Dear Good Guys,
Hello & thanks for being here! I'll try to express my gratitude by being precise and efficient with your time...
Target System: 3 Month Old Dell E6430 with factory Win7Pro-64. Single user private system.
Problem: User reported a BSOD at 1:02pm on 9/1/13 while reading online news. System was docked and on wall power. Ran checkdisk on system & backup drives. Ran latest Avira Premium and it reported 43 java viruses in the user cache. "Verify Java Version" would hang. Uninstalled Java, manually deleted all files under C:\users\xxx\Appdata\LocalLow\Sun and then reinstalled Java. Java install did not report errors, but "Verify Java Version" (http://www.java.com/en/download/installed.jsp?detect=jre) still hangs. Eventually it says "We are unable to verify if Java is currently installed and enabled in your browser."
Note: Two other PCs on this network verify Java without any trouble.
Debug Actions:
Followed the Java FAQ & troubleshooting guide for about an hour with no progress.
Reran Avira scan and it reports no problems found.
Came here and started the 4-step debug. Logs are below in the following order:
1: Old Aviria scan reporting java viruses.
2: Latest Aviria scan showing no problem found.
3: Mallware Btyes Log (no problem found)
4: DDS.TXT (I didn't see any red flags, but there is much I don't understand)
5: Attach.txt (same as above)
========================== Original Avira Scan ===========================
Avira Antivirus Premium
Report file date: Monday, September 02, 2013 06:35
The program is running as an unrestricted full version.
Online services are available.
Licensee : Ralph Wolf
Serial number : 2222585904-PEPWM-0000003
Platform : Windows 7 Professional
Windows version : (Service Pack 1) [6.1.7601]
Boot mode : Normally booted
Username : SYSTEM
Computer name : LHC6430
Version information:
BUILD.DAT : 13.0.0.4052 57473 Bytes 8/29/2013 18:06:00
AVSCAN.EXE : 13.6.20.2100 639032 Bytes 9/2/2013 13:08:17
AVSCANRC.DLL : 13.6.20.2174 52280 Bytes 9/2/2013 13:08:19
LUKE.DLL : 13.6.20.2174 65080 Bytes 9/2/2013 13:09:36
AVSCPLR.DLL : 13.6.20.2174 92216 Bytes 9/2/2013 13:08:20
AVREG.DLL : 13.6.20.2174 250424 Bytes 9/2/2013 13:08:13
avlode.dll : 13.6.20.2174 497720 Bytes 9/2/2013 13:07:59
avlode.rdf : 13.0.1.42 26846 Bytes 8/28/2013 09:48:06
VBASE000.VDF : 7.11.70.0 66736640 Bytes 4/4/2013 15:42:56
VBASE001.VDF : 7.11.74.226 2201600 Bytes 4/30/2013 15:43:03
VBASE002.VDF : 7.11.80.60 2751488 Bytes 5/28/2013 15:43:12
VBASE003.VDF : 7.11.85.214 2162688 Bytes 6/21/2013 15:43:19
VBASE004.VDF : 7.11.91.176 3903488 Bytes 7/23/2013 16:12:02
VBASE005.VDF : 7.11.98.186 6822912 Bytes 8/29/2013 10:27:20
VBASE006.VDF : 7.11.98.187 2048 Bytes 8/29/2013 10:27:20
VBASE007.VDF : 7.11.98.188 2048 Bytes 8/29/2013 10:27:20
VBASE008.VDF : 7.11.98.189 2048 Bytes 8/29/2013 10:27:20
VBASE009.VDF : 7.11.98.190 2048 Bytes 8/29/2013 10:27:20
VBASE010.VDF : 7.11.98.191 2048 Bytes 8/29/2013 10:27:21
VBASE011.VDF : 7.11.98.192 2048 Bytes 8/29/2013 10:27:21
VBASE012.VDF : 7.11.98.193 2048 Bytes 8/29/2013 10:27:21
VBASE013.VDF : 7.11.99.52 270848 Bytes 8/30/2013 19:57:08
VBASE014.VDF : 7.11.99.167 210944 Bytes 9/2/2013 09:39:04
VBASE015.VDF : 7.11.99.168 2048 Bytes 9/2/2013 09:39:04
VBASE016.VDF : 7.11.99.169 2048 Bytes 9/2/2013 09:39:04
VBASE017.VDF : 7.11.99.170 2048 Bytes 9/2/2013 09:39:05
VBASE018.VDF : 7.11.99.171 2048 Bytes 9/2/2013 09:39:05
VBASE019.VDF : 7.11.99.172 2048 Bytes 9/2/2013 09:39:06
VBASE020.VDF : 7.11.99.173 2048 Bytes 9/2/2013 09:39:06
VBASE021.VDF : 7.11.99.174 2048 Bytes 9/2/2013 09:39:06
VBASE022.VDF : 7.11.99.175 2048 Bytes 9/2/2013 09:39:06
VBASE023.VDF : 7.11.99.176 2048 Bytes 9/2/2013 09:39:06
VBASE024.VDF : 7.11.99.177 2048 Bytes 9/2/2013 09:39:07
VBASE025.VDF : 7.11.99.178 2048 Bytes 9/2/2013 09:39:07
VBASE026.VDF : 7.11.99.179 2048 Bytes 9/2/2013 09:39:07
VBASE027.VDF : 7.11.99.180 2048 Bytes 9/2/2013 09:39:07
VBASE028.VDF : 7.11.99.181 2048 Bytes 9/2/2013 09:39:07
VBASE029.VDF : 7.11.99.182 2048 Bytes 9/2/2013 09:39:08
VBASE030.VDF : 7.11.99.183 2048 Bytes 9/2/2013 09:39:08
VBASE031.VDF : 7.11.99.206 72192 Bytes 9/2/2013 13:07:31
Engine version : 8.2.12.114
AEVDF.DLL : 8.1.3.4 102774 Bytes 7/2/2013 15:43:48
AESCRIPT.DLL : 8.1.4.146 512382 Bytes 8/30/2013 19:57:24
AESCN.DLL : 8.1.10.4 131446 Bytes 7/2/2013 15:43:47
AESBX.DLL : 8.2.16.26 1245560 Bytes 8/28/2013 05:31:09
AERDL.DLL : 8.2.0.128 688504 Bytes 7/2/2013 15:43:47
AEPACK.DLL : 8.3.2.24 749945 Bytes 7/2/2013 15:43:45
AEOFFICE.DLL : 8.1.2.76 205181 Bytes 8/28/2013 05:31:07
AEHEUR.DLL : 8.1.4.588 6091130 Bytes 8/30/2013 19:57:23
AEHELP.DLL : 8.1.27.6 266617 Bytes 8/28/2013 05:30:58
AEGEN.DLL : 8.1.7.12 442743 Bytes 8/28/2013 05:30:57
AEEXP.DLL : 8.4.1.54 311671 Bytes 8/30/2013 19:57:25
AEEMU.DLL : 8.1.3.2 393587 Bytes 7/2/2013 15:43:34
AECORE.DLL : 8.1.32.0 201081 Bytes 8/28/2013 05:30:57
AEBB.DLL : 8.1.1.4 53619 Bytes 7/2/2013 15:43:33
AVWINLL.DLL : 13.6.20.2174 23608 Bytes 9/2/2013 13:07:26
AVPREF.DLL : 13.6.20.2174 48184 Bytes 9/2/2013 13:08:11
AVREP.DLL : 13.6.20.2174 175672 Bytes 9/2/2013 13:08:14
AVARKT.DLL : 13.6.20.2174 258104 Bytes 9/2/2013 13:07:35
AVEVTLOG.DLL : 13.6.20.2174 165432 Bytes 9/2/2013 13:07:48
SQLITE3.DLL : 3.7.0.1 394824 Bytes 8/28/2013 05:34:02
AVSMTP.DLL : 13.6.20.2174 60472 Bytes 9/2/2013 13:08:22
NETNT.DLL : 13.6.20.2174 13368 Bytes 9/2/2013 13:09:37
RCIMAGE.DLL : 13.6.20.2174 4833336 Bytes 9/2/2013 13:07:27
RCTEXT.DLL : 13.6.20.2175 66616 Bytes 9/2/2013 13:07:27
Configuration settings for the scan:
Jobname.............................: Complete system scan
Configuration file..................: C:\program files (x86)\avira\antivir desktop\sysscan.avp
Reporting...........................: default
Primary action......................: Interactive
Secondary action....................: Ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:, F:,
Process scan........................: on
Extended process scan...............: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Limit recursion depth...............: 20
Smart extensions....................: on
Macrovirus heuristic................: on
File heuristic......................: extended
Start of the scan: Monday, September 02, 2013 06:35
Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!
Master boot sector HD1
[INFO] No virus was found!
Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Boot sector 'F:\'
[INFO] No virus was found!
Starting search for hidden objects.
The scan of running processes will be started:
Scan process 'svchost.exe' - '53' Module(s) have been scanned
Scan process 'nvvsvc.exe' - '36' Module(s) have been scanned
Scan process 'svchost.exe' - '45' Module(s) have been scanned
Scan process 'svchost.exe' - '101' Module(s) have been scanned
Scan process 'svchost.exe' - '125' Module(s) have been scanned
Scan process 'svchost.exe' - '83' Module(s) have been scanned
Scan process 'svchost.exe' - '149' Module(s) have been scanned
Scan process 'STacSV64.exe' - '42' Module(s) have been scanned
Scan process 'svchost.exe' - '80' Module(s) have been scanned
Scan process 'spoolsv.exe' - '96' Module(s) have been scanned
Scan process 'HostControlService.exe' - '28' Module(s) have been scanned
Scan process 'HostStorageService.exe' - '28' Module(s) have been scanned
Scan process 'svchost.exe' - '67' Module(s) have been scanned
Scan process 'svchost.exe' - '64' Module(s) have been scanned
Scan process 'TdmService.exe' - '52' Module(s) have been scanned
Scan process 'nvxdsync.exe' - '56' Module(s) have been scanned
Scan process 'nvvsvc.exe' - '67' Module(s) have been scanned
Scan process 'upeksvr.exe' - '57' Module(s) have been scanned
Scan process 'armsvc.exe' - '29' Module(s) have been scanned
Scan process 'apnmcp.exe' - '44' Module(s) have been scanned
Scan process 'EmbassyServer.exe' - '116' Module(s) have been scanned
Scan process 'HeciServer.exe' - '28' Module(s) have been scanned
Scan process 'jhi_service.exe' - '45' Module(s) have been scanned
Scan process 'o2flash.exe' - '40' Module(s) have been scanned
Scan process 'WaveAMService.exe' - '62' Module(s) have been scanned
Scan process 'WLIDSVC.EXE' - '77' Module(s) have been scanned
Scan process 'DFEPService.exe' - '70' Module(s) have been scanned
Scan process 'WLIDSvcM.exe' - '18' Module(s) have been scanned
Scan process 'svchost.exe' - '34' Module(s) have been scanned
Scan process 'svchost.exe' - '39' Module(s) have been scanned
Scan process 'WUDFHost.exe' - '29' Module(s) have been scanned
Scan process 'SearchIndexer.exe' - '62' Module(s) have been scanned
Scan process 'PhotoshopElementsFileAgent.exe' - '33' Module(s) have been scanned
Scan process 'IAStorDataMgrSvc.exe' - '55' Module(s) have been scanned
Scan process 'LMS.exe' - '40' Module(s) have been scanned
Scan process 'svchost.exe' - '71' Module(s) have been scanned
Scan process 'wmpnetwk.exe' - '121' Module(s) have been scanned
Scan process 'UNS.exe' - '97' Module(s) have been scanned
Scan process 'taskhost.exe' - '66' Module(s) have been scanned
Scan process 'Dwm.exe' - '40' Module(s) have been scanned
Scan process 'Explorer.EXE' - '178' Module(s) have been scanned
Scan process 'Apoint.exe' - '49' Module(s) have been scanned
Scan process 'igfxtray.exe' - '28' Module(s) have been scanned
Scan process 'hkcmd.exe' - '27' Module(s) have been scanned
Scan process 'igfxpers.exe' - '51' Module(s) have been scanned
Scan process 'sttray64.exe' - '43' Module(s) have been scanned
Scan process 'TdmNotify.exe' - '34' Module(s) have been scanned
Scan process 'DFEPApplication.exe' - '53' Module(s) have been scanned
Scan process 'wmiprvse.exe' - '37' Module(s) have been scanned
Scan process 'ApMsgFwd.exe' - '32' Module(s) have been scanned
Scan process 'HidFind.exe' - '27' Module(s) have been scanned
Scan process 'Apntex.exe' - '30' Module(s) have been scanned
Scan process 'conhost.exe' - '17' Module(s) have been scanned
Scan process 'PDVD9Serv.exe' - '31' Module(s) have been scanned
Scan process 'brs.exe' - '33' Module(s) have been scanned
Scan process 'RoxioBurnLauncher.exe' - '76' Module(s) have been scanned
Scan process 'WebcamDell2.exe' - '52' Module(s) have been scanned
Scan process 'IAStorIcon.exe' - '57' Module(s) have been scanned
Scan process 'jusched.exe' - '40' Module(s) have been scanned
Scan process 'TBNotifier.exe' - '93' Module(s) have been scanned
Scan process 'DellSystemDetect.exe' - '80' Module(s) have been scanned
Scan process 'svchost.exe' - '62' Module(s) have been scanned
Scan process 'NOTEPAD.EXE' - '31' Module(s) have been scanned
Scan process 'DllHost.exe' - '46' Module(s) have been scanned
Scan process 'PrivacyIconClient.exe' - '89' Module(s) have been scanned
Scan process 'svchost.exe' - '76' Module(s) have been scanned
Scan process 'caffeine.exe' - '34' Module(s) have been scanned
Scan process 'sched.exe' - '46' Module(s) have been scanned
Scan process 'avguard.exe' - '124' Module(s) have been scanned
Scan process 'avshadow.exe' - '29' Module(s) have been scanned
Scan process 'AVWEBGRD.EXE' - '72' Module(s) have been scanned
Scan process 'avmailc.exe' - '48' Module(s) have been scanned
Scan process 'avgnt.exe' - '99' Module(s) have been scanned
Scan process 'avcenter.exe' - '97' Module(s) have been scanned
Scan process 'avscan.exe' - '125' Module(s) have been scanned
Scan process 'vssvc.exe' - '48' Module(s) have been scanned
Scan process 'svchost.exe' - '35' Module(s) have been scanned
Scan process 'wmiprvse.exe' - '42' Module(s) have been scanned
Scan process 'smss.exe' - '2' Module(s) have been scanned
Scan process 'csrss.exe' - '18' Module(s) have been scanned
Scan process 'wininit.exe' - '27' Module(s) have been scanned
Scan process 'csrss.exe' - '18' Module(s) have been scanned
Scan process 'services.exe' - '37' Module(s) have been scanned
Scan process 'lsass.exe' - '93' Module(s) have been scanned
Scan process 'lsm.exe' - '16' Module(s) have been scanned
Scan process 'winlogon.exe' - '33' Module(s) have been scanned
Starting to scan executable files (registry):
The registry was scanned ( '2317' files ).
Starting the file scan:
Begin scan in 'C:\' <LHC6430>
C:\MyDocs\BackupFrom4-1-2013\C\Nuggets\Dell-E6420\dotNetFx40_Full_x86_x64.exe
[WARNING] The file could not be read!
[0] Archive type: RSRC
--> C:\Program Files\Broadcom Corporation\Broadcom USH Host Components\ushwbfdrv\WudfUpdate_01009.dll
[1] Archive type: RSRC
--> C:\Users\LHChow29\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\35\4f1d9f63-7458f0bd
[2] Archive type: ZIP
--> a.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.36 Java virus
[WARNING] Infected files in archives cannot be repaired
--> cdcdc44.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.8 Java virus
[WARNING] Infected files in archives cannot be repaired
--> cew.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.7 Java virus
[WARNING] Infected files in archives cannot be repaired
--> d.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.6 Java virus
[WARNING] Infected files in archives cannot be repaired
--> dwq.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.31 Java virus
[WARNING] Infected files in archives cannot be repaired
--> f.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.29 Java virus
[WARNING] Infected files in archives cannot be repaired
--> asdf.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.9 Java virus
[WARNING] Infected files in archives cannot be repaired
--> j.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.3 Java virus
[WARNING] Infected files in archives cannot be repaired
--> jy.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.13 Java virus
[WARNING] Infected files in archives cannot be repaired
--> vsd.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.12 Java virus
[WARNING] Infected files in archives cannot be repaired
--> vvj.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.11 Java virus
[WARNING] Infected files in archives cannot be repaired
--> jy$1.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.14 Java virus
[WARNING] Infected files in archives cannot be repaired
C:\Users\LHChow29\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\35\4f1d9f63-7458f0bd
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.14 Java virus
--> C:\Users\LHChow29\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\45\2de0122d-5b29a1ab
[2] Archive type: ZIP
--> a.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.37 Java virus
[WARNING] Infected files in archives cannot be repaired
--> f.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.30 Java virus
[WARNING] Infected files in archives cannot be repaired
--> j.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.26 Java virus
[WARNING] Infected files in archives cannot be repaired
--> l.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.22 Java virus
[WARNING] Infected files in archives cannot be repaired
--> q.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.21 Java virus
[WARNING] Infected files in archives cannot be repaired
--> s.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.20 Java virus
[WARNING] Infected files in archives cannot be repaired
--> vffvfv.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.19 Java virus
[WARNING] Infected files in archives cannot be repaired
--> y.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.16 Java virus
[WARNING] Infected files in archives cannot be repaired
C:\Users\LHChow29\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\45\2de0122d-5b29a1ab
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.16 Java virus
Begin scan in 'F:\' <L6430 Backups>
--> C:\Users\LHChow29\Documents\FromOldCdrive(reference Only)\Documents and Settings\LHchow\Local Settings\Temp\jre-6u26-windows-i586-iftw-rv.exe
[2] Archive type: Runtime Packed
--> C:\Users\Rwolf\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\305RPA1C\JavaSetup7u25.exe
[3] Archive type: Runtime Packed
--> C:\Windows\System32\DriverStore\FileRepository\ushwbfdrv.inf_amd64_neutral_6bb2a464e1453509\WudfUpdate_01009.dll
[4] Archive type: RSRC
--> C:\Windows\System32\DriverStore\FileRepository\ushwbfdrv.inf_amd64_neutral_c0bdf6ccc6efe4bc\WudfUpdate_01009.dll
[5] Archive type: RSRC
--> F:\LHC6430\Backup Set 2013-07-25 115157\Backup Files 2013-07-25 115157\Backup files 1.zip
[6] Archive type: ZIP
--> F:\LHC6430\Backup Set 2013-08-05 151801\Backup Files 2013-08-05 151801\Backup files 1.zip
[7] Archive type: ZIP
--> F:\LHC6430\Backup Set 2013-08-05 151801\Backup Files 2013-08-07 103203\Backup files 1.zip
[8] Archive type: ZIP
--> C/Users/LHChow29/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/35/4f1d9f63-7458f0bd
[9] Archive type: ZIP
--> a.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.36 Java virus
[WARNING] Infected files in archives cannot be repaired
--> cdcdc44.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.8 Java virus
[WARNING] Infected files in archives cannot be repaired
--> cew.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.7 Java virus
[WARNING] Infected files in archives cannot be repaired
--> d.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.6 Java virus
[WARNING] Infected files in archives cannot be repaired
--> dwq.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.31 Java virus
[WARNING] Infected files in archives cannot be repaired
--> f.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.29 Java virus
[WARNING] Infected files in archives cannot be repaired
--> asdf.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.9 Java virus
[WARNING] Infected files in archives cannot be repaired
--> j.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.3 Java virus
[WARNING] Infected files in archives cannot be repaired
--> jy.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.13 Java virus
[WARNING] Infected files in archives cannot be repaired
--> vsd.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.12 Java virus
[WARNING] Infected files in archives cannot be repaired
--> vvj.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.11 Java virus
[WARNING] Infected files in archives cannot be repaired
--> jy$1.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.14 Java virus
[WARNING] Infected files in archives cannot be repaired
--> C/Users/LHChow29/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/45/2de0122d-5b29a1ab
[9] Archive type: ZIP
--> a.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.37 Java virus
[WARNING] Infected files in archives cannot be repaired
--> f.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.30 Java virus
[WARNING] Infected files in archives cannot be repaired
--> j.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.26 Java virus
[WARNING] Infected files in archives cannot be repaired
--> l.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.22 Java virus
[WARNING] Infected files in archives cannot be repaired
--> q.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.21 Java virus
[WARNING] Infected files in archives cannot be repaired
--> s.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.20 Java virus
[WARNING] Infected files in archives cannot be repaired
--> vffvfv.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.19 Java virus
[WARNING] Infected files in archives cannot be repaired
--> y.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.16 Java virus
[WARNING] Infected files in archives cannot be repaired
F:\LHC6430\Backup Set 2013-08-05 151801\Backup Files 2013-08-07 103203\Backup files 1.zip
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.16 Java virus
Beginning disinfection:
F:\LHC6430\Backup Set 2013-08-05 151801\Backup Files 2013-08-07 103203\Backup files 1.zip
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.16 Java virus
[NOTE] The file was moved to the quarantine directory under the name '5a9d56ae.qua'!
C:\Users\LHChow29\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\45\2de0122d-5b29a1ab
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.16 Java virus
[NOTE] The file was moved to the quarantine directory under the name '4204790c.qua'!
C:\Users\LHChow29\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\35\4f1d9f63-7458f0bd
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.14 Java virus
[NOTE] The file was moved to the quarantine directory under the name '108723e6.qua'!
End of the scan: Monday, September 02, 2013 13:48
Used time: 3:16:51 Hour(s)
The scan has been done completely.
36892 Scanned directories
906379 Files were scanned
43 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 Files were deleted
0 Viruses and unwanted programs were repaired
3 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
906336 Files not concerned
11038 Archives were scanned
41 Warnings
3 Notes
889505 Objects were scanned with rootkit scan
0 Hidden objects were found
Hello & thanks for being here! I'll try to express my gratitude by being precise and efficient with your time...
Target System: 3 Month Old Dell E6430 with factory Win7Pro-64. Single user private system.
Problem: User reported a BSOD at 1:02pm on 9/1/13 while reading online news. System was docked and on wall power. Ran checkdisk on system & backup drives. Ran latest Avira Premium and it reported 43 java viruses in the user cache. "Verify Java Version" would hang. Uninstalled Java, manually deleted all files under C:\users\xxx\Appdata\LocalLow\Sun and then reinstalled Java. Java install did not report errors, but "Verify Java Version" (http://www.java.com/en/download/installed.jsp?detect=jre) still hangs. Eventually it says "We are unable to verify if Java is currently installed and enabled in your browser."
Note: Two other PCs on this network verify Java without any trouble.
Debug Actions:
Followed the Java FAQ & troubleshooting guide for about an hour with no progress.
Reran Avira scan and it reports no problems found.
Came here and started the 4-step debug. Logs are below in the following order:
1: Old Aviria scan reporting java viruses.
2: Latest Aviria scan showing no problem found.
3: Mallware Btyes Log (no problem found)
4: DDS.TXT (I didn't see any red flags, but there is much I don't understand)
5: Attach.txt (same as above)
========================== Original Avira Scan ===========================
Avira Antivirus Premium
Report file date: Monday, September 02, 2013 06:35
The program is running as an unrestricted full version.
Online services are available.
Licensee : Ralph Wolf
Serial number : 2222585904-PEPWM-0000003
Platform : Windows 7 Professional
Windows version : (Service Pack 1) [6.1.7601]
Boot mode : Normally booted
Username : SYSTEM
Computer name : LHC6430
Version information:
BUILD.DAT : 13.0.0.4052 57473 Bytes 8/29/2013 18:06:00
AVSCAN.EXE : 13.6.20.2100 639032 Bytes 9/2/2013 13:08:17
AVSCANRC.DLL : 13.6.20.2174 52280 Bytes 9/2/2013 13:08:19
LUKE.DLL : 13.6.20.2174 65080 Bytes 9/2/2013 13:09:36
AVSCPLR.DLL : 13.6.20.2174 92216 Bytes 9/2/2013 13:08:20
AVREG.DLL : 13.6.20.2174 250424 Bytes 9/2/2013 13:08:13
avlode.dll : 13.6.20.2174 497720 Bytes 9/2/2013 13:07:59
avlode.rdf : 13.0.1.42 26846 Bytes 8/28/2013 09:48:06
VBASE000.VDF : 7.11.70.0 66736640 Bytes 4/4/2013 15:42:56
VBASE001.VDF : 7.11.74.226 2201600 Bytes 4/30/2013 15:43:03
VBASE002.VDF : 7.11.80.60 2751488 Bytes 5/28/2013 15:43:12
VBASE003.VDF : 7.11.85.214 2162688 Bytes 6/21/2013 15:43:19
VBASE004.VDF : 7.11.91.176 3903488 Bytes 7/23/2013 16:12:02
VBASE005.VDF : 7.11.98.186 6822912 Bytes 8/29/2013 10:27:20
VBASE006.VDF : 7.11.98.187 2048 Bytes 8/29/2013 10:27:20
VBASE007.VDF : 7.11.98.188 2048 Bytes 8/29/2013 10:27:20
VBASE008.VDF : 7.11.98.189 2048 Bytes 8/29/2013 10:27:20
VBASE009.VDF : 7.11.98.190 2048 Bytes 8/29/2013 10:27:20
VBASE010.VDF : 7.11.98.191 2048 Bytes 8/29/2013 10:27:21
VBASE011.VDF : 7.11.98.192 2048 Bytes 8/29/2013 10:27:21
VBASE012.VDF : 7.11.98.193 2048 Bytes 8/29/2013 10:27:21
VBASE013.VDF : 7.11.99.52 270848 Bytes 8/30/2013 19:57:08
VBASE014.VDF : 7.11.99.167 210944 Bytes 9/2/2013 09:39:04
VBASE015.VDF : 7.11.99.168 2048 Bytes 9/2/2013 09:39:04
VBASE016.VDF : 7.11.99.169 2048 Bytes 9/2/2013 09:39:04
VBASE017.VDF : 7.11.99.170 2048 Bytes 9/2/2013 09:39:05
VBASE018.VDF : 7.11.99.171 2048 Bytes 9/2/2013 09:39:05
VBASE019.VDF : 7.11.99.172 2048 Bytes 9/2/2013 09:39:06
VBASE020.VDF : 7.11.99.173 2048 Bytes 9/2/2013 09:39:06
VBASE021.VDF : 7.11.99.174 2048 Bytes 9/2/2013 09:39:06
VBASE022.VDF : 7.11.99.175 2048 Bytes 9/2/2013 09:39:06
VBASE023.VDF : 7.11.99.176 2048 Bytes 9/2/2013 09:39:06
VBASE024.VDF : 7.11.99.177 2048 Bytes 9/2/2013 09:39:07
VBASE025.VDF : 7.11.99.178 2048 Bytes 9/2/2013 09:39:07
VBASE026.VDF : 7.11.99.179 2048 Bytes 9/2/2013 09:39:07
VBASE027.VDF : 7.11.99.180 2048 Bytes 9/2/2013 09:39:07
VBASE028.VDF : 7.11.99.181 2048 Bytes 9/2/2013 09:39:07
VBASE029.VDF : 7.11.99.182 2048 Bytes 9/2/2013 09:39:08
VBASE030.VDF : 7.11.99.183 2048 Bytes 9/2/2013 09:39:08
VBASE031.VDF : 7.11.99.206 72192 Bytes 9/2/2013 13:07:31
Engine version : 8.2.12.114
AEVDF.DLL : 8.1.3.4 102774 Bytes 7/2/2013 15:43:48
AESCRIPT.DLL : 8.1.4.146 512382 Bytes 8/30/2013 19:57:24
AESCN.DLL : 8.1.10.4 131446 Bytes 7/2/2013 15:43:47
AESBX.DLL : 8.2.16.26 1245560 Bytes 8/28/2013 05:31:09
AERDL.DLL : 8.2.0.128 688504 Bytes 7/2/2013 15:43:47
AEPACK.DLL : 8.3.2.24 749945 Bytes 7/2/2013 15:43:45
AEOFFICE.DLL : 8.1.2.76 205181 Bytes 8/28/2013 05:31:07
AEHEUR.DLL : 8.1.4.588 6091130 Bytes 8/30/2013 19:57:23
AEHELP.DLL : 8.1.27.6 266617 Bytes 8/28/2013 05:30:58
AEGEN.DLL : 8.1.7.12 442743 Bytes 8/28/2013 05:30:57
AEEXP.DLL : 8.4.1.54 311671 Bytes 8/30/2013 19:57:25
AEEMU.DLL : 8.1.3.2 393587 Bytes 7/2/2013 15:43:34
AECORE.DLL : 8.1.32.0 201081 Bytes 8/28/2013 05:30:57
AEBB.DLL : 8.1.1.4 53619 Bytes 7/2/2013 15:43:33
AVWINLL.DLL : 13.6.20.2174 23608 Bytes 9/2/2013 13:07:26
AVPREF.DLL : 13.6.20.2174 48184 Bytes 9/2/2013 13:08:11
AVREP.DLL : 13.6.20.2174 175672 Bytes 9/2/2013 13:08:14
AVARKT.DLL : 13.6.20.2174 258104 Bytes 9/2/2013 13:07:35
AVEVTLOG.DLL : 13.6.20.2174 165432 Bytes 9/2/2013 13:07:48
SQLITE3.DLL : 3.7.0.1 394824 Bytes 8/28/2013 05:34:02
AVSMTP.DLL : 13.6.20.2174 60472 Bytes 9/2/2013 13:08:22
NETNT.DLL : 13.6.20.2174 13368 Bytes 9/2/2013 13:09:37
RCIMAGE.DLL : 13.6.20.2174 4833336 Bytes 9/2/2013 13:07:27
RCTEXT.DLL : 13.6.20.2175 66616 Bytes 9/2/2013 13:07:27
Configuration settings for the scan:
Jobname.............................: Complete system scan
Configuration file..................: C:\program files (x86)\avira\antivir desktop\sysscan.avp
Reporting...........................: default
Primary action......................: Interactive
Secondary action....................: Ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:, F:,
Process scan........................: on
Extended process scan...............: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Limit recursion depth...............: 20
Smart extensions....................: on
Macrovirus heuristic................: on
File heuristic......................: extended
Start of the scan: Monday, September 02, 2013 06:35
Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!
Master boot sector HD1
[INFO] No virus was found!
Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Boot sector 'F:\'
[INFO] No virus was found!
Starting search for hidden objects.
The scan of running processes will be started:
Scan process 'svchost.exe' - '53' Module(s) have been scanned
Scan process 'nvvsvc.exe' - '36' Module(s) have been scanned
Scan process 'svchost.exe' - '45' Module(s) have been scanned
Scan process 'svchost.exe' - '101' Module(s) have been scanned
Scan process 'svchost.exe' - '125' Module(s) have been scanned
Scan process 'svchost.exe' - '83' Module(s) have been scanned
Scan process 'svchost.exe' - '149' Module(s) have been scanned
Scan process 'STacSV64.exe' - '42' Module(s) have been scanned
Scan process 'svchost.exe' - '80' Module(s) have been scanned
Scan process 'spoolsv.exe' - '96' Module(s) have been scanned
Scan process 'HostControlService.exe' - '28' Module(s) have been scanned
Scan process 'HostStorageService.exe' - '28' Module(s) have been scanned
Scan process 'svchost.exe' - '67' Module(s) have been scanned
Scan process 'svchost.exe' - '64' Module(s) have been scanned
Scan process 'TdmService.exe' - '52' Module(s) have been scanned
Scan process 'nvxdsync.exe' - '56' Module(s) have been scanned
Scan process 'nvvsvc.exe' - '67' Module(s) have been scanned
Scan process 'upeksvr.exe' - '57' Module(s) have been scanned
Scan process 'armsvc.exe' - '29' Module(s) have been scanned
Scan process 'apnmcp.exe' - '44' Module(s) have been scanned
Scan process 'EmbassyServer.exe' - '116' Module(s) have been scanned
Scan process 'HeciServer.exe' - '28' Module(s) have been scanned
Scan process 'jhi_service.exe' - '45' Module(s) have been scanned
Scan process 'o2flash.exe' - '40' Module(s) have been scanned
Scan process 'WaveAMService.exe' - '62' Module(s) have been scanned
Scan process 'WLIDSVC.EXE' - '77' Module(s) have been scanned
Scan process 'DFEPService.exe' - '70' Module(s) have been scanned
Scan process 'WLIDSvcM.exe' - '18' Module(s) have been scanned
Scan process 'svchost.exe' - '34' Module(s) have been scanned
Scan process 'svchost.exe' - '39' Module(s) have been scanned
Scan process 'WUDFHost.exe' - '29' Module(s) have been scanned
Scan process 'SearchIndexer.exe' - '62' Module(s) have been scanned
Scan process 'PhotoshopElementsFileAgent.exe' - '33' Module(s) have been scanned
Scan process 'IAStorDataMgrSvc.exe' - '55' Module(s) have been scanned
Scan process 'LMS.exe' - '40' Module(s) have been scanned
Scan process 'svchost.exe' - '71' Module(s) have been scanned
Scan process 'wmpnetwk.exe' - '121' Module(s) have been scanned
Scan process 'UNS.exe' - '97' Module(s) have been scanned
Scan process 'taskhost.exe' - '66' Module(s) have been scanned
Scan process 'Dwm.exe' - '40' Module(s) have been scanned
Scan process 'Explorer.EXE' - '178' Module(s) have been scanned
Scan process 'Apoint.exe' - '49' Module(s) have been scanned
Scan process 'igfxtray.exe' - '28' Module(s) have been scanned
Scan process 'hkcmd.exe' - '27' Module(s) have been scanned
Scan process 'igfxpers.exe' - '51' Module(s) have been scanned
Scan process 'sttray64.exe' - '43' Module(s) have been scanned
Scan process 'TdmNotify.exe' - '34' Module(s) have been scanned
Scan process 'DFEPApplication.exe' - '53' Module(s) have been scanned
Scan process 'wmiprvse.exe' - '37' Module(s) have been scanned
Scan process 'ApMsgFwd.exe' - '32' Module(s) have been scanned
Scan process 'HidFind.exe' - '27' Module(s) have been scanned
Scan process 'Apntex.exe' - '30' Module(s) have been scanned
Scan process 'conhost.exe' - '17' Module(s) have been scanned
Scan process 'PDVD9Serv.exe' - '31' Module(s) have been scanned
Scan process 'brs.exe' - '33' Module(s) have been scanned
Scan process 'RoxioBurnLauncher.exe' - '76' Module(s) have been scanned
Scan process 'WebcamDell2.exe' - '52' Module(s) have been scanned
Scan process 'IAStorIcon.exe' - '57' Module(s) have been scanned
Scan process 'jusched.exe' - '40' Module(s) have been scanned
Scan process 'TBNotifier.exe' - '93' Module(s) have been scanned
Scan process 'DellSystemDetect.exe' - '80' Module(s) have been scanned
Scan process 'svchost.exe' - '62' Module(s) have been scanned
Scan process 'NOTEPAD.EXE' - '31' Module(s) have been scanned
Scan process 'DllHost.exe' - '46' Module(s) have been scanned
Scan process 'PrivacyIconClient.exe' - '89' Module(s) have been scanned
Scan process 'svchost.exe' - '76' Module(s) have been scanned
Scan process 'caffeine.exe' - '34' Module(s) have been scanned
Scan process 'sched.exe' - '46' Module(s) have been scanned
Scan process 'avguard.exe' - '124' Module(s) have been scanned
Scan process 'avshadow.exe' - '29' Module(s) have been scanned
Scan process 'AVWEBGRD.EXE' - '72' Module(s) have been scanned
Scan process 'avmailc.exe' - '48' Module(s) have been scanned
Scan process 'avgnt.exe' - '99' Module(s) have been scanned
Scan process 'avcenter.exe' - '97' Module(s) have been scanned
Scan process 'avscan.exe' - '125' Module(s) have been scanned
Scan process 'vssvc.exe' - '48' Module(s) have been scanned
Scan process 'svchost.exe' - '35' Module(s) have been scanned
Scan process 'wmiprvse.exe' - '42' Module(s) have been scanned
Scan process 'smss.exe' - '2' Module(s) have been scanned
Scan process 'csrss.exe' - '18' Module(s) have been scanned
Scan process 'wininit.exe' - '27' Module(s) have been scanned
Scan process 'csrss.exe' - '18' Module(s) have been scanned
Scan process 'services.exe' - '37' Module(s) have been scanned
Scan process 'lsass.exe' - '93' Module(s) have been scanned
Scan process 'lsm.exe' - '16' Module(s) have been scanned
Scan process 'winlogon.exe' - '33' Module(s) have been scanned
Starting to scan executable files (registry):
The registry was scanned ( '2317' files ).
Starting the file scan:
Begin scan in 'C:\' <LHC6430>
C:\MyDocs\BackupFrom4-1-2013\C\Nuggets\Dell-E6420\dotNetFx40_Full_x86_x64.exe
[WARNING] The file could not be read!
[0] Archive type: RSRC
--> C:\Program Files\Broadcom Corporation\Broadcom USH Host Components\ushwbfdrv\WudfUpdate_01009.dll
[1] Archive type: RSRC
--> C:\Users\LHChow29\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\35\4f1d9f63-7458f0bd
[2] Archive type: ZIP
--> a.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.36 Java virus
[WARNING] Infected files in archives cannot be repaired
--> cdcdc44.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.8 Java virus
[WARNING] Infected files in archives cannot be repaired
--> cew.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.7 Java virus
[WARNING] Infected files in archives cannot be repaired
--> d.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.6 Java virus
[WARNING] Infected files in archives cannot be repaired
--> dwq.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.31 Java virus
[WARNING] Infected files in archives cannot be repaired
--> f.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.29 Java virus
[WARNING] Infected files in archives cannot be repaired
--> asdf.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.9 Java virus
[WARNING] Infected files in archives cannot be repaired
--> j.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.3 Java virus
[WARNING] Infected files in archives cannot be repaired
--> jy.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.13 Java virus
[WARNING] Infected files in archives cannot be repaired
--> vsd.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.12 Java virus
[WARNING] Infected files in archives cannot be repaired
--> vvj.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.11 Java virus
[WARNING] Infected files in archives cannot be repaired
--> jy$1.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.14 Java virus
[WARNING] Infected files in archives cannot be repaired
C:\Users\LHChow29\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\35\4f1d9f63-7458f0bd
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.14 Java virus
--> C:\Users\LHChow29\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\45\2de0122d-5b29a1ab
[2] Archive type: ZIP
--> a.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.37 Java virus
[WARNING] Infected files in archives cannot be repaired
--> f.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.30 Java virus
[WARNING] Infected files in archives cannot be repaired
--> j.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.26 Java virus
[WARNING] Infected files in archives cannot be repaired
--> l.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.22 Java virus
[WARNING] Infected files in archives cannot be repaired
--> q.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.21 Java virus
[WARNING] Infected files in archives cannot be repaired
--> s.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.20 Java virus
[WARNING] Infected files in archives cannot be repaired
--> vffvfv.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.19 Java virus
[WARNING] Infected files in archives cannot be repaired
--> y.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.16 Java virus
[WARNING] Infected files in archives cannot be repaired
C:\Users\LHChow29\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\45\2de0122d-5b29a1ab
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.16 Java virus
Begin scan in 'F:\' <L6430 Backups>
--> C:\Users\LHChow29\Documents\FromOldCdrive(reference Only)\Documents and Settings\LHchow\Local Settings\Temp\jre-6u26-windows-i586-iftw-rv.exe
[2] Archive type: Runtime Packed
--> C:\Users\Rwolf\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\305RPA1C\JavaSetup7u25.exe
[3] Archive type: Runtime Packed
--> C:\Windows\System32\DriverStore\FileRepository\ushwbfdrv.inf_amd64_neutral_6bb2a464e1453509\WudfUpdate_01009.dll
[4] Archive type: RSRC
--> C:\Windows\System32\DriverStore\FileRepository\ushwbfdrv.inf_amd64_neutral_c0bdf6ccc6efe4bc\WudfUpdate_01009.dll
[5] Archive type: RSRC
--> F:\LHC6430\Backup Set 2013-07-25 115157\Backup Files 2013-07-25 115157\Backup files 1.zip
[6] Archive type: ZIP
--> F:\LHC6430\Backup Set 2013-08-05 151801\Backup Files 2013-08-05 151801\Backup files 1.zip
[7] Archive type: ZIP
--> F:\LHC6430\Backup Set 2013-08-05 151801\Backup Files 2013-08-07 103203\Backup files 1.zip
[8] Archive type: ZIP
--> C/Users/LHChow29/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/35/4f1d9f63-7458f0bd
[9] Archive type: ZIP
--> a.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.36 Java virus
[WARNING] Infected files in archives cannot be repaired
--> cdcdc44.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.8 Java virus
[WARNING] Infected files in archives cannot be repaired
--> cew.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.7 Java virus
[WARNING] Infected files in archives cannot be repaired
--> d.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.6 Java virus
[WARNING] Infected files in archives cannot be repaired
--> dwq.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.31 Java virus
[WARNING] Infected files in archives cannot be repaired
--> f.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.29 Java virus
[WARNING] Infected files in archives cannot be repaired
--> asdf.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.9 Java virus
[WARNING] Infected files in archives cannot be repaired
--> j.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.3 Java virus
[WARNING] Infected files in archives cannot be repaired
--> jy.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.13 Java virus
[WARNING] Infected files in archives cannot be repaired
--> vsd.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.12 Java virus
[WARNING] Infected files in archives cannot be repaired
--> vvj.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.11 Java virus
[WARNING] Infected files in archives cannot be repaired
--> jy$1.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.14 Java virus
[WARNING] Infected files in archives cannot be repaired
--> C/Users/LHChow29/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/45/2de0122d-5b29a1ab
[9] Archive type: ZIP
--> a.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.37 Java virus
[WARNING] Infected files in archives cannot be repaired
--> f.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.30 Java virus
[WARNING] Infected files in archives cannot be repaired
--> j.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.26 Java virus
[WARNING] Infected files in archives cannot be repaired
--> l.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.22 Java virus
[WARNING] Infected files in archives cannot be repaired
--> q.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.21 Java virus
[WARNING] Infected files in archives cannot be repaired
--> s.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.20 Java virus
[WARNING] Infected files in archives cannot be repaired
--> vffvfv.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.19 Java virus
[WARNING] Infected files in archives cannot be repaired
--> y.class
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.16 Java virus
[WARNING] Infected files in archives cannot be repaired
F:\LHC6430\Backup Set 2013-08-05 151801\Backup Files 2013-08-07 103203\Backup files 1.zip
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.16 Java virus
Beginning disinfection:
F:\LHC6430\Backup Set 2013-08-05 151801\Backup Files 2013-08-07 103203\Backup files 1.zip
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.16 Java virus
[NOTE] The file was moved to the quarantine directory under the name '5a9d56ae.qua'!
C:\Users\LHChow29\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\45\2de0122d-5b29a1ab
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.16 Java virus
[NOTE] The file was moved to the quarantine directory under the name '4204790c.qua'!
C:\Users\LHChow29\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\35\4f1d9f63-7458f0bd
[DETECTION] Contains recognition pattern of the JAVA/Lamar.SAP.14 Java virus
[NOTE] The file was moved to the quarantine directory under the name '108723e6.qua'!
End of the scan: Monday, September 02, 2013 13:48
Used time: 3:16:51 Hour(s)
The scan has been done completely.
36892 Scanned directories
906379 Files were scanned
43 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 Files were deleted
0 Viruses and unwanted programs were repaired
3 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
906336 Files not concerned
11038 Archives were scanned
41 Warnings
3 Notes
889505 Objects were scanned with rootkit scan
0 Hidden objects were found