ESETSmartInstaller@High as downloader log: all ok # product=EOS # version=8 # OnlineScannerApp.exe=1.0.0.1 # OnlineScanner.ocx=1.0.0.7623 # api_version=3.0.2 # EOSSerial=36e667e50c12ff449c61109bca664230 # engine=22914 # end=stopped # remove_checked=false # archives_checked=false # unwanted_checked=true # unsafe_checked=false # antistealth_checked=true # utc_time=2015-03-15 09:45:19 # local_time=2015-03-15 10:45:19 (+0100, West-Europa (standaardtijd)) # country="Netherlands" # lang=1033 # osver=6.1.7601 NT Service Pack 1 # compatibility_mode_1='AVG Internet Security 2015' # compatibility_mode=1053 16777213 100 100 83877 113546703 0 0 # compatibility_mode_1='' # compatibility_mode=5893 16776573 100 94 7670 178042569 0 0 # scanned=3317 # found=0 # cleaned=0 # scan_time=90 ESETSmartInstaller@High as downloader log: all ok # product=EOS # version=8 # OnlineScannerApp.exe=1.0.0.1 # OnlineScanner.ocx=1.0.0.7623 # api_version=3.0.2 # EOSSerial=36e667e50c12ff449c61109bca664230 # engine=22953 # end=stopped # remove_checked=false # archives_checked=true # unwanted_checked=true # unsafe_checked=true # antistealth_checked=true # utc_time=2015-03-17 08:59:27 # local_time=2015-03-17 09:59:27 (+0100, West-Europa (standaardtijd)) # country="Netherlands" # lang=1033 # osver=6.1.7601 NT Service Pack 1 # compatibility_mode_1='AVG Internet Security 2015' # compatibility_mode=1053 16777213 100 100 11973 113759951 0 0 # compatibility_mode_1='' # compatibility_mode=5893 16776574 100 94 217318 178255817 0 0 # scanned=88319 # found=44 # cleaned=0 # scan_time=5718 sh=A940290CD03149105F8B947ADDABBDC19F565143 ft=0 fh=0000000000000000 vn="a variant of Android/Agent.M trojan" ac=I fn="C:\metasploit\apps\pro\msf3\data\android\apk\classes.dex" sh=E5C446EBE1EFEC6B5784054768C2960B0033B3BF ft=0 fh=0000000000000000 vn="multiple threats" ac=I fn="C:\metasploit\apps\pro\msf3\data\exploits\CVE-2008-5353.jar" sh=11B6D5420C41946F694E52C8B97CC149884CA11A ft=0 fh=0000000000000000 vn="SWF/Exploit.CVE-2008-5499.A trojan" ac=I fn="C:\metasploit\apps\pro\msf3\data\exploits\CVE-2008-5499.swf" sh=6412C0B7D81E5F17F1DEA0C847C4D35659427C4C ft=0 fh=0000000000000000 vn="a variant of Java/Exploit.CVE-2009-3869.A trojan" ac=I fn="C:\metasploit\apps\pro\msf3\data\exploits\CVE-2009-3869.jar" sh=918F766D6E67D0CC1F83BE174AE29799922E7FA6 ft=0 fh=0000000000000000 vn="Win32/Exploit.CVE-2010-0480.A trojan" ac=I fn="C:\metasploit\apps\pro\msf3\data\exploits\CVE-2010-0480.avi" sh=9255C38BF09A94CA426178522A8C508B7452649B ft=0 fh=0000000000000000 vn="Win32/Exploit.CVE-2010-0822.A trojan" ac=I fn="C:\metasploit\apps\pro\msf3\data\exploits\CVE-2010-0822.xls" sh=D2F5DAB385B6064277171AE9794FDDB9265EBDD4 ft=0 fh=0000000000000000 vn="MOV/Exploit.CVE-2011-0257.A trojan" ac=I fn="C:\metasploit\apps\pro\msf3\data\exploits\CVE-2011-0257.mov" sh=5BABA2E59AC39EBEEF56F3C70D9E9C279BD27402 ft=0 fh=0000000000000000 vn="JS/Exploit.CVE-2013-0757.A trojan" ac=I fn="C:\metasploit\apps\pro\msf3\data\exploits\cve-2013-0758.swf" sh=474AF25F548ED4D5C55DA878DCAD35CCE683F988 ft=0 fh=0000000000000000 vn="Java/Exploit.CVE-2010-0842.A trojan" ac=I fn="C:\metasploit\apps\pro\msf3\data\exploits\CVE-2010-0842\MyController.class" sh=8132723668DBD38A1831761D4B408D7F21B6EA4F ft=0 fh=0000000000000000 vn="Java/Exploit.CVE-2010-3563.A trojan" ac=I fn="C:\metasploit\apps\pro\msf3\data\exploits\cve-2010-3563\Exploit.class" sh=9BE309632A305898A2AEE16EE7B4E7BD338ACC85 ft=0 fh=0000000000000000 vn="Java/Exploit.Agent.NDP trojan" ac=I fn="C:\metasploit\apps\pro\msf3\data\exploits\cve-2012-5076\MyPayload.class" sh=7B8470E18AB4226A8AAD2975EDDB32CBE0CCA160 ft=0 fh=0000000000000000 vn="a variant of Win32/Exploit.CVE-2013-0074.BM trojan" ac=I fn="C:\metasploit\apps\pro\msf3\data\exploits\cve-2013-0074\SilverApp1.xap" sh=12703BF7CC3F17382FE733492920DCC10915F441 ft=0 fh=0000000000000000 vn="SWF/Exploit.CVE-2013-0634.J trojan" ac=I fn="C:\metasploit\apps\pro\msf3\data\exploits\CVE-2013-0634\exploit.swf" sh=331E5C746F0FF0CACC784F0281D16D4051F9FB92 ft=0 fh=0000000000000000 vn="a variant of Java/Exploit.CVE-2013-1488.A trojan" ac=I fn="C:\metasploit\apps\pro\msf3\data\exploits\cve-2013-1488\Exploit.class" sh=404CDEFF86833F4B79CD2656854462A93684C904 ft=0 fh=0000000000000000 vn="a variant of Java/Exploit.CVE-2013-1488.A trojan" ac=I fn="C:\metasploit\apps\pro\msf3\data\exploits\cve-2013-1488\FakeDriver.class" sh=BBC5F809703B8B114DD4CAF1077BC22A6C0731A6 ft=0 fh=0000000000000000 vn="a variant of Java/Exploit.CVE-2013-1488.J trojan" ac=I fn="C:\metasploit\apps\pro\msf3\data\exploits\cve-2013-1488\FakeDriver2.class" sh=2E8610A10F5EC990D6865B12C3E19DBC8699C85F ft=0 fh=0000000000000000 vn="a variant of Java/Exploit.CVE-2013-2465.CL trojan" ac=I fn="C:\metasploit\apps\pro\msf3\data\exploits\CVE-2013-2465\Exploit$MyColorSpace.class" sh=166A7EA7AD8CCAD53259FD3173119227595DDC57 ft=1 fh=2e8d7f481c68d8a2 vn="a variant of Win32/Exploit.CVE-2013-3660.A trojan" ac=I fn="C:\metasploit\apps\pro\msf3\data\exploits\cve-2013-3660\ppr_flatten_rec.x86.dll" sh=F64190B99080C527CB20ADCD0738243504DE3EC6 ft=1 fh=cfd4bf26c27df062 vn="a variant of Win32/Exploit.CVE-2013-3881.A trojan" ac=I fn="C:\metasploit\apps\pro\msf3\data\exploits\cve-2013-3881\cve-2013-3881.x86.dll" sh=A325507F4D9AEAEFD41FC437B4357C58996973E2 ft=0 fh=0000000000000000 vn="SWF/Exploit.CVE-2013-5331.B trojan" ac=I fn="C:\metasploit\apps\pro\msf3\data\exploits\CVE-2013-5331\Exploit.swf" sh=6359A48F39E13ED9D034076F6B39C53EC6F89FAF ft=0 fh=0000000000000000 vn="SWF/Exploit.CVE-2014-0322.A trojan" ac=I fn="C:\metasploit\apps\pro\msf3\data\exploits\CVE-2014-0322\AsXploit.swf" sh=BEA6AF09B27E7D89FD8DA7127B986CD83352548B ft=1 fh=d437edd3f3052b04 vn="Win32/Meterpreter.A potentially unsafe application" ac=I fn="C:\metasploit\apps\pro\msf3\data\meterpreter\metsvc-server.exe" sh=7232BD42CD9D0725E7E0220052F4734FEC91BE7A ft=1 fh=0b622ea0d2713868 vn="a variant of Win32/Meterpreter.A potentially unsafe application" ac=I fn="C:\metasploit\apps\pro\msf3\data\meterpreter\metsvc.exe" sh=E67C130183EE4EA8BF9C6F14F573E7918AC67DFC ft=0 fh=0000000000000000 vn="PHP/Exploit.Agent.NAC trojan" ac=I fn="C:\metasploit\apps\pro\msf3\data\php\reverse_tcp.php" sh=E654DFA6B7E8364047C8C3356B24ECAFCAD4D729 ft=0 fh=0000000000000000 vn="JS/TrojanDownloader.Agent.GJ trojan" ac=I fn="C:\metasploit\apps\pro\msf3\lib\rex\exploitation\heaplib.js.b64" sh=0C6586E71F3F1BCDF41C65A4B65AB080B83CDD92 ft=0 fh=0000000000000000 vn="JS/Exploit.Shellcode.A.gen trojan" ac=I fn="C:\metasploit\apps\pro\msf3\modules\exploits\linux\misc\mongod_native_helper.rb" sh=B157798803114C46C9D5D033F9085499C2F922F1 ft=0 fh=0000000000000000 vn="JS/Exploit.CVE-2006-0295.A trojan" ac=I fn="C:\metasploit\apps\pro\msf3\modules\exploits\multi\browser\firefox_queryinterface.rb" sh=08F4299862EFE9F76EC716D9DB44D25A0CDC3071 ft=0 fh=0000000000000000 vn="JS/Exploit.CVE-2006-3677.A trojan" ac=I fn="C:\metasploit\apps\pro\msf3\modules\exploits\multi\browser\mozilla_navigatorjava.rb" sh=C9A9769FCE3E7DF35058A7A56E8203ECF8BE01C2 ft=0 fh=0000000000000000 vn="JS/Exploit.CVE-2013-1347.B.Gen trojan" ac=I fn="C:\metasploit\apps\pro\msf3\modules\exploits\windows\browser\ie_cgenericelement_uaf.rb" sh=D1D57E0BE1C57688EB9CF892D77039635E10AA8F ft=0 fh=0000000000000000 vn="JS/Exploit.CVE-2006-4704.A trojan" ac=I fn="C:\metasploit\apps\pro\msf3\modules\exploits\windows\browser\ie_createobject.rb" sh=08258E2B962F728FA05B3BFE79D1F8CC1FC755D2 ft=0 fh=0000000000000000 vn="Java/Exploit.CVE-2010-3552.A trojan" ac=I fn="C:\metasploit\apps\pro\msf3\modules\exploits\windows\browser\java_docbase_bof.rb" sh=D0113593A188F9C68BA6963575D007B97AD68BA7 ft=0 fh=0000000000000000 vn="JS/Exploit.CVE-2013-0753.A trojan" ac=I fn="C:\metasploit\apps\pro\msf3\modules\exploits\windows\browser\mozilla_firefox_xmlserializer.rb" sh=2C90DF4B38A88FF8DFF73DBFDED0FF711D6C0D2E ft=0 fh=0000000000000000 vn="JS/Exploit.CVE-2011-2371.A trojan" ac=I fn="C:\metasploit\apps\pro\msf3\modules\exploits\windows\browser\mozilla_reduceright.rb" sh=601802C3D30FACBFFBF79CF24A2F835AACA9B08B ft=0 fh=0000000000000000 vn="JS/Exploit.CVE-2009-3672.A trojan" ac=I fn="C:\metasploit\apps\pro\msf3\modules\exploits\windows\browser\ms09_072_style_object.rb" sh=C2132C3CE4EBE789A7640AF77899D0ADDB1D27A3 ft=0 fh=0000000000000000 vn="JS/Exploit.CVE-2010-0249 trojan" ac=I fn="C:\metasploit\apps\pro\msf3\modules\exploits\windows\browser\ms10_002_aurora.rb" sh=CA5EF4C422EAC29AB3249748E5835B413018CA97 ft=0 fh=0000000000000000 vn="HTML/Exploit.CVE-2010-1885.A trojan" ac=I fn="C:\metasploit\apps\pro\msf3\modules\exploits\windows\browser\ms10_042_helpctr_xss_cmd_exec.rb" sh=4E317A1553FBB1BA004568AB1479B12A90A63153 ft=0 fh=0000000000000000 vn="JS/Exploit.CVE-2012-1876.A trojan" ac=I fn="C:\metasploit\apps\pro\msf3\modules\exploits\windows\browser\ms12_037_ie_colspan.rb" sh=E58171DCF44107A85CB8762FF8929ECAA156C831 ft=0 fh=0000000000000000 vn="JS/Exploit.CVE-2013-2551.A.Gen trojan" ac=I fn="C:\metasploit\apps\pro\msf3\modules\exploits\windows\browser\ms13_037_svg_dashstyle.rb" sh=72AF3CEC0AAE76481E8958D40EB0A8259AE9E52A ft=0 fh=0000000000000000 vn="Win32/Exploit.CVE-2014-0322.A trojan" ac=I fn="C:\metasploit\apps\pro\msf3\modules\exploits\windows\browser\ms14_012_cmarkup_uaf.rb" sh=87D1A9A164475D65465C99FB235F87A1E2F411EE ft=0 fh=0000000000000000 vn="Win32/Exploit.CVE-2014-6332.F trojan" ac=I fn="C:\metasploit\apps\pro\msf3\modules\exploits\windows\browser\ms14_064_ole_code_execution.rb" sh=FDECF751F8DE3BCAF93060C92B58A377203D875C ft=1 fh=0fa335e29218f3d8 vn="a variant of Win32/NetTool.Incognito.A potentially unsafe application" ac=I fn="C:\metasploit\apps\pro\vendor\bundle\ruby\2.1.0\gems\meterpreter_bins-0.0.14\meterpreter\ext_server_incognito.x86.dll" sh=D4633248E4D018E8C954EC4CC1661FB87A7631AE ft=1 fh=6696b0b6f8c0f3ab vn="a variant of Win64/HackTool.Mimikatz.H potentially unsafe application" ac=I fn="C:\metasploit\apps\pro\vendor\bundle\ruby\2.1.0\gems\meterpreter_bins-0.0.14\meterpreter\ext_server_kiwi.x64.dll" sh=8EDFD97B545A002B02BEF15F5C732E12D79594FE ft=1 fh=0b823df0a0463cff vn="a variant of Win64/HackTool.Mimikatz.I potentially unsafe application" ac=I fn="C:\metasploit\apps\pro\vendor\bundle\ruby\2.1.0\gems\meterpreter_bins-0.0.14\meterpreter\ext_server_mimikatz.x64.dll" sh=E95F0619D89F9D423829746B4FF12BCF4D42C37D ft=1 fh=65fb252e7c6f1842 vn="Win32/Bundled.Toolbar.Ask.L potentially unsafe application" ac=I fn="C:\Program Files (x86)\Hotspot Shield\Uninstall.exe" ESETSmartInstaller@High as downloader log: all ok ESETSmartInstaller@High as downloader log: all ok # product=EOS # version=8 # OnlineScannerApp.exe=1.0.0.1 # OnlineScanner.ocx=1.0.0.7623 # api_version=3.0.2 # EOSSerial=36e667e50c12ff449c61109bca664230 # engine=22953 # end=finished # remove_checked=true # archives_checked=true # unwanted_checked=true # unsafe_checked=true # antistealth_checked=true # utc_time=2015-03-18 04:53:31 # local_time=2015-03-18 05:53:31 (+0100, West-Europa (standaardtijd)) # country="Netherlands" # lang=1033 # osver=6.1.7601 NT Service Pack 1 # compatibility_mode_1='AVG Internet Security 2015' # compatibility_mode=1053 16777213 100 100 40417 113788395 0 0 # compatibility_mode_1='' # compatibility_mode=5893 16776574 100 94 245762 178284261 0 0 # scanned=374089 # found=54 # cleaned=53 # scan_time=28299 sh=7232BD42CD9D0725E7E0220052F4734FEC91BE7A ft=1 fh=0b622ea0d2713868 vn="a variant of Win32/Meterpreter.A potentially unsafe application" ac=I fn="C:\metasploit\apps\pro\msf3\data\meterpreter\metsvc.exe" sh=A940290CD03149105F8B947ADDABBDC19F565143 ft=0 fh=0000000000000000 vn="a variant of Android/Agent.M trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\data\android\apk\classes.dex" sh=E5C446EBE1EFEC6B5784054768C2960B0033B3BF ft=0 fh=0000000000000000 vn="multiple threats (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\data\exploits\CVE-2008-5353.jar" sh=11B6D5420C41946F694E52C8B97CC149884CA11A ft=0 fh=0000000000000000 vn="SWF/Exploit.CVE-2008-5499.A trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\data\exploits\CVE-2008-5499.swf" sh=6412C0B7D81E5F17F1DEA0C847C4D35659427C4C ft=0 fh=0000000000000000 vn="a variant of Java/Exploit.CVE-2009-3869.A trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\data\exploits\CVE-2009-3869.jar" sh=918F766D6E67D0CC1F83BE174AE29799922E7FA6 ft=0 fh=0000000000000000 vn="Win32/Exploit.CVE-2010-0480.A trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\data\exploits\CVE-2010-0480.avi" sh=9255C38BF09A94CA426178522A8C508B7452649B ft=0 fh=0000000000000000 vn="Win32/Exploit.CVE-2010-0822.A trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\data\exploits\CVE-2010-0822.xls" sh=D2F5DAB385B6064277171AE9794FDDB9265EBDD4 ft=0 fh=0000000000000000 vn="MOV/Exploit.CVE-2011-0257.A trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\data\exploits\CVE-2011-0257.mov" sh=81B4610D01A6E5BC0F11DCB2295D53307FC9A217 ft=0 fh=0000000000000000 vn="SWF/Exploit.CVE-2012-0779.A trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\data\exploits\CVE-2012-0779.swf" sh=5BABA2E59AC39EBEEF56F3C70D9E9C279BD27402 ft=0 fh=0000000000000000 vn="JS/Exploit.CVE-2013-0757.A trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\data\exploits\cve-2013-0758.swf" sh=474AF25F548ED4D5C55DA878DCAD35CCE683F988 ft=0 fh=0000000000000000 vn="Java/Exploit.CVE-2010-0842.A trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\data\exploits\CVE-2010-0842\MyController.class" sh=8132723668DBD38A1831761D4B408D7F21B6EA4F ft=0 fh=0000000000000000 vn="Java/Exploit.CVE-2010-3563.A trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\data\exploits\cve-2010-3563\Exploit.class" sh=9BE309632A305898A2AEE16EE7B4E7BD338ACC85 ft=0 fh=0000000000000000 vn="Java/Exploit.Agent.NDP trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\data\exploits\cve-2012-5076\MyPayload.class" sh=7B8470E18AB4226A8AAD2975EDDB32CBE0CCA160 ft=0 fh=0000000000000000 vn="a variant of Win32/Exploit.CVE-2013-0074.BM trojan (deleted - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\data\exploits\cve-2013-0074\SilverApp1.xap" sh=12703BF7CC3F17382FE733492920DCC10915F441 ft=0 fh=0000000000000000 vn="SWF/Exploit.CVE-2013-0634.J trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\data\exploits\CVE-2013-0634\exploit.swf" sh=331E5C746F0FF0CACC784F0281D16D4051F9FB92 ft=0 fh=0000000000000000 vn="a variant of Java/Exploit.CVE-2013-1488.A trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\data\exploits\cve-2013-1488\Exploit.class" sh=404CDEFF86833F4B79CD2656854462A93684C904 ft=0 fh=0000000000000000 vn="a variant of Java/Exploit.CVE-2013-1488.A trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\data\exploits\cve-2013-1488\FakeDriver.class" sh=BBC5F809703B8B114DD4CAF1077BC22A6C0731A6 ft=0 fh=0000000000000000 vn="a variant of Java/Exploit.CVE-2013-1488.J trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\data\exploits\cve-2013-1488\FakeDriver2.class" sh=2E8610A10F5EC990D6865B12C3E19DBC8699C85F ft=0 fh=0000000000000000 vn="a variant of Java/Exploit.CVE-2013-2465.CL trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\data\exploits\CVE-2013-2465\Exploit$MyColorSpace.class" sh=166A7EA7AD8CCAD53259FD3173119227595DDC57 ft=1 fh=2e8d7f481c68d8a2 vn="a variant of Win32/Exploit.CVE-2013-3660.A trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\data\exploits\cve-2013-3660\ppr_flatten_rec.x86.dll" sh=F64190B99080C527CB20ADCD0738243504DE3EC6 ft=1 fh=cfd4bf26c27df062 vn="a variant of Win32/Exploit.CVE-2013-3881.A trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\data\exploits\cve-2013-3881\cve-2013-3881.x86.dll" sh=A325507F4D9AEAEFD41FC437B4357C58996973E2 ft=0 fh=0000000000000000 vn="SWF/Exploit.CVE-2013-5331.B trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\data\exploits\CVE-2013-5331\Exploit.swf" sh=6359A48F39E13ED9D034076F6B39C53EC6F89FAF ft=0 fh=0000000000000000 vn="SWF/Exploit.CVE-2014-0322.A trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\data\exploits\CVE-2014-0322\AsXploit.swf" sh=BEA6AF09B27E7D89FD8DA7127B986CD83352548B ft=1 fh=d437edd3f3052b04 vn="Win32/Meterpreter.A potentially unsafe application (deleted - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\data\meterpreter\metsvc-server.exe" sh=E67C130183EE4EA8BF9C6F14F573E7918AC67DFC ft=0 fh=0000000000000000 vn="PHP/Exploit.Agent.NAC trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\data\php\reverse_tcp.php" sh=D6140DA72517565583BEA0C37E879ED5DC996C40 ft=0 fh=0000000000000000 vn="OSX/Getshell.F trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\data\templates\template_x64_darwin.bin" sh=E654DFA6B7E8364047C8C3356B24ECAFCAD4D729 ft=0 fh=0000000000000000 vn="JS/TrojanDownloader.Agent.GJ trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\lib\rex\exploitation\heaplib.js.b64" sh=0C6586E71F3F1BCDF41C65A4B65AB080B83CDD92 ft=0 fh=0000000000000000 vn="JS/Exploit.Shellcode.A.gen trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\modules\exploits\linux\misc\mongod_native_helper.rb" sh=B157798803114C46C9D5D033F9085499C2F922F1 ft=0 fh=0000000000000000 vn="JS/Exploit.CVE-2006-0295.A trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\modules\exploits\multi\browser\firefox_queryinterface.rb" sh=08F4299862EFE9F76EC716D9DB44D25A0CDC3071 ft=0 fh=0000000000000000 vn="JS/Exploit.CVE-2006-3677.A trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\modules\exploits\multi\browser\mozilla_navigatorjava.rb" sh=C9A9769FCE3E7DF35058A7A56E8203ECF8BE01C2 ft=0 fh=0000000000000000 vn="JS/Exploit.CVE-2013-1347.B.Gen trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\modules\exploits\windows\browser\ie_cgenericelement_uaf.rb" sh=D1D57E0BE1C57688EB9CF892D77039635E10AA8F ft=0 fh=0000000000000000 vn="JS/Exploit.CVE-2006-4704.A trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\modules\exploits\windows\browser\ie_createobject.rb" sh=08258E2B962F728FA05B3BFE79D1F8CC1FC755D2 ft=0 fh=0000000000000000 vn="Java/Exploit.CVE-2010-3552.A trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\modules\exploits\windows\browser\java_docbase_bof.rb" sh=D0113593A188F9C68BA6963575D007B97AD68BA7 ft=0 fh=0000000000000000 vn="JS/Exploit.CVE-2013-0753.A trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\modules\exploits\windows\browser\mozilla_firefox_xmlserializer.rb" sh=2C90DF4B38A88FF8DFF73DBFDED0FF711D6C0D2E ft=0 fh=0000000000000000 vn="JS/Exploit.CVE-2011-2371.A trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\modules\exploits\windows\browser\mozilla_reduceright.rb" sh=601802C3D30FACBFFBF79CF24A2F835AACA9B08B ft=0 fh=0000000000000000 vn="JS/Exploit.CVE-2009-3672.A trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\modules\exploits\windows\browser\ms09_072_style_object.rb" sh=C2132C3CE4EBE789A7640AF77899D0ADDB1D27A3 ft=0 fh=0000000000000000 vn="JS/Exploit.CVE-2010-0249 trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\modules\exploits\windows\browser\ms10_002_aurora.rb" sh=CA5EF4C422EAC29AB3249748E5835B413018CA97 ft=0 fh=0000000000000000 vn="HTML/Exploit.CVE-2010-1885.A trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\modules\exploits\windows\browser\ms10_042_helpctr_xss_cmd_exec.rb" sh=4E317A1553FBB1BA004568AB1479B12A90A63153 ft=0 fh=0000000000000000 vn="JS/Exploit.CVE-2012-1876.A trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\modules\exploits\windows\browser\ms12_037_ie_colspan.rb" sh=E58171DCF44107A85CB8762FF8929ECAA156C831 ft=0 fh=0000000000000000 vn="JS/Exploit.CVE-2013-2551.A.Gen trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\modules\exploits\windows\browser\ms13_037_svg_dashstyle.rb" sh=72AF3CEC0AAE76481E8958D40EB0A8259AE9E52A ft=0 fh=0000000000000000 vn="Win32/Exploit.CVE-2014-0322.A trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\modules\exploits\windows\browser\ms14_012_cmarkup_uaf.rb" sh=87D1A9A164475D65465C99FB235F87A1E2F411EE ft=0 fh=0000000000000000 vn="Win32/Exploit.CVE-2014-6332.F trojan (cleaned by deleting - quarantined)" ac=C fn="C:\metasploit\apps\pro\msf3\modules\exploits\windows\browser\ms14_064_ole_code_execution.rb" sh=FDECF751F8DE3BCAF93060C92B58A377203D875C ft=1 fh=0fa335e29218f3d8 vn="a variant of Win32/NetTool.Incognito.A potentially unsafe application (deleted - quarantined)" ac=C fn="C:\metasploit\apps\pro\vendor\bundle\ruby\2.1.0\gems\meterpreter_bins-0.0.14\meterpreter\ext_server_incognito.x86.dll" sh=D4633248E4D018E8C954EC4CC1661FB87A7631AE ft=1 fh=6696b0b6f8c0f3ab vn="a variant of Win64/HackTool.Mimikatz.H potentially unsafe application (deleted - quarantined)" ac=C fn="C:\metasploit\apps\pro\vendor\bundle\ruby\2.1.0\gems\meterpreter_bins-0.0.14\meterpreter\ext_server_kiwi.x64.dll" sh=8EDFD97B545A002B02BEF15F5C732E12D79594FE ft=1 fh=0b823df0a0463cff vn="a variant of Win64/HackTool.Mimikatz.I potentially unsafe application (deleted - quarantined)" ac=C fn="C:\metasploit\apps\pro\vendor\bundle\ruby\2.1.0\gems\meterpreter_bins-0.0.14\meterpreter\ext_server_mimikatz.x64.dll" sh=E95F0619D89F9D423829746B4FF12BCF4D42C37D ft=1 fh=65fb252e7c6f1842 vn="Win32/Bundled.Toolbar.Ask.L potentially unsafe application (deleted - quarantined)" ac=C fn="C:\Program Files (x86)\Hotspot Shield\Uninstall.exe" sh=BE220B6B8DD4DCDCA42B61216EEAC45CC4F6FB3D ft=0 fh=0000000000000000 vn="multiple threats (deleted - quarantined)" ac=C fn="C:\Users\Martijn\AppData\Local\Google\Chrome\User Data\Default\File System\000\p\00\00000029" sh=4505566684FE95CCB1A3798F29865F9A10A84081 ft=0 fh=0000000000000000 vn="Win32/Bundled.Toolbar.Ask.L potentially unsafe application (deleted - quarantined)" ac=C fn="C:\Users\Martijn\AppData\Local\temp\Hotspot Shield\html\scripts\AskToolbar.js" sh=FF00F68B03F7BBC785284ABD95A54D5B98F7DB9B ft=0 fh=0000000000000000 vn="a variant of MSIL/HackTool.LOIC.AB potentially unsafe application (deleted - quarantined)" ac=C fn="C:\Users\Martijn\Desktop\LOIC-1.0.8-binary.zip" sh=BE220B6B8DD4DCDCA42B61216EEAC45CC4F6FB3D ft=0 fh=0000000000000000 vn="multiple threats (deleted - quarantined)" ac=C fn="C:\Users\Martijn\Desktop\rotzooi+stuff\DarkComet.zip" sh=3983C1E3D8BA62C08906B2E21649188959F06AA2 ft=1 fh=d94b26ca14e35a70 vn="Win32/Bundled.Toolbar.Ask.L potentially unsafe application (deleted - quarantined)" ac=C fn="C:\Users\Martijn\Downloads\HSS-3.42-install-plain-701-plain.exe" sh=3DC7906143EB99886B1B068AF9E00BA5366E03B7 ft=1 fh=cf4866732e0b1b51 vn="Win32/Bundled.Toolbar.Ask.L potentially unsafe application (deleted - quarantined)" ac=C fn="C:\Users\Martijn\Downloads\HSS-3.42-install-plain-702-plain.exe" sh=FF00F68B03F7BBC785284ABD95A54D5B98F7DB9B ft=0 fh=0000000000000000 vn="a variant of MSIL/HackTool.LOIC.AB potentially unsafe application (deleted - quarantined)" ac=C fn="C:\Users\Martijn\Downloads\LOIC-1.0.8-binary.zip" sh=0A38187057E3194CA60C51F3BB681889B3052387 ft=0 fh=0000000000000000 vn="Win32/DosAttack.U potentially unsafe application (deleted - quarantined)" ac=C fn="C:\Users\Martijn\Downloads\UDP-Unicorn.zip"