Jump to content

gspal

Members
  • Posts

    2
  • Joined

  • Last visited

Reputation

0 Neutral
  1. Malwarebytes Anti-Malware www.malwarebytes.org Scan Date: 16-09-2014 Scan Time: 08:18:07 Logfile: protection-log-2014-09-16.txt Administrator: Yes Version: 2.00.2.1012 Malware Database: v2014.09.14.09 Rootkit Database: v2014.09.13.01 License: Free Malware Protection: Disabled Malicious Website Protection: Disabled Self-protection: Disabled OS: Windows 7 CPU: x86 File System: NTFS User: Bozo Scan Type: Threat Scan Result: Completed Objects Scanned: 310928 Time Elapsed: 5 min, 21 sec Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Enabled Heuristics: Enabled PUP: Enabled PUM: Enabled Processes: 0 (No malicious items detected) Modules: 0 (No malicious items detected) Registry Keys: 14 Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360tray.exe, , [0823effe3f3ca5911d767add946f43bd], Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\antiviruspro_2010.exe, , [2cff89644833241295b9456a33d0d030], PUP.Optional.IFEO.A, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\bprotect.exe, , [67c443aa19623303721e006948bc1de3], Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\empty.jpg, , [1d0e54990f6cc86e89df00d28c77a35d], Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\HACKER.COM.CN.EXE, , [64c76a83c0bb2c0aebb17f329f64bd43], Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MICROSOFT.EXE, , [e94238b5fb8081b5fcae842eb3505ba5], Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MSA.EXE, , [9e8ddd10b3c8f046eade41718083e818], Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\NEW FOLDER.EXE, , [8ba0e9042f4c5cdaf72bdcd77c87fc04], Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SMSS32.EXE, , [df4cf6f73546e056aa1b5361867dea16], Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SVCH0ST.EXE, , [5ccf88651962df5719e44b6922e147b9], Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SVCHOSTS.EXE, , [f338f5f8e794ab8b15e9951f15ee28d8], Security.Hijack, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\VCLEANER.EXE, , [4ae16786354637ffdcc66d4801025aa6], PUP.Optional.IFEO.A, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WEBSTEROIDS.EXE, , [af7ce706bbc02c0a6d36de8bd034738d], PUP.Optional.IFEO.A, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WEBSTEROIDSSERVICE.EXE, , [60cb27c6d1aa2c0a267eda8fda2a23dd], Registry Values: 0 (No malicious items detected) Registry Data: 0 (No malicious items detected) Folders: 0 (No malicious items detected) Files: 0 (No malicious items detected) Physical Sectors: 0 (No malicious items detected) (end)
  2. I have installed Malwarebytes Anti-Malware 2.0.2.1012. On every Threat Scan while it is scanning, only while doing Heuristic Analysis the same 14 threats are listed over-and-over which I quarantine. Where is the problem? Why the 14 threats getting repeated? The logfile is detailed below: <?xml version="1.0" encoding="UTF-16" ?> <mbam-log> <header> <date>2014/09/14 20:16:32 +0530</date> <logfile>mbam-log-2014-09-14 (20-16-32).xml</logfile> <isadmin>yes</isadmin> </header> <engine> <version>2.00.2.1012</version> <malware-database>v2014.09.10.09</malware-database> <rootkit-database>v2014.09.10.02</rootkit-database> <license>free</license> <file-protection>disabled</file-protection> <web-protection>disabled</web-protection> <self-protection>disabled</self-protection> </engine> <system> <osversion>Windows 7</osversion> <arch>x86</arch> <username>Bozo</username> <filesys>NTFS</filesys> </system> <summary> <type>threat</type> <result>completed</result> <objects>309982</objects> <time>331</time> <processes>0</processes> <modules>0</modules> <keys>14</keys> <values>0</values> <datas>0</datas> <folders>0</folders> <files>0</files> <sectors>0</sectors> </summary> <options> <memory>enabled</memory> <startup>enabled</startup> <filesystem>enabled</filesystem> <archives>enabled</archives> <rootkits>enabled</rootkits> <deeprootkit>disabled</deeprootkit> <heuristics>enabled</heuristics> <pup>enabled</pup> <pum>enabled</pum> </options> <items> <key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360tray.exe</path><vendor>Security.Hijack</vendor><action>success</action><hash>58a810dc601bce68e216232f3ac9d52b</hash></key> <key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\antiviruspro_2010.exe</path><vendor>Security.Hijack</vendor><action>success</action><hash>b14f9f4d9ae1df57743f02a8788b32ce</hash></key> <key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\bprotect.exe</path><vendor>PUP.Optional.IFEO.A</vendor><action>success</action><hash>31cfdc104635ca6ca5509dc7be467e82</hash></key> <key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\empty.jpg</path><vendor>Security.Hijack</vendor><action>success</action><hash>06fae705a4d743f31db0606d04fffb05</hash></key> <key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\HACKER.COM.CN.EXE</path><vendor>Security.Hijack</vendor><action>success</action><hash>f60a1ad2f58691a54fb2d2dba261d42c</hash></key> <key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MICROSOFT.EXE</path><vendor>Security.Hijack</vendor><action>success</action><hash>9d63f3f9bebdb87efe11a806d82bb44c</hash></key> <key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MSA.EXE</path><vendor>Security.Hijack</vendor><action>success</action><hash>000029c3f08bcf67f8352886f211936d</hash></key> <key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\NEW FOLDER.EXE</path><vendor>Security.Hijack</vendor><action>success</action><hash>7d83f0fc304b1d198304f9b52fd4fa06</hash></key> <key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SMSS32.EXE</path><vendor>Security.Hijack</vendor><action>success</action><hash>c33d6686007b7db91911d3ddb44f43bd</hash></key> <key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SVCH0ST.EXE</path><vendor>Security.Hijack</vendor><action>success</action><hash>09f76b819cdf1c1aacb6bef243c07c84</hash></key> <key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SVCHOSTS.EXE</path><vendor>Security.Hijack</vendor><action>success</action><hash>09f7c725b7c482b492d1189805fe817f</hash></key> <key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\VCLEANER.EXE</path><vendor>Security.Hijack</vendor><action>success</action><hash>0af600ecdc9f65d120e7555c6a995ba5</hash></key> <key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WEBSTEROIDS.EXE</path><vendor>PUP.Optional.IFEO.A</vendor><action>success</action><hash>d42ca7452358c96d19ef2a3bc83c31cf</hash></key> <key><path>HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WEBSTEROIDSSERVICE.EXE</path><vendor>PUP.Optional.IFEO.A</vendor><action>success</action><hash>e41c83695a21261046c3a1c4699bca36</hash></key> </items> </mbam-log>
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.