cjoint

Publicité


Publicité

Format du document : text/plain

Prévisualisation

Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 26/03/2016
Scan Time: 01:43 ã
Logfile: 8.txt
Administrator: Yes

Version: 2.2.1.1043
Malware Database: v2016.03.26.03
Rootkit Database: v2016.03.12.01
License: Trial
Malware Protection: Enabled
Malicious Website Protection: Enabled
Self-protection: Disabled

OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: sama office

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 355201
Time Elapsed: 22 min, 12 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Registry Keys: 12
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BITGUARD.EXE, Quarantined, [74e72963217823135fa73ce109fbf60a],
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BPROTECT.EXE, Quarantined, [4d0e95f732673ff76e99dc41d33152ae],
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BROWSERDEFENDER.EXE, Quarantined, [8bd04a42bfda2b0bfd0d8f8e18ecca36],
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BROWSERPROTECT.EXE, Quarantined, [fa61ddafd3c66ec8d933130a5ca8bf41],
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\VOLARO, Quarantined, [9dbebad253467db9e57655c83aca8b75],
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\VONTEERA, Quarantined, [8ecd8606b8e11224c894f924907454ac],
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BITGUARD.EXE, Quarantined, [0b5055373663bb7b699d0a13cd379d63],
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BPROTECT.EXE, Quarantined, [c794e7a5940554e23bccd746aa5a28d8],
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BROWSERDEFENDER.EXE, Quarantined, [79e2ee9e9aff55e1d3378a93cd371de3],
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BROWSERPROTECT.EXE, Quarantined, [f56604889207a6901eeead708d77e719],
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\VOLARO, Quarantined, [0e4d3e4e940564d2b4a7829b3acad030],
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\VONTEERA, Quarantined, [9dbebbd14a4f0333c597df3eda2a8e72],

Registry Values: 12
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BITGUARD.EXE|debugger, tasklist.exe, Quarantined, [74e72963217823135fa73ce109fbf60a]
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BPROTECT.EXE|debugger, tasklist.exe, Quarantined, [4d0e95f732673ff76e99dc41d33152ae]
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BROWSERDEFENDER.EXE|debugger, tasklist.exe, Quarantined, [8bd04a42bfda2b0bfd0d8f8e18ecca36]
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BROWSERPROTECT.EXE|debugger, tasklist.exe, Quarantined, [fa61ddafd3c66ec8d933130a5ca8bf41]
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\VOLARO|debugger, tasklist.exe, Quarantined, [9dbebad253467db9e57655c83aca8b75]
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\VONTEERA|debugger, tasklist.exe, Quarantined, [8ecd8606b8e11224c894f924907454ac]
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BITGUARD.EXE|debugger, tasklist.exe, Quarantined, [0b5055373663bb7b699d0a13cd379d63]
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BPROTECT.EXE|debugger, tasklist.exe, Quarantined, [c794e7a5940554e23bccd746aa5a28d8]
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BROWSERDEFENDER.EXE|debugger, tasklist.exe, Quarantined, [79e2ee9e9aff55e1d3378a93cd371de3]
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BROWSERPROTECT.EXE|debugger, tasklist.exe, Quarantined, [f56604889207a6901eeead708d77e719]
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\VOLARO|debugger, tasklist.exe, Quarantined, [0e4d3e4e940564d2b4a7829b3acad030]
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\VONTEERA|debugger, tasklist.exe, Quarantined, [9dbebbd14a4f0333c597df3eda2a8e72]

Registry Data: 1
PUP.Optional.Qone8, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES|DefaultScope, {33BB0A4E-99AF-4226-BDF6-49120163DE86}, Good: ({0633EE93-D776-472f-A0FF-E1416B8B2E3A}), Bad: ({33BB0A4E-99AF-4226-BDF6-49120163DE86}),Replaced,[0a51e7a5099068ce9d999096b74e8779]

Folders: 0
(No malicious items detected)

Files: 11
CrackTool.Agent.Steam, C:\Program Files (x86)\Pro Evolution Soccer 2016\steam_api.dll, Quarantined, [90cbbbd19ffa3501fd300268818031cf],
PUP.Optional.StartSurf, C:\Users\sama office\AppData\Local\Temp\03db9502.a, Quarantined, [16459cf01f7a82b4ea244993b44df010],
Adware.IStartSurf, C:\Users\sama office\AppData\Local\Temp\03db9c33.a, Quarantined, [4615127aa3f6fc3a92bf738a629fa858],
PUP.Optional.Yontoo, C:\Users\sama office\AppData\Local\Temp\80f9a8e7-059f-44cd-83f6-de0cf978d6b2.dll, Quarantined, [92c91f6d1a7fbf771e899d71ab57f10f],
PUP.Optional.Yontoo, C:\Users\sama office\AppData\Local\Temp\87b93225-de8a-4be9-bfea-82c19d3c730e.dll, Quarantined, [2e2d1d6f25743bfba60132dc1be7c33d],
PUP.Optional.Yontoo, C:\Users\sama office\AppData\Local\Temp\9e107df2-9128-4469-905e-e8ac67608ec0.dll, Quarantined, [86d53d4fd2c7c1756f3840cec63c53ad],
PUP.Optional.Yontoo, C:\Users\sama office\AppData\Local\Temp\a96a9b07-5984-4bf1-ad86-8824f7a73f5d.dll, Quarantined, [fc5f78143b5e9d99ffa831dd27dbb947],
PUP.Optional.Yontoo, C:\Users\sama office\AppData\Local\Temp\fdaa3657-7c15-44b6-8b4a-3d6187d81f56.dll, Quarantined, [a9b213798d0ce74fbfe88787b84a41bf],
PUP.Optional.Yontoo, C:\Users\sama office\AppData\Local\Temp\64724814\ic-0.f0f3004517e19.exe, Quarantined, [2437afdd1782d95dac631bb2a061fa06],
Trojan.Agent.W, C:\Users\sama office\Desktop\100000\qqqqqqqqqqq\ÊÝÚíá æäÏæÒ7 ÇáÇÕáí\Windows 7 Loader.exe, Quarantined, [f8632f5d64354aec4ae70ab245bfdc24],
PUP.Optional.FastStart, C:\Users\sama office\AppData\Roaming\Mozilla\Firefox\Profiles\zb8a5j99.default\prefs.js, Good: (), Bad: (faststartff@gmail.com), Replaced,[98c3a5e7831665d132fa391fd72ea759]

Physical Sectors: 0
(No malicious items detected)


(end)

Publicité


Signaler le contenu de ce document

Publicité