Malwarebytes www.malwarebytes.com -Log Details- Scan Date: 8/15/17 Scan Time: 8:40 PM Log File: Malwarebytes rapport.txt Administrator: Yes -Software Information- Version: 3.1.2.1733 Components Version: 1.0.160 Update Package Version: 1.0.2594 License: Trial -System Information- OS: Windows 10 (Build 14393.1480) CPU: x64 File System: NTFS User: DESKTOP-RTGQU92\User -Scan Summary- Scan Type: Threat Scan Result: Completed Objects Scanned: 380549 Threats Detected: 23 Threats Quarantined: 20 Time Elapsed: 19 min, 20 sec -Scan Options- Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Enabled Heuristics: Enabled PUP: Enabled PUM: Enabled -Scan Details- Process: 1 Trojan.Agent, C:\USERS\USER\APPDATA\LOCAL\TEMP\WINDOWS.EXE, Quarantined, [19], [190819],1.0.2594 Module: 1 Trojan.Agent, C:\USERS\USER\APPDATA\LOCAL\TEMP\WINDOWS.EXE, Quarantined, [19], [190819],1.0.2594 Registry Key: 1 PUP.Optional.InstallCore, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\FormatFactory, Quarantined, [2], [387418],1.0.2594 Registry Value: 1 Trojan.Agent, HKU\S-1-5-21-4013367368-3906124042-1398158133-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|B26E479C3604B4A7156D0D9CFCF97A7B, Quarantined, [19], [190819],1.0.2594 Registry Data: 0 (No malicious items detected) Data Stream: 0 (No malicious items detected) Folder: 0 (No malicious items detected) File: 19 Backdoor.NJRat, C:\USERS\USER\APPDATA\ROAMING\RUGLAND DIGITAL SYSTEMS\RUGLAND PACKER FOR (.NET) EXECUTABLES\1.3.0.0\-1705343811_SERVER.EXE.JUNK, Quarantined, [135], [277642],1.0.2594 Backdoor.Bot.MSIL, C:\USERS\USER\DESKTOP\KWIPPA‮GPJ.ZIP, Quarantined, [2521], [42240],1.0.2594 Trojan.Downloader.MSIL, C:\USERS\USER\DESKTOP\CRYPTADOOO.EXE, Removal Failed, [390], [286385],1.0.2594 PUP.Optional.InstallCore, C:\PROGRAM FILES (X86)\FORMATFACTORY\UNINST.EXE, Quarantined, [2], [387418],1.0.2594 PUP.Optional.GameHack, C:\PROGRAM FILES (X86)\CHEAT ENGINE 6.6\STANDALONEPHASE1.DAT, Quarantined, [676], [393793],1.0.2594 Trojan.Downloader.MSIL, C:\USERS\USER\DESKTOP\CRYPTADO.EXE, Removal Failed, [390], [286385],1.0.2594 Trojan.Downloader.MSIL, C:\USERS\USER\APPDATA\ROAMING\MICROSOFT\WINDOWS\START MENU\PROGRAMS\STARTUP\F8C81E6B9BA776B6A5A3F0541D81A09B.EXE, Removal Failed, [390], [286385],1.0.2594 Trojan.Agent.GenX, C:\USERS\USER\APPDATA\ROAMING\MICROSOFT\WINDOWS\START MENU\PROGRAMS\STARTUP\B26E479C3604B4A7156D0D9CFCF97A7B.EXE, Quarantined, [4190], [402104],1.0.2594 Backdoor.NJRat, C:\USERS\USER\DOCUMENTS\SERVER.EXE, Quarantined, [135], [277642],1.0.2594 Backdoor.Bladabindi, C:\USERS\USER\APPDATA\LOCALYNUHAKCZVT.EXE, Quarantined, [186], [422489],1.0.2594 PUP.Optional.ChromePasswordTool, C:\USERS\USER\DOWNLOADS\EXPLOIT-USB.ZIP, Quarantined, [3576], [299431],1.0.2594 Backdoor.Bladabindi, C:\USERS\USER\APPDATA\LOCALGALFHTCNIQ.EXE, Quarantined, [186], [422489],1.0.2594 Trojan.Agent.E.Generic, C:\USERS\USER\APPDATA\LOCALELLUOGPTSX.EXE, Quarantined, [1053], [367666],1.0.2594 PUP.Optional.MindSpark, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\LOCAL STORAGE\http_fromdoctopdf.dl.myway.com_0.localstorage, Quarantined, [257], [240305],1.0.2594 PUP.Optional.MindSpark, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\LOCAL STORAGE\http_fromdoctopdf.dl.myway.com_0.localstorage-journal, Quarantined, [257], [240305],1.0.2594 PUP.Optional.MindSpark, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\LOCAL STORAGE\http_fromdoctopdf.dl.tb.ask.com_0.localstorage, Quarantined, [257], [240306],1.0.2594 PUP.Optional.MindSpark, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\LOCAL STORAGE\http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal, Quarantined, [257], [240306],1.0.2594 Backdoor.Bot, C:\USERS\USER\DESKTOP\BD2.NET INJECTOR\BD2.NET INJECTOR.EXE, Quarantined, [48], [4652],1.0.2594 Trojan.Agent, C:\USERS\USER\APPDATA\LOCAL\TEMP\WINDOWS.EXE, Quarantined, [19], [190819],1.0.2594 Physical Sector: 0 (No malicious items detected) (end)