Hi,
I am new to avast! on Linux, and pretty new to Linux.
I’ve run my first complete scan and its results are confusing.
The panel says no infected items were found.
However, I am presented with a long list of files and am offered the options of deleting, moving to chest, or renaming them.
I have listed some of them below. All of the items have the names of legitimate files.
Can anyone look at these and tell me what is going on?
Thank you in advance.
RESULTS OF LAST SCAN:
/usr/lib/cups/backend/tpvmlp
/usr/lib/cups/backend/tpvmgp
/var/log/speech-dispatcher
/var/log/lightdm/lightdm.log
/var/log/btmp
/var/log/installer/casper.log
/var/log/installer/syslog
/var/log/installer/partman
/var/log/installer/debug
/var/log/installer/version
/var/log/upstart/lightdm.log
/var/log/upstart/ureadahead.log.1.gz
/var/log/upstart/vmware-tools.log
/var/log/upstart/rsyslog.log.1.gz
/var/log/upstart/also-restore.log.1.gz
/var/spool/anacron/cron.monthly (and weekly & daily)
/var/spool/postfix/incoming, /corrupt, /defer, /public, /flush, /deferred, /private, /active, /maildrop, /bounce, and /saved
/var/spool/cups
/var/lib/lightdm
/var/lib/sudo
/var/lib/apt/lists/lock
/var/lib/dpkg/lock
/var/backups/group.bak
/var/backups/shadow.bak
/var/backups/passwd.bak
/var/cache/ldconfig
/var/cache/cups/job.cache
a GAZILLION files that start with “/proc”:
“/proc/irq/(number)/…”
“/proc/bus/pci/…”
“/proc/sys/kernel/…”
“/proc/sys/devices/…”
“proc/sys/module/…”
“/proc/(number)/…”
/tmp/pulse…
/tmp/vmware-root…
/root
/etc/fuse.conf
/etc/tripwire…
/etc/security/opasswd
/etc/mtab.fuselock
/etc/cups/ssl
/etc/cups/subscriptions…
/etc/cups/printers.conf
/etc/sudoers.d/README
/etc/.pwd.lock
/etc/shadow-
/etc/group-
/etc/apt/trustdb.gpg
/etc/ppp/chap-secrets
/etc/ppp/pap-secrets
/etc/passwd-
/etc/ssl/private
/etc/apparmor.d…
/etc/at.deny
/etc/gshadow-
/etc/gshadow
/etc/sudoers
/etc/ufw/before.rules
/etc/ufw/after6.rules
/etc/ufw/after.rules
/etc/ufw/before6.rules
/etc/shadow
/run/udisks2
/run/vmblock-fuse/dev
/run/crond.reboot
/run/lightdm
/run/cups/certs
/run/user/www-data
/run/user/.www-data.lock
/run/lock/whoopsie/lock
/lib/firmware…
/boot/vmlinuz-3.5.0.21-generic
/boot/System.map-3.6.0-17-generic
/boot/System.map-3.5.0.21-generic
/lost+found