Format du document : text/plain
Prévisualisation
Malwarebytes
www.malwarebytes.com
-Log Details-
Scan Date: 8/15/17
Scan Time: 8:40 PM
Log File: Malwarebytes rapport.txt
Administrator: Yes
-Software Information-
Version: 3.1.2.1733
Components Version: 1.0.160
Update Package Version: 1.0.2594
License: Trial
-System Information-
OS: Windows 10 (Build 14393.1480)
CPU: x64
File System: NTFS
User: DESKTOP-RTGQU92\User
-Scan Summary-
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 380549
Threats Detected: 23
Threats Quarantined: 20
Time Elapsed: 19 min, 20 sec
-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled
-Scan Details-
Process: 1
Trojan.Agent, C:\USERS\USER\APPDATA\LOCAL\TEMP\WINDOWS.EXE, Quarantined, [19], [190819],1.0.2594
Module: 1
Trojan.Agent, C:\USERS\USER\APPDATA\LOCAL\TEMP\WINDOWS.EXE, Quarantined, [19], [190819],1.0.2594
Registry Key: 1
PUP.Optional.InstallCore, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\FormatFactory, Quarantined, [2], [387418],1.0.2594
Registry Value: 1
Trojan.Agent, HKU\S-1-5-21-4013367368-3906124042-1398158133-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|B26E479C3604B4A7156D0D9CFCF97A7B, Quarantined, [19], [190819],1.0.2594
Registry Data: 0
(No malicious items detected)
Data Stream: 0
(No malicious items detected)
Folder: 0
(No malicious items detected)
File: 19
Backdoor.NJRat, C:\USERS\USER\APPDATA\ROAMING\RUGLAND DIGITAL SYSTEMS\RUGLAND PACKER FOR (.NET) EXECUTABLES\1.3.0.0\-1705343811_SERVER.EXE.JUNK, Quarantined, [135], [277642],1.0.2594
Backdoor.Bot.MSIL, C:\USERS\USER\DESKTOP\KWIPPAGPJ.ZIP, Quarantined, [2521], [42240],1.0.2594
Trojan.Downloader.MSIL, C:\USERS\USER\DESKTOP\CRYPTADOOO.EXE, Removal Failed, [390], [286385],1.0.2594
PUP.Optional.InstallCore, C:\PROGRAM FILES (X86)\FORMATFACTORY\UNINST.EXE, Quarantined, [2], [387418],1.0.2594
PUP.Optional.GameHack, C:\PROGRAM FILES (X86)\CHEAT ENGINE 6.6\STANDALONEPHASE1.DAT, Quarantined, [676], [393793],1.0.2594
Trojan.Downloader.MSIL, C:\USERS\USER\DESKTOP\CRYPTADO.EXE, Removal Failed, [390], [286385],1.0.2594
Trojan.Downloader.MSIL, C:\USERS\USER\APPDATA\ROAMING\MICROSOFT\WINDOWS\START MENU\PROGRAMS\STARTUP\F8C81E6B9BA776B6A5A3F0541D81A09B.EXE, Removal Failed, [390], [286385],1.0.2594
Trojan.Agent.GenX, C:\USERS\USER\APPDATA\ROAMING\MICROSOFT\WINDOWS\START MENU\PROGRAMS\STARTUP\B26E479C3604B4A7156D0D9CFCF97A7B.EXE, Quarantined, [4190], [402104],1.0.2594
Backdoor.NJRat, C:\USERS\USER\DOCUMENTS\SERVER.EXE, Quarantined, [135], [277642],1.0.2594
Backdoor.Bladabindi, C:\USERS\USER\APPDATA\LOCALYNUHAKCZVT.EXE, Quarantined, [186], [422489],1.0.2594
PUP.Optional.ChromePasswordTool, C:\USERS\USER\DOWNLOADS\EXPLOIT-USB.ZIP, Quarantined, [3576], [299431],1.0.2594
Backdoor.Bladabindi, C:\USERS\USER\APPDATA\LOCALGALFHTCNIQ.EXE, Quarantined, [186], [422489],1.0.2594
Trojan.Agent.E.Generic, C:\USERS\USER\APPDATA\LOCALELLUOGPTSX.EXE, Quarantined, [1053], [367666],1.0.2594
PUP.Optional.MindSpark, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\LOCAL STORAGE\http_fromdoctopdf.dl.myway.com_0.localstorage, Quarantined, [257], [240305],1.0.2594
PUP.Optional.MindSpark, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\LOCAL STORAGE\http_fromdoctopdf.dl.myway.com_0.localstorage-journal, Quarantined, [257], [240305],1.0.2594
PUP.Optional.MindSpark, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\LOCAL STORAGE\http_fromdoctopdf.dl.tb.ask.com_0.localstorage, Quarantined, [257], [240306],1.0.2594
PUP.Optional.MindSpark, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\LOCAL STORAGE\http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal, Quarantined, [257], [240306],1.0.2594
Backdoor.Bot, C:\USERS\USER\DESKTOP\BD2.NET INJECTOR\BD2.NET INJECTOR.EXE, Quarantined, [48], [4652],1.0.2594
Trojan.Agent, C:\USERS\USER\APPDATA\LOCAL\TEMP\WINDOWS.EXE, Quarantined, [19], [190819],1.0.2594
Physical Sector: 0
(No malicious items detected)
(end)