Malwarebytes Anti-Malware
www.malwarebytes.org
Scan Date: 8/31/2015
Scan Time: 8:55 PM
Logfile:
Administrator: Yes
Version: 2.1.8.1057
Malware Database: v2015.08.31.04
Rootkit Database: v2015.08.16.01
License: Premium
Malware Protection: Enabled
Malicious Website Protection: Enabled
Self-protection: Disabled
OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: Administrator
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 454915
Time Elapsed: 11 min, 27 sec
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Warn
PUM: Enabled
Processes: 0
(No malicious items detected)
Modules: 0
(No malicious items detected)
Registry Keys: 9
PUP.Optional.ConduitTB.Gen, HKLM\SOFTWARE\CLASSES\Toolbar.CT2436433, Quarantined, [aab623ec98f37db9c1b984eb5aaa47b9],
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\TEAMVIEWER.EXE, Quarantined, [421e937c9eed999d6986593c30d40ff1],
PUP.Optional.AmiUpdater, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\amiupdaterExd, Delete-on-Reboot, [2b356ba457344de97324d7a37c88de22],
PUP.Optional.AmiUpdater, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\amiupdaterExi, Delete-on-Reboot, [0b55a7683b50ba7caaed5921986c3ec2],
PUP.Optional.ConduitTB.Gen, HKLM\SOFTWARE\WOW6432NODE\CLASSES\Toolbar.CT2436433, Quarantined, [dd836aa5b6d5d264db9f4b2436ce28d8],
PUP.Optional.Conduit, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{AFDBDDAA-5D3F-42EE-B79C-185A7020515B}, Quarantined, [2838c54aadde2214290e1074768ebd43],
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\TEAMVIEWER.EXE, Quarantined, [471920ef4b40c96dfcf3c6cfb64e6997],
PUP.Optional.Conduit, HKU\S-1-5-18\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{AFDBDDAA-5D3F-42EE-B79C-185A7020515B}, Quarantined, [9ac63ed15e2d65d131f9f391ca3ab64a],
PUP.Optional.Conduit, HKU\S-1-5-21-2234102896-892872682-4225496042-500\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{AFDBDDAA-5D3F-42EE-B79C-185A7020515B}, Quarantined, [ea76a46ba9e2cb6b77b388fc9272e818],
Registry Values: 5
PUP.Optional.IFEO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\TEAMVIEWER.EXE|Debugger, "C:\Program Files (x86)\TuneUp Utilities 2014\TUAutoReactivator64.exe", Quarantined, [421e937c9eed999d6986593c30d40ff1]
PUP.Optional.Conduit, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{afdbddaa-5d3f-42ee-b79c-185a7020515b}|URL, http://search.conduit.com/ResultsExt.aspx?q={searchTerms}&SearchSource=4&ctid=CT2604146, Quarantined, [2838c54aadde2214290e1074768ebd43]
PUP.Optional.IFEO, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\TEAMVIEWER.EXE|Debugger, "C:\Program Files (x86)\TuneUp Utilities 2014\TUAutoReactivator64.exe", Quarantined, [471920ef4b40c96dfcf3c6cfb64e6997]
PUP.Optional.Conduit, HKU\S-1-5-18\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{afdbddaa-5d3f-42ee-b79c-185a7020515b}|URL, http://search.conduit.com/ResultsExt.aspx?q={searchTerms}&SearchSource=4&ctid=CT2436433, Quarantined, [9ac63ed15e2d65d131f9f391ca3ab64a]
PUP.Optional.Conduit, HKU\S-1-5-21-2234102896-892872682-4225496042-500\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{afdbddaa-5d3f-42ee-b79c-185a7020515b}|URL, http://search.conduit.com/ResultsExt.aspx?q={searchTerms}&SearchSource=4&ctid=CT2604146, Quarantined, [ea76a46ba9e2cb6b77b388fc9272e818]
Registry Data: 0
(No malicious items detected)
Folders: 1
PUP.Optional.ConduitTB.Gen, C:\Program Files (x86)\Conduit\Community Alerts, Quarantined, [f66a0c03bccf280e49611fddef135ba5],
Files: 1
CrackTool.Agent, C:\$Recycle.Bin\S-1-5-21-2234102896-892872682-4225496042-500\$RM7PA55.exe, Quarantined, [2d33b8573457cb6b263ef006aa561be5],
Physical Sectors: 0
(No malicious items detected)
(end)