analyse und Auswertung - 02.12.2014 (19)
  5. Windows 8 : Pop-up Werbungen ohne Ende trotz Adblock Plus
    Log-Analyse und Auswertung - 23.10.2014 (25)
  6. eBay-Fake eMail mit ZIP Anhang gespeichert, Windows 7- Avira: Enthält Erkennungsmuster der Adware ADWARE/Adware.Gen
    Log-Analyse und Auswertung - 29.08.2014 (17)
  7. Trojan.Agent + Trojan.Ransom, Adware ohne Ende
    Plagegeister aller Art und deren Bekämpfung - 04.06.2014 (28)
  8. Windows 8: PC auf einmal enorm Langsam, Avira findet jedoch keine Viren oder ähnliches
    Plagegeister aller Art und deren Bekämpfung - 10.05.2014 (7)
  9. Adware?! Firefox stürzt ständig ab-Avira findet nichts!
    Plagegeister aller Art und deren Bekämpfung - 05.01.2014 (10)
  10. AVIRA findet ADWARE/BHO.Bprotector.1.4
    Log-Analyse und Auswertung - 31.12.2013 (9)
  11. Windows 7: Avira findet Trojaner TR/MSIL.Agent.cfgz und ADWARE/DomaIQ.AD
    Log-Analyse und Auswertung - 08.11.2013 (11)
  12. Windows 7: Mailer-Daemon Mails von gmx ohne Ende
    Log-Analyse und Auswertung - 29.10.2013 (3)
  13. Avira findet ADWARE/bProtect.D
    Plagegeister aller Art und deren Bekämpfung - 17.09.2013 (13)
  14. Avira findet adware/Agent.aece.269
    Plagegeister aller Art und deren Bekämpfung - 17.07.2013 (54)
  15. Avira findet ADWARE/CiDHelp.A.4 im Messenger Live Plug-in - ein Virus/Trojaner?
    Plagegeister aller Art und deren Bekämpfung - 14.11.2012 (7)
  16. avira findet 'ADSPY/Agent.326608.1' [adware]
    Plagegeister aller Art und deren Bekämpfung - 09.01.2012 (25)
  17. Spy Eraser findet Adware.CWS, Malware - Avira findet HEUR/HTML.Malware
    Log-Analyse und Auswertung - 20.10.2008 (1)

Zum Thema Windows-7-PC langsam, Avira findet Adware ohne Ende - Hallo zusammen, mein PC (mit Windows 7 64-bit) ist im Laufe der letzten Monate sehr langsam geworden. So langsam, dass ich heute aus Verdacht mal Antivirus-Scans hab laufen lassen. Als - Windows-7-PC langsam, Avira findet Adware ohne Ende...
Archiv
Du betrachtest: Windows-7-PC langsam, Avira findet Adware ohne Ende auf Trojaner-Board

Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.