Zemana AntiMalware 2.72.2.388 (instalační verze)
-------------------------------------------------------
Scan Result : Dokončeno
Scan Date : 2017/5/20
Operating System : Windows 8.1 64-bit
Processor : 2X Intel(R) Pentium(R) CPU G3258 @ 3.20GHz
BIOS Mode : UEFI
CUID : 12FFAEABB2CCE5762338DC
Scan Type : Skenování systému
Duration : 59m 51s
Scanned Objects : 168551
Detected Objects : 5
Excluded Objects : 0
Read Level : SCSI
Auto Upload : Zapnuto
Detect All Extensions : Vypnuto
Scan Documents : Vypnuto
Domain Info : WORKGROUP,0,2
Detected Objects
-------------------------------------------------------
FormatFactory.exe
Status : Skenováno
Object : %programfiles%\freetime\formatfactory\formatfactory.exe
MD5 : C579720B8E56C9D0D35FFB8EBAB4E30E
Publisher : chen jun hao
Size : 5724488
Version : 3.5.0.0
Detection : PUA:Win32/FormatFactory!Ep
Cleaning Action : Karanténa
Related Objects :
Soubor - %programfiles%\freetime\formatfactory\formatfactory.exe
Odkaz - C:\Users\Tomas\Desktop\Format Factory.lnk
Activate8.1x86.exe
Status : Skenováno
Object : %userprofile%\downloads\windows 8.1 pro cz\aktivator-windows-8.1-zdarma-a-fungční-100%\aktiv_trvalo\activate8.1x86.exe
MD5 : 0ED5CB91C82ACD25528FCE1268ED61FD
Publisher : -
Size : 5500416
Version : 4.8.0.0
Detection : PUA:Win32/HackTool.Gen
Cleaning Action : Karanténa
Related Objects :
Soubor - %userprofile%\downloads\windows 8.1 pro cz\aktivator-windows-8.1-zdarma-a-fungční-100%\aktiv_trvalo\activate8.1x86.exe
Activate8.1x64.exe
Status : Skenováno
Object : %userprofile%\downloads\windows 8.1 pro cz\aktivator-windows-8.1-zdarma-a-fungční-100%\aktiv_trvalo\activate8.1x64.exe
MD5 : BD4F697F9260422C6242F5F88701EB4E
Publisher : -
Size : 5499904
Version : 4.8.0.0
Detection : PUA:Win32/HackTool.Gen
Cleaning Action : Karanténa
Related Objects :
Soubor - %userprofile%\downloads\windows 8.1 pro cz\aktivator-windows-8.1-zdarma-a-fungční-100%\aktiv_trvalo\activate8.1x64.exe
HPU_v2.2.3.exe
Status : Skenováno
Object : %userprofile%\downloads\hpu_v2.2.3.exe
MD5 : F06AFCD0C4501CF93C8BF915CB0404CE
Publisher : Freemium GmbH
Size : 553712
Version : 3.1.0.201
Detection : Adware:Win32/OutBrowse!Ep
Cleaning Action : Karanténa
Related Objects :
Soubor - %userprofile%\downloads\hpu_v2.2.3.exe
Extreme Injector v3.exe
Status : Skenováno
Object : %userprofile%\downloads\far_fix\far_fix\extreme injector v3.exe
MD5 : 367DB1BF932FFC1EFAC3EBCA54897C85
Publisher : -
Size : 1342976
Version : 3.3.0.0
Detection : Adware:Win32/Fortif.A!Aeee
Cleaning Action : Karanténa
Related Objects :
Soubor - %userprofile%\downloads\far_fix\far_fix\extreme injector v3.exe
Cleaning Result
-------------------------------------------------------
Cleaned : 5
Reported as safe : 0
Failed : 0
_____________
Zoek.exe v5.0.0.1 Updated 27-09-2015
Tool run by Tomas on so 20. 05. 2017 at 15:42:56,11.
Microsoft Windows 8.1 Pro 6.3.9600 x64
Running in: Normal Mode No Internet Access Detected
Launched: C:\Users\Tomas\Downloads\zoek.exe [Scan all users] [Script inserted]
==== System Restore Info ======================
20. 5. 2017 15:43:58 Zoek.exe System Restore Point Created Successfully.
==== Reset Hosts File ======================
# Copyright (c) 1993-2006 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
127.0.0.1 localhost
==== Empty Folders Check ======================
C:\PROGRA~2\R.G. Mechanics deleted successfully
C:\PROGRA~2\REPACKY BY TOMI2K9 deleted successfully
C:\PROGRA~2\Rockstar Games deleted successfully
C:\PROGRA~2\COMMON~1\AV deleted successfully
C:\PROGRA~2\COMMON~1\Symantec Shared deleted successfully
C:\Program Files\Google deleted successfully
C:\Program Files\Rockstar Games deleted successfully
C:\Users\Tomas\AppData\Roaming\Driver-Soft deleted successfully
C:\Users\Tomas\AppData\Roaming\Mount&Blade Warband deleted successfully
C:\Users\Tomas\AppData\Roaming\Publish Providers deleted successfully
C:\Users\Tomas\AppData\Local\EmieSiteList deleted successfully
C:\Users\Tomas\AppData\Local\EmieUserList deleted successfully
C:\Users\Tomas\AppData\Local\PackageStaging deleted successfully
C:\Users\Tomas\AppData\Local\Skype deleted successfully
C:\WINDOWS\serviceprofiles\networkservice\AppData\Local\PeerDistPub deleted successfully
C:\WINDOWS\serviceprofiles\networkservice\AppData\Local\PeerDistRepub deleted successfully
==== Deleting CLSID Registry Keys ======================
==== Deleting CLSID Registry Values ======================
==== Deleting Services ======================
==== Deleting Files \ Folders ======================
C:\PROGRA~2\R.G. Mechanics not found
C:\PROGRA~2\REPACKY BY TOMI2K9 not found
C:\PROGRA~2\Rockstar Games not found
C:\PROGRA~3\Package Cache deleted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Search.lnk deleted
C:\windows\SysNative\GroupPolicy\Machine deleted
C:\windows\SysNative\GroupPolicy\User deleted
"C:\Users\Tomas\AppData\Roaming\PlaysTV\playstv.cfg" deleted
"C:\Users\Tomas\AppData\Roaming\PlaysTV" deleted
==== Chromium Look ======================
HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\Extensions
lmjegmlicamnimmfhcmpkclmigmmcbeh - No path found[]
Show Image Info - Tomas\AppData\Local\Google\Chrome\User Data\Default\Extensions\hbihagiibpgbmmfcdkbnlnoiegmkeiki
Chrome Media Router - Tomas\AppData\Local\Google\Chrome\User Data\Default\Extensions\pkedcjkdefgpdelpbcmbmeomcjbeemfm
==== Chromium Fix ======================
C:\Users\Tomas\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.azlyrics.com_0.localstorage deleted successfully
C:\Users\Tomas\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.azlyrics.com_0.localstorage-journal deleted successfully
C:\Users\Tomas\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_c.betrad.com_0.localstorage deleted successfully
C:\Users\Tomas\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_c.betrad.com_0.localstorage-journal deleted successfully
C:\Users\Tomas\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_mystartab.com_0.localstorage deleted successfully
C:\Users\Tomas\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_mystartab.com_0.localstorage-journal deleted successfully
C:\Users\Tomas\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_search.mystartabsearch.com_0.localstorage deleted successfully
C:\Users\Tomas\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_search.mystartabsearch.com_0.localstorage-journal deleted successfully
==== Set IE to Default ======================
Old Values:
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Use Search Asst"="yes"
New Values:
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Start Page"="http://go.microsoft.com/fwlink/?LinkId=69157"
"Use Search Asst"="no"
==== All HKCU SearchScopes ======================
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes
"DefaultScope"="{0633EE93-D776-472f-A0FF-E1416B8B2E3A}"
{012E1000-F331-11DB-8314-0800200C9A66} Google Url="http://www.google.com/search?q={searchTerms}"
{0633EE93-D776-472f-A0FF-E1416B8B2E3A} Bing Url="http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IESR02"
{6A1806CD-94D4-4689-BA73-E35EA1EA9990} Google Url="http://www.google.com/search?q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&sourceid=ie7"
==== Reset Google Chrome ======================
C:\Users\Tomas\AppData\Local\Google\Chrome\User Data\Default\Preferences was reset successfully
C:\Users\Tomas\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences was reset successfully
C:\Users\Tomas\AppData\Local\Google\Chrome\User Data\Default\Web Data was reset successfully
C:\Users\Tomas\AppData\Local\Google\Chrome\User Data\Default\Web Data-journal was reset successfully
C:\Users\Tomas\AppData\Local\Google\Chrome\User Data\Profile 1\Web Data was reset successfully
C:\Users\Tomas\AppData\Local\Google\Chrome\User Data\Profile 1\Web Data-journal was reset successfully
==== Empty IE Cache ======================
C:\WINDOWS\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5 emptied successfully
C:\Users\Tomas\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\WINDOWS\sysWoW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\WINDOWS\sysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\Users\Tomas\AppData\Local\Microsoft\Windows\INetCache\IE emptied successfully
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE emptied successfully
C:\WINDOWS\sysWoW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE emptied successfully
==== Empty FireFox Cache ======================
No FireFox Profiles found
==== Empty Chrome Cache ======================
C:\Users\Tomas\AppData\Local\Google\Chrome\User Data\Default\Cache emptied successfully
==== Empty All Flash Cache ======================
No Flash Cache Found
==== Empty All Java Cache ======================
No Java Cache Found
==== C:\zoek_backup content ======================
C:\zoek_backup (files=71 folders=70 150699279 bytes)
==== Empty Temp Folders ======================
C:\Users\Default\AppData\Local\Temp emptied successfully
C:\Users\Default User\AppData\Local\Temp emptied successfully
C:\Users\Tomas\AppData\Local\Temp will be emptied at reboot
C:\WINDOWS\serviceprofiles\networkservice\AppData\Local\Temp emptied successfully
C:\WINDOWS\serviceprofiles\Localservice\AppData\Local\Temp emptied successfully
C:\WINDOWS\Temp will be emptied at reboot
==== After Reboot ======================
==== Empty Temp Folders ======================
C:\WINDOWS\Temp successfully emptied
C:\Users\Tomas\AppData\Local\Temp successfully emptied
==== Empty Recycle Bin ======================
C:\$RECYCLE.BIN successfully emptied
==== EOF on so 20. 05. 2017 at 16:08:33,80 ======================
________________
RogueKiller V12.10.9.0 (x64) [May 15 2017] (Free) by Adlice Software
mail :
http://www.adlice.com/contact/Feedback :
https://forum.adlice.comWebová stránka :
http://www.adlice.com/download/roguekiller/Blog :
http://www.adlice.comOperační systém : Windows 8.1 (6.3.9600) 64 bits version
Spuštěno : Normální režim
Uživatel : Tomas [Práva správce]
Started from : C:\Users\Tomas\Downloads\RogueKiller_portable64.exe
Mód : Smazat -- Datum : 05/19/2017 03:07:22 (Duration : 00:42:47)
¤¤¤ Procesy : 0 ¤¤¤
¤¤¤ Registry : 4 ¤¤¤
[PUP.Gen1] (X64) HKEY_USERS\S-1-5-21-3222576128-3906360890-276170336-1001\Software\IM -> Smazáno
[PUP.Gen1] (X86) HKEY_USERS\S-1-5-21-3222576128-3906360890-276170336-1001\Software\IM -> Smazáno
[PUP.HackTool|VT.not-a-virus:RiskTool.Win32.HackKMS.h] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {73B616A3-D897-4136-BAB1-3421E2E5B203} : v2.22|Action=Allow|Active=TRUE|Dir=In|Protocol=6|LPort=1688|App=C:\WINDOWS\AutoKMS\AutoKMS.exe|Name=AutoKMS| [-] -> Smazáno
[PUP.HackTool|VT.not-a-virus:RiskTool.Win32.HackKMS.h] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {B09636E6-3CA4-4470-A5F5-7508D81277B3} : v2.22|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|LPort=1688|App=C:\WINDOWS\AutoKMS\AutoKMS.exe|Name=AutoKMS| [-] -> Smazáno
¤¤¤ Úlohy : 1 ¤¤¤
[PUP.HackTool|VT.not-a-virus:RiskTool.Win32.HackKMS.h] \AutoKMS -- C:\WINDOWS\AutoKMS\AutoKMS.exe -> Smazáno
¤¤¤ Soubory : 1 ¤¤¤
[PUP.HackTool][Složka] C:\Windows\AutoKMS -> Smazáno
[PUP.HackTool][Soubor] C:\Windows\AutoKMS\AutoKMS.exe -> Smazáno
[PUP.HackTool][Soubor] C:\Windows\AutoKMS\AutoKMS.log -> Smazáno
¤¤¤ WMI : 0 ¤¤¤
¤¤¤ Soubor HOSTS : 0 ¤¤¤
¤¤¤ Antirootkit : 0 (Driver: Nahrán) ¤¤¤
¤¤¤ Webové prohlížeče : 0 ¤¤¤
¤¤¤ Kontrola MBR : ¤¤¤
+++++ PhysicalDrive0: +++++
--- User ---
[MBR] 0086f36f0b7bc8b257f89fc226376c3d
[BSP] 9e3b3c473b1db0daa516427cdae6e1cc : Windows Vista/7/8 MBR Code
Partition table:
0 - [SYSTEM][MAN-MOUNT] Basic data partition | Offset (sectors): 2048 | Size: 300 MB
1 - [MAN-MOUNT] EFI system partition | Offset (sectors): 616448 | Size: 99 MB
2 - [MAN-MOUNT] Microsoft reserved partition | Offset (sectors): 819200 | Size: 128 MB
3 - Basic data partition | Offset (sectors): 1081344 | Size: 953341 MB
User = LL1 ... OK
User = LL2 ... OK